Skip to main content

Model-Based Approach for Co-optimization of Safety and Security Objectives in Design of Critical Architectures

  • Conference paper
  • First Online:
Model and Data Engineering (MEDI 2021)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12732))

Included in the following conference series:

Abstract

During the development of Cyber-Physical Systems (CPS) safety and security are major concerns to be considered as it has been established by various literature. Moreover, these concerns must be included early on during the System Development Life Cycle (SDLC). In this work, we focus on the design-phase of the SDLC to assist the engineers in conducting design-space exploration of the system hardware architecture w.r.t to both safety and security concerns. In this way, the engineers may perform simulations to find a set of quasi-optimal solutions before developing an actual physical prototype. To achieve this, our tooled method builds on our previous work [11] and supports a multi-concern analysis by leveraging Model-Driven Engineering (MDE) techniques such as SysML modeling along with the transformation of SysML models into representations which are finally optimized via constraint solvers. Overall, the method and framework shall support the design of the system architecture from a repository of components based on possible configuration alternatives, which satisfy the system objectives such as reliability and cost. Such functions can help to evaluate the effects of integrating safety and security features thus showing their interplay. The overall approach is illustrated via an automotive CPS case study.

K. Suri–This work is the result of a collaborative project between CEA-LIST and ESTACA, a period during which Kunal was following a postdoctoral fellowship in ESTACA.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.nist.gov/publications/system-development-life-cycle-sdlc.

  2. 2.

    https://www.eclipse.org/papyrus/.

  3. 3.

    https://www.omg.org/index.htm.

  4. 4.

    https://www.omg.org/spec/SysML/1.4.

  5. 5.

    https://www.eclipse.org/Xtext/documentation/index.html.

  6. 6.

    https://github.com/python-constraint/python-constraint.

  7. 7.

    https://wiki.eclipse.org/Papyrus_Software_Designer.

  8. 8.

    http://www.merge-project.eu.

  9. 9.

    https://aquas-project.eu/.

References

  1. Apvrille, L.: Ttool for diplodocus: an environment for design space exploration. In: NOTERE, pp. 1–4. ACM (2008)

    Google Scholar 

  2. Bettini, L.: Implementing domain-specific languages with Xtext and Xtend. Packt Publishing Ltd. (2016)

    Google Scholar 

  3. Bozdal, M., Samie, M., Jennions, I.: A survey on can bus protocol: Attacks, challenges, and potential solutions. In: ICCECE, pp. 201–205. IEEE (2018)

    Google Scholar 

  4. Brailsford, S.C., Potts, C.N., Smith, B.M.: Constraint satisfaction problems: algorithms and applications. Euro. J. Operat. Res. 119(3), 557–581 (1999)

    Article  Google Scholar 

  5. Coit, D.W., Smith, A.E.: Optimization approaches to the redundancy allocation problem for series-parallel systems. In: Fourth Indus. Eng. Research Conf. Proc., pp. 342–349 (1995)

    Google Scholar 

  6. Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621–645 (2006)

    Article  Google Scholar 

  7. Eigner, M., Dickopf, T., Apostolov, H., Schaefer, P., Faißt, K.G., Keßler, A.: System lifecycle management. In: IFIP International Conference on PLM, pp. 287–300. Springer (2014)

    Google Scholar 

  8. Fagnant, D.J., Kockelman, K.: Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations. Transp. Res. Part A: Policy Practice 77, 167–181 (2015)

    Google Scholar 

  9. Kannan, S.M., Suri, K., Cadavid, J., et al.: Towards industry 4.0: gap analysis between current automotive mes and industry standards using model-based requirement engineering. In: ICSAW 2017, pp. 29–35. IEEE (2017)

    Google Scholar 

  10. Lee, E.A.: Cyber physical systems: design challenges. In: ISORC, pp. 363–369. IEEE (2008)

    Google Scholar 

  11. Leserf, P., de Saqui-Sannes, P., Hugues, J., Chaaban, K.: Sysml modeling for embedded systems design optimization: a case study. In: MODELSWARD 2015, pp. 449–457 (2015)

    Google Scholar 

  12. Lisova, E., Sljivo, I., Causevic, A.: Safety and security co-analyses: a systematic literature review. IEEE Syst. J. 13, 2189–2200 (2018)

    Google Scholar 

  13. Meyer, J., et al.: Process planning in microwave module production. In: 1998 AI and Manuf.: State of the Art and State of Practice (1998)

    Google Scholar 

  14. Paul, S., Rioux, L.: Over 20 years of research into cybersecurity and safety engineering: a short bibliography. In: Safety and Security Engineering, vol. 5, pp. 335–349. WIT Press (2015)

    Google Scholar 

  15. Pedroza, G.: Towards safety and security co-engineering. In: Hamid, B., Gallina, B., Shabtai, A., Elovici, Y., Garcia-Alfaro, J. (eds.) CSITS/ISSA -2018. LNCS, vol. 11552, pp. 3–16. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-16874-2_1

    Chapter  Google Scholar 

  16. Pedroza, G., Apvrille, L., Knorreck, D.: Avatar: a sysml environment for the formal verification of safety and security properties. In: NOTERE, pp. 1–10. IEEE (2011)

    Google Scholar 

  17. Roux, B., Gautier, M., Sentieys, O., Derrien, S.: Communication-based power modelling for heterogeneous multiprocessor architectures. In: MCSOC, pp. 209–216. IEEE (2016)

    Google Scholar 

  18. Spyropoulos, D., Baras, J.S.: Extending design capabilities of sysml with trade-off analysis: Electrical microgrid case study. In: CSER, pp. 108–117 (2013)

    Google Scholar 

  19. Suri, K., Cadavid, J., et al.: Modeling business motivation and underlying processes for rami 4.0-aligned cyber-physical production systems. In: ETFA, pp. 1–6. IEEE (2017)

    Google Scholar 

  20. Suri, K., Gaaloul, W., Cuccuru, A.: Configurable IoT-aware allocation in business processes. In: Ferreira, J.E., Spanoudakis, G., Ma, Y., Zhang, L.-J. (eds.) SCC 2018. LNCS, vol. 10969, pp. 119–136. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94376-3_8

    Chapter  Google Scholar 

  21. Van Huong, P., Binh, N.N.: Embedded system architecture design and optimization at the model level. Intl. J. Comp. Comm. Eng. 1(4), 345 (2012)

    Google Scholar 

  22. Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) Information Security and Cryptology - ICISC 2011. pp. 302–318 (2012)

    Google Scholar 

  23. Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Emb. Sys. 2007, 074706 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kunal Suri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suri, K., Pedroza, G., Leserf, P. (2021). Model-Based Approach for Co-optimization of Safety and Security Objectives in Design of Critical Architectures. In: Attiogbé, C., Ben Yahia, S. (eds) Model and Data Engineering. MEDI 2021. Lecture Notes in Computer Science(), vol 12732. Springer, Cham. https://doi.org/10.1007/978-3-030-78428-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78428-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78427-0

  • Online ISBN: 978-3-030-78428-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics