Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

On the Security and Complexity of Periodic Systems (CROSBI ID 310022)

Prilog u časopisu | izvorni znanstveni rad | međunarodna recenzija

Alturki, Musab A. ; Kanovich, Max ; Ban Kirigin, Tajana ; Nigam, Vivek ; Scedrov, Andre ; Talcott, Carolyn On the Security and Complexity of Periodic Systems // SN computer science, 3 (2022), 5; 356, 22. doi: 10.1007/s42979-022-01223-9

Podaci o odgovornosti

Alturki, Musab A. ; Kanovich, Max ; Ban Kirigin, Tajana ; Nigam, Vivek ; Scedrov, Andre ; Talcott, Carolyn

engleski

On the Security and Complexity of Periodic Systems

Recent years have seen a tremendous increase in the reliance of industrial systems on a variety of interconnected components ranging in complexity from simple sensors to more complex cyber-physical and Internet of Things (IoT) devices, a class of systems that is often referred to as Industry 4.0 (I4.0). Increased connectivity and the proliferation of insecure components present an opportunity for cyber attacks that could in practice inflect far-reaching damage. We present in this paper a formal modeling and analysis approach of I4.0 applications and their safety and security properties. We introduce formal models of I4.0 applications as automata systems (\AS) expressed as theories in Multiset Rewriting (MSR). We also identify different subclasses of \AS, reflecting different types of I4.0 requirements, such as periodicity. Furthermore, we model different levels of threats to the system by proposing a range of intruder models based on the number of actions that intruders can use. These models are used to investigate the complexity of two types of problems: functional correctness (safety) and vulnerability to attacks (security). Finally, we demonstrate that periodic systems are amenable to automated verification by describing an executable specification of these models using the rewriting tool Maude and carrying out various experiments.

Formal Methods ; Verification ; Security ; Multiset Rewriting ; Industry 4.0 ; Complexity

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

3 (5)

2022.

356

22

objavljeno

2662-995X

2661-8907

10.1007/s42979-022-01223-9

Povezanost rada

Matematika, Računarstvo

Poveznice
Indeksiranost