Advertisement

CPS-CSH Cyber-Physical Analysis and Design

  • Dale Fitch
  • Sahra Sedigh
  • Bruce McMillin
  • Ravi Akella
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7722)

Abstract

Existing methodologies to assess cyber-physical systems (CPSs) are hampered by their diverse nature and complexity. This paper proposes a model for cyber-physical systems design and analysis rooted in the social science approach to complex system analysis, Critical System Heuristics (CSH). The model affords an analysis at both the level of abstraction of functionality and the type of functionality within a CPS. The CPS-CSH model is developed and examples from reliability for electric smart grid systems and security for water distribution systems are presented.

Keywords

Cyber-Physical Modeling Security Reliability Analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lee, E.: Cyber physical systems: Design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369 (May 2008)Google Scholar
  2. 2.
    Ulrich, W.: Beyond methodology choice: Critical systems thinking as critically systemic discourse. Journal of the Operational Research Society 54(4), 325–342 (2003)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Dueas-Osorio, L., Craig, J.I., Goodno, B.J.: Probabilistic response of interdependent infrastructure networks. In: Proceedings of the 2nd Annual Meeting of the Asian-pacific Network of Centers for Earthquake Engineering Research (ANCER), Honolulu, Hawaii (July 2004)Google Scholar
  4. 4.
    Laprie, J.C., Kanoun, K., Kaaniche, M.: Modelling interdependencies between the electricity and information infrastructures. In: Proc. of the Int’l Conf. on Computer Safety, Reliability and Security (SAFECOMP), pp. 54–67 (September 2007)Google Scholar
  5. 5.
    Dondossola, G., Garrone, F., Szanto, J., Fiorenza, G.: Emerging Information Technology Scenarios for the Control and Management of the Distribution Grid. In: Proc. of the 19th Int’l Conf. on Electricity Distribution (2007)Google Scholar
  6. 6.
    Geer, D.: Security of Critical Control Systems Sparks Concern. Computer 39(1), 20–23 (2006)CrossRefGoogle Scholar
  7. 7.
    Deconinck, G., Belmans, R., Driesem, J., Nauwelaers, B., Lil, E.V.: Reaching for 100% Reliable Electricity Services: Multi-system Interactions and Fundamental Solutions. In: Proc. of the DIGESEC-CRIS Workshop 2006 Influence of Distributed Generation and Renewable Generation on Power System Security, Magdeburg, Germany (December 2006)Google Scholar
  8. 8.
    Office of Electric Transmission and Distribution: “Grid 2030”: A National Vision for Electricity’s Second 100 Years (2003)Google Scholar
  9. 9.
    Kazemi, S., Fotuhi-Firuzabad, B.R.: Reliability assessment of an automated distribution system. IET Generation, Transportation and Distribution 1(2), 223–233 (2007)CrossRefGoogle Scholar
  10. 10.
    A summary of control system security standards activities in the energy sector. Technical report, Department of Energy, Office of Electricity Delivery and Energy Reliability, Washington, DC (2005)Google Scholar
  11. 11.
    Final report on workshop on future directions in cyber-physical systems security. Technical report, Department of Homeland Security (2010)Google Scholar
  12. 12.
    Habermas, J.: Communication and the evolution of society. Beacon, Boston, MA (1979)Google Scholar
  13. 13.
    Jeppesen, S.: Exploring an explicit use of the concept of sustainability in transport planning. Systemic Practice and Action Research 24(2), 133–146 (2011)CrossRefGoogle Scholar
  14. 14.
    Maru, Y., Woodford, K.: Enhancing emancipatory systems methodologies for sustainable development. Systemic Practice and Action Research 14(1), 61–77 (2001)CrossRefGoogle Scholar
  15. 15.
    Faza, A., Sedigh, S., McMillin, B.: Integrated cyber-physical fault injection for reliability analysis of the smart grid. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 277–290. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  16. 16.
    Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)CrossRefGoogle Scholar
  17. 17.
    Akella, R., Tang, H., McMillin, B.: Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection 3-4, 157–173 (2010)CrossRefGoogle Scholar
  18. 18.
    Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Stealthy deception attacks on water SCADA systems. In: HSCC, pp. 161–170 (2010)Google Scholar
  19. 19.
    Ulrich, W.: Operational research and critical systems thinking-an integrated perspective part 1: OR as applied systems thinking. Journal of the Operational Research Society, 1–20 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Dale Fitch
    • 1
  • Sahra Sedigh
    • 2
  • Bruce McMillin
    • 3
  • Ravi Akella
    • 3
  1. 1.School of Social WorkUniversity of Missouri-ColumbiaColumbiaUSA
  2. 2.Department of Electrical and Computer EngineeringMissouri University of Science and TechnologyRollaUSA
  3. 3.Computer Science DepartmentMissouri University of Science and TechnologyRollaUSA

Personalised recommendations