Abstract
Security is getting an ever increasingly important issue in cyber-physical systems comprising autonomous systems. However, it is not possible to defend from all possible attacks for cost and performance reasons. An attack ranking is thus necessary. We propose a simulative framework that makes it possible to rank attacks according to their impact. We also describe a case study to assert its usefulness and effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An Emerging Threat: Eve Meets a Robot. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 271–289. Springer, Heidelberg (2011)
Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad-Hoc Networks 7(8), 1434–1447 (2009)
National ICT Australia: Castalia, http://castalia.npc.nicta.com.au/
Daidone, R., Dini, G., Tiloca, M.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Networks (2013)
European Telecommunications Standard Institute: Telecommunications andf Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis, ETSI TS 102 165-1 V4.2.3 (2011-03) (2011)
Gorog, C.: Protect Firmware from Counterfeating (2011), http://www.embeddedintel.com/special_features.php?article=1265
OMNeT++ Network Simulation Framework, http://www.omnetpp.org/
Shade, L.K.: Implementing Secure Firmware Updates. In: Proceedings of the Embedded Systems Conference Silicon Valley (2011)
Tiloca, M., De Guglielmo, D., Dini, G., Anastasi, G.: SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks. In: Proceedings of the IEEE International Conference on Emerging Technology & Factory Automation (ETFA 2013), Cagliari, Italy (2013)
Warner, J.S., Johnston, R.G.: GPS spoofing countermeasures. Homeland Security Journal (2003)
Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of Autonomous Systems Employing Embedded Computing and Sensors. IEEE Micro 33(1), 80–86 (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Dini, G., Tiloca, M. (2014). A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems. In: Hodicky, J. (eds) Modelling and Simulation for Autonomous Systems. MESAS 2014. Lecture Notes in Computer Science, vol 8906. Springer, Cham. https://doi.org/10.1007/978-3-319-13823-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-13823-7_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13822-0
Online ISBN: 978-3-319-13823-7
eBook Packages: Computer ScienceComputer Science (R0)