Skip to main content

A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems

  • Conference paper
Modelling and Simulation for Autonomous Systems (MESAS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8906))

Abstract

Security is getting an ever increasingly important issue in cyber-physical systems comprising autonomous systems. However, it is not possible to defend from all possible attacks for cost and performance reasons. An attack ranking is thus necessary. We propose a simulative framework that makes it possible to rank attacks according to their impact. We also describe a case study to assert its usefulness and effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akdemir, K.D., Karakoyunlu, D., Padir, T., Sunar, B.: An Emerging Threat: Eve Meets a Robot. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 271–289. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad-Hoc Networks 7(8), 1434–1447 (2009)

    Article  Google Scholar 

  3. National ICT Australia: Castalia, http://castalia.npc.nicta.com.au/

  4. Daidone, R., Dini, G., Tiloca, M.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wireless Networks (2013)

    Google Scholar 

  5. European Telecommunications Standard Institute: Telecommunications andf Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis, ETSI TS 102 165-1 V4.2.3 (2011-03) (2011)

    Google Scholar 

  6. Gorog, C.: Protect Firmware from Counterfeating (2011), http://www.embeddedintel.com/special_features.php?article=1265

  7. OMNeT++ Network Simulation Framework, http://www.omnetpp.org/

  8. Shade, L.K.: Implementing Secure Firmware Updates. In: Proceedings of the Embedded Systems Conference Silicon Valley (2011)

    Google Scholar 

  9. Tiloca, M., De Guglielmo, D., Dini, G., Anastasi, G.: SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks. In: Proceedings of the IEEE International Conference on Emerging Technology & Factory Automation (ETFA 2013), Cagliari, Italy (2013)

    Google Scholar 

  10. Warner, J.S., Johnston, R.G.: GPS spoofing countermeasures. Homeland Security Journal (2003)

    Google Scholar 

  11. Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of Autonomous Systems Employing Embedded Computing and Sensors. IEEE Micro 33(1), 80–86 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Dini, G., Tiloca, M. (2014). A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems. In: Hodicky, J. (eds) Modelling and Simulation for Autonomous Systems. MESAS 2014. Lecture Notes in Computer Science, vol 8906. Springer, Cham. https://doi.org/10.1007/978-3-319-13823-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13823-7_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13822-0

  • Online ISBN: 978-3-319-13823-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics