ABSTRACT
Security and trust plays an important role in Smart Cyber-Physical Systems (sCPS), which are formed as open and large collections of autonomous context- and self-aware adaptive components that dynamically group themselves and cooperate (all in a rather decentralized manner). Such a high level of dynamicity, open-endedness and context-dependence however makes existing approaches to security and trust in distributed systems not fully suitable (typically being too static and not able to cope with decentralization). In this paper we introduce the concepts of context-dependent security and trust defined at the architecture level of sCPS. Contrary to traditional approaches, our solution allows components to adapt their security clearance according to their context (i.e. their state and the surrounding environment), while preserving high level security policies. We further define the interplay of security and trust in sCPS and show their interrelation as an important ingredient in achieving security in systems of adaptive autonomous components.
- Ferraiolo, D. F. and Kuhn, D. R. Role-Based Access Controls. In 15th National Computer Security Conference (NCSC, 1992), pp. 554--563.Google Scholar
- Clark, D. D. and Wilson, D. R. A Comparison of Commercial and Military Computer Security Policies. IEEE, 1987.Google ScholarCross Ref
- Bures, T., Gerostathopoulos, I., Hnetynka, P., Keznikl, J., Kit, M., Plasil, F. DEECo -- an Ensemble-Based Component System. In Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering (CBSE '13). ACM, New York, NY, USA, 81--90. Google ScholarDigital Library
- Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V. dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. Proceedings of ICDCS 2002. Google ScholarDigital Library
- Ninghui, Li and Mitchell, J. C. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition, 2003, pp.201--212 vol.1, 22--24 April 2003.Google ScholarCross Ref
- Venkatasubramanian, K. K. Security Solutions for Cyber-Physical Systems. Arizona State University, 2009.Google Scholar
- Yao, W. Trust management for widely distributed systems. University of Cambridge, 2008. ISSN 1476-2986.Google Scholar
- Sandhu, S. R., Coyne, E. J., Feinstein, H. L., Youman, C. E. Role-Based Access Control Models. In IEEE Computer, vol. 29, nr. 2, February 1996, pp. 38--47. Google ScholarDigital Library
- Shelby, Z., Hartke, K., Bormann, C. Constrained Application Protocol (CoAP). IETF, 2013, ISSN: 2070-1721.Google Scholar
- Hernández-Ramos, J. L., et al. Distributed Capability-based Access Control for the Internet of Things. Journal of Internet Services and Information Security (JISIS), volume: 3, number: 3/4, pp. 1--16.Google Scholar
- Blaze, M., Feigenbaum J., Ioannidis, J., Keromytis A. D. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming, pp. 185--210, Springer-Verlag, 1999. Google ScholarDigital Library
- Yuan, E., and Tong, J. Attributed Based Access Control (ABAC) for Web Services. In Proceedings of ICWS 2005. Google ScholarDigital Library
- Steiner, J. G., Neuman, C. and Schiller, J. I. Kerberos: An authentication service for open network systems. USENIX Association, 1988.Google Scholar
- De Nicola, R., Loreti, M., Pugliese, R., Tiezzi, F. A Formal Approach to Autonomic Systems Programming: The SCEL Language. ACM 2014.Google ScholarDigital Library
- Wuille, P. BIP32: Hierarchical Deterministic Wallets. February 2012, https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki.Google Scholar
- Castiglione, A., Santis, A. D., Masucci, B. Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes, IACR Cryptology ePrint Archive, Report 2014/752, 2014Google Scholar
Index Terms
- Security and Trust in Data Sharing Smart Cyber-Physical Systems
Recommendations
Security Objectives of Cyber Physical Systems
SECTECH '14: Proceedings of the 2014 7th International Conference on Security TechnologyToday, cyber physical systems (CPS) are ubiquitous in power networks, healthcare devices, transportation networks, industrial process and infrastructures. Security of cyber physical systems has become the utmost important concern in system design, ...
Cyber-physical systems security: Limitations, issues and future trends
AbstractTypically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes. They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the ...
Cyber physical systems security
Cyber Physical Systems (CPS) are networked systems of cyber (computation and communication) and physical (sensors and actuators) components that interact in a feedback loop with the possible help of human intervention, interaction and utilization. These ...
Comments