Abstract
During the development of Cyber-Physical Systems (CPS) safety and security are major concerns to be considered as it has been established by various literature. Moreover, these concerns must be included early on during the System Development Life Cycle (SDLC). In this work, we focus on the design-phase of the SDLC to assist the engineers in conducting design-space exploration of the system hardware architecture w.r.t to both safety and security concerns. In this way, the engineers may perform simulations to find a set of quasi-optimal solutions before developing an actual physical prototype. To achieve this, our tooled method builds on our previous work [11] and supports a multi-concern analysis by leveraging Model-Driven Engineering (MDE) techniques such as SysML modeling along with the transformation of SysML models into representations which are finally optimized via constraint solvers. Overall, the method and framework shall support the design of the system architecture from a repository of components based on possible configuration alternatives, which satisfy the system objectives such as reliability and cost. Such functions can help to evaluate the effects of integrating safety and security features thus showing their interplay. The overall approach is illustrated via an automotive CPS case study.
K. Suri–This work is the result of a collaborative project between CEA-LIST and ESTACA, a period during which Kunal was following a postdoctoral fellowship in ESTACA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
References
Apvrille, L.: Ttool for diplodocus: an environment for design space exploration. In: NOTERE, pp. 1–4. ACM (2008)
Bettini, L.: Implementing domain-specific languages with Xtext and Xtend. Packt Publishing Ltd. (2016)
Bozdal, M., Samie, M., Jennions, I.: A survey on can bus protocol: Attacks, challenges, and potential solutions. In: ICCECE, pp. 201–205. IEEE (2018)
Brailsford, S.C., Potts, C.N., Smith, B.M.: Constraint satisfaction problems: algorithms and applications. Euro. J. Operat. Res. 119(3), 557–581 (1999)
Coit, D.W., Smith, A.E.: Optimization approaches to the redundancy allocation problem for series-parallel systems. In: Fourth Indus. Eng. Research Conf. Proc., pp. 342–349 (1995)
Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621–645 (2006)
Eigner, M., Dickopf, T., Apostolov, H., Schaefer, P., Faißt, K.G., Keßler, A.: System lifecycle management. In: IFIP International Conference on PLM, pp. 287–300. Springer (2014)
Fagnant, D.J., Kockelman, K.: Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations. Transp. Res. Part A: Policy Practice 77, 167–181 (2015)
Kannan, S.M., Suri, K., Cadavid, J., et al.: Towards industry 4.0: gap analysis between current automotive mes and industry standards using model-based requirement engineering. In: ICSAW 2017, pp. 29–35. IEEE (2017)
Lee, E.A.: Cyber physical systems: design challenges. In: ISORC, pp. 363–369. IEEE (2008)
Leserf, P., de Saqui-Sannes, P., Hugues, J., Chaaban, K.: Sysml modeling for embedded systems design optimization: a case study. In: MODELSWARD 2015, pp. 449–457 (2015)
Lisova, E., Sljivo, I., Causevic, A.: Safety and security co-analyses: a systematic literature review. IEEE Syst. J. 13, 2189–2200 (2018)
Meyer, J., et al.: Process planning in microwave module production. In: 1998 AI and Manuf.: State of the Art and State of Practice (1998)
Paul, S., Rioux, L.: Over 20 years of research into cybersecurity and safety engineering: a short bibliography. In: Safety and Security Engineering, vol. 5, pp. 335–349. WIT Press (2015)
Pedroza, G.: Towards safety and security co-engineering. In: Hamid, B., Gallina, B., Shabtai, A., Elovici, Y., Garcia-Alfaro, J. (eds.) CSITS/ISSA -2018. LNCS, vol. 11552, pp. 3–16. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16874-2_1
Pedroza, G., Apvrille, L., Knorreck, D.: Avatar: a sysml environment for the formal verification of safety and security properties. In: NOTERE, pp. 1–10. IEEE (2011)
Roux, B., Gautier, M., Sentieys, O., Derrien, S.: Communication-based power modelling for heterogeneous multiprocessor architectures. In: MCSOC, pp. 209–216. IEEE (2016)
Spyropoulos, D., Baras, J.S.: Extending design capabilities of sysml with trade-off analysis: Electrical microgrid case study. In: CSER, pp. 108–117 (2013)
Suri, K., Cadavid, J., et al.: Modeling business motivation and underlying processes for rami 4.0-aligned cyber-physical production systems. In: ETFA, pp. 1–6. IEEE (2017)
Suri, K., Gaaloul, W., Cuccuru, A.: Configurable IoT-aware allocation in business processes. In: Ferreira, J.E., Spanoudakis, G., Ma, Y., Zhang, L.-J. (eds.) SCC 2018. LNCS, vol. 10969, pp. 119–136. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94376-3_8
Van Huong, P., Binh, N.N.: Embedded system architecture design and optimization at the model level. Intl. J. Comp. Comm. Eng. 1(4), 345 (2012)
Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) Information Security and Cryptology - ICISC 2011. pp. 302–318 (2012)
Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Emb. Sys. 2007, 074706 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Suri, K., Pedroza, G., Leserf, P. (2021). Model-Based Approach for Co-optimization of Safety and Security Objectives in Design of Critical Architectures. In: Attiogbé, C., Ben Yahia, S. (eds) Model and Data Engineering. MEDI 2021. Lecture Notes in Computer Science(), vol 12732. Springer, Cham. https://doi.org/10.1007/978-3-030-78428-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-78428-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78427-0
Online ISBN: 978-3-030-78428-7
eBook Packages: Computer ScienceComputer Science (R0)