首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
A systematic co-engineering of safety and security analysis in requirements engineering process 需求工程过程中安全性与安全性分析的系统协同工程
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-18 DOI: 10.1016/j.ijcip.2023.100642
Sejin Jung , Junbeom Yoo , Sam Malek

Co-engineering safety and security is increasingly important in safety-critical systems as more diverse interacting functions are implemented in software. Many studies have tried to perform safety and security analyses in unified or in parallel. While the unified approach requires more complex analysis with new delicate methods, the parallel needs further improvement on additional integration activity for harmonizing safety and security analyses results. This paper tries to improve the harmonization activity seamlessly and systematically in typical requirements engineering process for safety-critical systems. It encompasses both requirements elicitation and analysis as well as safety and security analyses, regardless of which analysis techniques are used. The paper suggests performing an appropriate safety analysis first to derive safety requirements as summary information. It then performs goal-tree analysis to refine the high-level safety requirements into lower-level ones, from which any security analysis can work on to derive security requirements. Another goal-tree analysis then tries to refine the high-level security requirements into specific functional ones too, and it ends the analysis activity in a cycle of requirements engineering process. The sequence of safety analysis, goal-tree refinement, security analysis and another goal-tree refinement is seamlessly iterated in the process of requirements engineering, where any conflict of requirements will have an opportunity to be resolved. Our case study of a simplified UAV example uses STPA and STRIDE techniques for safety and security analysis respectively, and shows that the proposed approach is fully applicable up to industrial cases.

随着越来越多的交互功能在软件中实现,协同工程安全和安保在安全关键系统中变得越来越重要。许多研究都试图统一或并行地进行安全和保障分析。虽然统一方法需要使用新的精细方法进行更复杂的分析,但并行方法需要进一步改进额外的集成活动,以协调安全性和安全性分析结果。本文试图在典型的安全关键型系统需求工程过程中无缝、系统地改进协调活动。它既包括需求引出和分析,也包括安全性和安全性分析,而不管使用哪种分析技术。本文建议首先进行适当的安全分析,以得出安全要求作为汇总信息。然后执行目标树分析,将高级安全需求细化为低级安全需求,任何安全分析都可以从低级安全需求中派生出安全需求。然后,另一个目标树分析也试图将高级安全性需求细化为特定的功能需求,并在需求工程过程的循环中结束分析活动。在需求工程的过程中,安全分析、目标树细化、安全分析和另一个目标树细化的顺序是无缝迭代的,在这个过程中,任何需求冲突都将有机会得到解决。我们对一个简化的无人机实例进行了案例研究,分别使用STPA和STRIDE技术进行安全性和安全性分析,并表明所提出的方法完全适用于工业案例。
{"title":"A systematic co-engineering of safety and security analysis in requirements engineering process","authors":"Sejin Jung ,&nbsp;Junbeom Yoo ,&nbsp;Sam Malek","doi":"10.1016/j.ijcip.2023.100642","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100642","url":null,"abstract":"<div><p><span>Co-engineering safety and security is increasingly important in safety-critical systems as more diverse interacting functions are implemented in software. Many studies have tried to perform safety and security analyses in unified or in parallel. While the unified approach requires more complex analysis with new delicate methods, the parallel needs further improvement on additional integration activity for harmonizing safety and security analyses results. This paper tries to improve the harmonization activity seamlessly and systematically in typical requirements engineering<span> process for safety-critical systems. It encompasses both requirements elicitation and analysis as well as safety and security analyses, regardless of which analysis techniques are used. The paper suggests performing an appropriate safety analysis first to derive safety requirements as summary information. It then performs goal-tree analysis to refine the high-level safety requirements into lower-level ones, from which any security analysis can work on to derive security requirements. Another goal-tree analysis then tries to refine the high-level security requirements into specific functional ones too, and it ends the analysis activity in a cycle of requirements engineering process. The sequence of safety analysis, goal-tree refinement, security analysis and another goal-tree refinement is seamlessly iterated in the process of requirements engineering, where any conflict of requirements will have an opportunity to be resolved. Our case study of a simplified </span></span>UAV example uses STPA and STRIDE techniques for safety and security analysis respectively, and shows that the proposed approach is fully applicable up to industrial cases.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100642"},"PeriodicalIF":3.6,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138413640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurement protection to prevent cyber–physical attacks against power system State Estimation 测量保护,防止网络物理攻击对电力系统的状态估计
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-18 DOI: 10.1016/j.ijcip.2023.100643
Harag Margossian, Ronald Kfouri, Rita Saliba

Smart applications supporting modern power systems are susceptible to cyber–physical attacks, particularly False Data Injection attacks that manipulate the input measurements of State Estimation (SE) compromising its output states. This paper proposes an Integer Linear Programming formulation that protects an optimal number of measurement units to prevent cyber–physical attacks, enhancing the robustness of SE. Our approach exhibits low complexity, applies to both linear and nonlinear SE, and converges rapidly toward the optimal solution. The formulation requires information about the grid topology and measurement distribution but does not depend on the power flow equations. Also, the generalized formulation can be customized to consider distinct protection costs for all measurement types, various priorities for different measurements, and a range of measurements and pseudo-measurements. Simulations are performed on the widely used IEEE 14 and 118-bus systems to verify the approach for linear and nonlinear SE and illustrate its practicality.

支持现代电力系统的智能应用容易受到网络物理攻击,特别是操纵状态估计(SE)的输入测量的虚假数据注入攻击,损害其输出状态。本文提出了一个整数线性规划公式,该公式保护了最优数量的测量单元,以防止网络物理攻击,提高了SE的鲁棒性。我们的方法具有低复杂度,适用于线性和非线性SE,并快速收敛到最优解。该公式需要有关电网拓扑结构和测量分布的信息,但不依赖于潮流方程。此外,广义公式可以定制,以考虑所有测量类型的不同保护成本,不同测量的不同优先级,以及一系列测量和伪测量。在广泛使用的IEEE 14和118总线系统上进行了仿真,验证了该方法的线性和非线性SE,并说明了其实用性。
{"title":"Measurement protection to prevent cyber–physical attacks against power system State Estimation","authors":"Harag Margossian,&nbsp;Ronald Kfouri,&nbsp;Rita Saliba","doi":"10.1016/j.ijcip.2023.100643","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100643","url":null,"abstract":"<div><p><span><span><span>Smart applications supporting modern power systems<span> are susceptible to cyber–physical attacks, particularly False Data Injection attacks that manipulate the input measurements of State Estimation (SE) compromising its output states. This paper proposes an </span></span>Integer Linear Programming formulation that protects an optimal number </span>of measurement units to prevent cyber–physical attacks, enhancing the robustness of SE. Our approach exhibits low complexity, applies to both linear and nonlinear SE, and converges rapidly toward the optimal solution. The formulation requires information about the </span>grid topology and measurement distribution but does not depend on the power flow equations. Also, the generalized formulation can be customized to consider distinct protection costs for all measurement types, various priorities for different measurements, and a range of measurements and pseudo-measurements. Simulations are performed on the widely used IEEE 14 and 118-bus systems to verify the approach for linear and nonlinear SE and illustrate its practicality.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100643"},"PeriodicalIF":3.6,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138390757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0 利用系统动态方法建模和评估地震恢复力:社会5.0的案例研究
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-30 DOI: 10.1016/j.ijcip.2023.100639
Shohreh Moradi , Md Muzahid Khan , Niamat Ullah Ibne Hossain , Mohammad Shamsuddoha , Alex Gorod

Society 5.0 is a transformation strategy centered on integrating digital technologies unveiled by the Japanese government to create a human-centric society for economic development and mitigate sustainability issues. Since societies are constantly exposed to various natural disasters like earthquakes, many precautions must be taken both before and after a disaster to minimize the damage. Seismic resilience is one of the practical assessments that may be taken in this regard. Quantifying the functionality of seismic resilience requires a systematic examination of the relevant components and their functional impact. We present a framework based on fragility, consequence and recoverability stages for evaluating the impact of a component on its functionality for earthquake events. Within this study, we introduce a novel set of indicators, which are derived from the key variables impacted by earthquakes, including hospitals, grids, and infrastructures. To that end, we have developed a system dynamics (SD) model to assess earthquake resilience in the context of Society 5.0, considering three earthquake magnitudes (7, 8, and 9 Mw) to simulate societal seismic resilience. We also perform sensitivity analysis to validate the outcomes of the policy simulations. Our findings affirm that by scrutinizing the seismic resilience of critical infrastructure and proposing relevant policies, it is possible to minimize disaster-related damage. This represents a pragmatic step forward in the field of disaster risk management.

“社会5.0”是日本政府提出的以整合数字技术为核心的转型战略,旨在为经济发展打造以人为中心的社会,缓解可持续性问题。由于社会不断受到地震等各种自然灾害的影响,因此必须在灾害发生前后采取许多预防措施,以尽量减少损失。地震恢复力是在这方面可以采取的实际评估之一。量化地震弹性的功能需要对相关组件及其功能影响进行系统检查。我们提出了一个基于脆弱性、后果和可恢复性阶段的框架,用于评估地震事件中组件对其功能的影响。在这项研究中,我们引入了一套新的指标,这些指标来自受地震影响的关键变量,包括医院、电网和基础设施。为此,我们开发了一个系统动力学(SD)模型来评估社会5.0背景下的地震恢复能力,考虑三种地震震级(7、8和9 Mw)来模拟社会地震恢复能力。我们还进行了敏感性分析来验证政策模拟的结果。我们的研究结果证实,通过审查关键基础设施的抗震能力并提出相关政策,有可能将灾害相关损失降到最低。这是灾害风险管理领域向前迈出的务实一步。
{"title":"Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0","authors":"Shohreh Moradi ,&nbsp;Md Muzahid Khan ,&nbsp;Niamat Ullah Ibne Hossain ,&nbsp;Mohammad Shamsuddoha ,&nbsp;Alex Gorod","doi":"10.1016/j.ijcip.2023.100639","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100639","url":null,"abstract":"<div><p>Society 5.0 is a transformation strategy centered on integrating digital technologies unveiled by the Japanese government to create a human-centric society for economic development and mitigate sustainability issues. Since societies are constantly exposed to various natural disasters like earthquakes, many precautions must be taken both before and after a disaster to minimize the damage. Seismic resilience is one of the practical assessments that may be taken in this regard. Quantifying the functionality of seismic resilience requires a systematic examination of the relevant components and their functional impact. We present a framework based on fragility, consequence and recoverability stages for evaluating the impact of a component on its functionality for earthquake events. Within this study, we introduce a novel set of indicators, which are derived from the key variables impacted by earthquakes, including hospitals, grids, and infrastructures. To that end, we have developed a system dynamics<span> (SD) model to assess earthquake resilience in the context of Society 5.0, considering three earthquake magnitudes (7, 8, and 9 Mw) to simulate societal seismic resilience. We also perform sensitivity analysis to validate the outcomes of the policy simulations. Our findings affirm that by scrutinizing the seismic resilience of critical infrastructure and proposing relevant policies, it is possible to minimize disaster-related damage. This represents a pragmatic step forward in the field of disaster risk management.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100639"},"PeriodicalIF":3.6,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network 天然气管道故障后果的贝叶斯网络动态预测分析
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-24 DOI: 10.1016/j.ijcip.2023.100638
Armin Aalirezaei , Dr. Golam Kabir , Md Saiful Arif Khan

Modern natural gas pipeline failures constitute devastating disasters, as they can result in cascading secondary crises. Therefore, reduction of buried gas pipeline's reliability, has become a major concern among stakeholders and researchers in recent years. This study employs a dynamic Bayesian network to investigate the consequences of natural gas pipeline failures. We consider seven parent nodes—age, diameter, length, depth, population, time of occurrence, and land use—and twelve consequence factors to analyze the overall losses stemming from pipeline failure. The proposed model can handle both static and dynamic systems using quantitative and/or qualitative data. To demonstrate the applicability and effectiveness of our developed model, we analyze the gas pipeline network of Regina in Saskatchewan, Canada. The results show that age and diameter are the two most important and sensitive parameters. The developed Bayesian network model will aid decision-makers in effectively managing and improving the reliability of their assets.

现代天然气管道故障是一场毁灭性的灾难,因为它可能导致连锁的二次危机。因此,降低埋地输气管道的可靠性,已成为近年来利益相关者和研究人员关注的主要问题。本研究采用动态贝叶斯网络来研究天然气管道故障的后果。我们考虑了7个母节点——年龄、直径、长度、深度、人口、发生时间和土地利用——以及12个后果因素来分析管道故障造成的总体损失。所提出的模型可以使用定量和/或定性数据处理静态和动态系统。为了证明所建立模型的适用性和有效性,我们对加拿大萨斯喀彻温省里贾纳的天然气管网进行了分析。结果表明,年龄和直径是两个最重要、最敏感的参数。所开发的贝叶斯网络模型将有助于决策者有效地管理和提高其资产的可靠性。
{"title":"Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network","authors":"Armin Aalirezaei ,&nbsp;Dr. Golam Kabir ,&nbsp;Md Saiful Arif Khan","doi":"10.1016/j.ijcip.2023.100638","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100638","url":null,"abstract":"<div><p>Modern natural gas pipeline failures constitute devastating disasters, as they can result in cascading secondary crises. Therefore, reduction of buried gas pipeline's reliability, has become a major concern among stakeholders and researchers in recent years. This study employs a dynamic Bayesian network to investigate the consequences of natural gas pipeline failures. We consider seven parent nodes—age, diameter, length, depth, population, time of occurrence, and land use—and twelve consequence factors to analyze the overall losses stemming from pipeline failure. The proposed model can handle both static and dynamic systems using quantitative and/or qualitative data. To demonstrate the applicability and effectiveness of our developed model, we analyze the gas pipeline network of Regina in Saskatchewan, Canada. The results show that age and diameter are the two most important and sensitive parameters. The developed Bayesian network model will aid decision-makers in effectively managing and improving the reliability of their assets.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100638"},"PeriodicalIF":3.6,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem 俄乌武装冲突:数字生态系统的经验教训
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-12 DOI: 10.1016/j.ijcip.2023.100637
Itzhak Aviv , Uri Ferri

Since February 2022, the Russian-Ukrainian armed conflict significantly impacted the digital landscape. This study examines the conflict's impacts on the local and global digital ecosystem. Using grey literature, we analyzed English-language data sources primarily published between November 2022 and April 2023, which were based on data sources from the commencement of the conflict to the publication date. The investigation reveals insights into four categories: cyber and kinetic warfare, telecommunications, IT and cloud computing, digital geopolitics and resilience. The main insight in cyber warfare is that cyber attacks on Ukraine's digital infrastructure were only partially effective despite the massive involvement of cybercrime groups implementing adaptive wiping and DDoS attacks on behalf of national interests. The cyber defense success resulted from the allies' support for Ukraine and a well-established and implemented national cybersecurity strategy. Kinetic attacks against data centers have accelerated the migration of data and applications to cloud computing. The most incredible legacy of the current conflict is the positive paradigm shift in the cloud's security and privacy capabilities for sensitive systems' continuous operation as an alternative to system disability in locally destroyed data centers. The third insight reveals Telecom's reliance on satellite network suppliers and mobile power equipment, such as High-Capacity batteries, which are in shortage worldwide. Digital geopolitics alters the paradigms of digital resilience. Global tech companies assume the role of digital nations and superpowers while taking sides. During the conflict, we observe for the first time in practice the digital blockade by global techies of one side of the conflict and the digital support of the other, thereby shaping paradigms regarding digital sovereignty as digital resilience.

自2022年2月以来,俄罗斯与乌克兰的武装冲突严重影响了数字格局。本研究考察了冲突对当地和全球数字生态系统的影响。使用灰色文献,我们分析了主要在2022年11月至2023年4月期间发布的英语数据源,这些数据源基于从冲突开始到发布日期的数据源。调查揭示了四个方面的见解:网络和动态战、电信、IT和云计算、数字地缘政治和弹性。网络战的主要观点是,尽管网络犯罪集团为了国家利益,大量参与实施了自适应清除和DDoS攻击,但对乌克兰数字基础设施的网络攻击只取得了部分效果。网络防御的成功源于盟国对乌克兰的支持以及完善和实施的国家网络安全战略。针对数据中心的动态攻击加速了数据和应用程序向云计算的迁移。当前冲突最令人难以置信的遗产是云的安全和隐私能力的积极范式转变,用于敏感系统的持续运行,作为本地被破坏的数据中心系统故障的替代方案。第三个洞察揭示了电信对卫星网络供应商和高容量电池等移动电源设备的依赖,这些设备在全球范围内都很短缺。数字地缘政治改变了数字复原力的范式。全球科技公司在站队的同时扮演着数字国家和超级大国的角色。在冲突期间,我们首次观察到全球技术人员对冲突一方的数字封锁和对另一方的数字支持,从而形成了将数字主权视为数字复原力的范式。
{"title":"Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem","authors":"Itzhak Aviv ,&nbsp;Uri Ferri","doi":"10.1016/j.ijcip.2023.100637","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100637","url":null,"abstract":"<div><p>Since February 2022, the Russian-Ukrainian armed conflict significantly impacted the digital landscape. This study examines the conflict's impacts on the local and global digital ecosystem. Using grey literature, we analyzed English-language data sources primarily published between November 2022 and April 2023, which were based on data sources from the commencement of the conflict to the publication date. The investigation reveals insights into four categories: cyber and kinetic warfare, telecommunications, IT and cloud computing, digital geopolitics and resilience. The main insight in cyber warfare is that cyber attacks on Ukraine's digital infrastructure were only partially effective despite the massive involvement of cybercrime groups implementing adaptive wiping and DDoS attacks on behalf of national interests. The cyber defense success resulted from the allies' support for Ukraine and a well-established and implemented national cybersecurity strategy. Kinetic attacks against data centers have accelerated the migration of data and applications to cloud computing. The most incredible legacy of the current conflict is the positive paradigm shift in the cloud's security and privacy capabilities for sensitive systems' continuous operation as an alternative to system disability in locally destroyed data centers. The third insight reveals Telecom's reliance on satellite network suppliers and mobile power equipment, such as High-Capacity batteries, which are in shortage worldwide. Digital geopolitics alters the paradigms of digital resilience. Global tech companies assume the role of digital nations and superpowers while taking sides. During the conflict, we observe for the first time in practice the digital blockade by global techies of one side of the conflict and the digital support of the other, thereby shaping paradigms regarding digital sovereignty as digital resilience.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100637"},"PeriodicalIF":3.6,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91964468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protocol study and anomaly detection for server-driven traffic in SCADA networks SCADA网络中服务器驱动流量的协议研究与异常检测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100612
Chih-Yuan Lin, S. Nadjm-Tehrani
{"title":"Protocol study and anomaly detection for server-driven traffic in SCADA networks","authors":"Chih-Yuan Lin, S. Nadjm-Tehrani","doi":"10.1016/j.ijcip.2023.100612","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100612","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100612"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互关联的智能关键基础设施系统网络物理风险的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, I. Tien
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas, I. Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems 5G对相互依存的智能关键基础设施系统的网络物理风险的影响
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100617
Paola Vargas, Iris Tien

5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This paper investigates how the cyber-physical risk landscape will be impacted by 5 G for four major CI sectors in detail: smart transportation, smart water, smart power, and smart oil and gas networks. Compared to prior work only examining a single CI network, the authors present a comprehensive assessment of the types of threats that these sectors can expect based on past incidents, the new vulnerabilities introduced by 5 G and existing vulnerabilities exacerbated by the introduction of more connected devices, along with mitigation recommendations for each risk. Risks associated with the rollout of and transition to 5 G, risks from 5 G network disruptions, cyberattack risks, and privacy risks are included. While each of the sectors has a unique risk profile, general themes also emerged across multiple CI networks. Notably, there will be an increased number of threat vectors from smart devices reliant on the telecommunications network to provide monitoring and control of infrastructure services. Because many of these devices are accessible by the public, the risk of social engineering attacks and vulnerability to physical hacking are exacerbated. Successful risk mitigation requires collaboration among CI's many stakeholders to implement security measures at the interfaces between connected devices to limit the access to assets in case one security measure is successfully bypassed. Due to the increased interdependencies between CI networks, operators must create backup plans to keep the most essential services running on a smaller bandwidth in case of a 5 G outage or similar failure. As 5 G capabilities continue to develop and the risk landscape evolves, ongoing research is needed and CI owners and operators should be prepared to update security measures to remain ahead of identified risks and threats.

5G技术为关键基础设施(CI)带来了广泛的好处,包括提高可靠性、提高效率、节省成本和提高工人安全性。然而,它也带来了许多新的风险,CI所有者和运营商必须做好准备,以促进有效的风险缓解和应对。然而,尚未对CI系统的这些风险进行系统评估。本文详细研究了5G将如何影响四个主要CI部门的网络物理风险格局:智能交通、智能水务、智能电力和智能油气网络。与之前只检查单个CI网络的工作相比,作者根据过去的事件、5G引入的新漏洞和因引入更多连接设备而加剧的现有漏洞,对这些部门可能面临的威胁类型进行了全面评估,并对每种风险提出了缓解建议。包括与5G的推出和过渡相关的风险、5G网络中断的风险、网络攻击风险和隐私风险。虽然每个行业都有独特的风险状况,但多个CI网络也出现了一般性主题。值得注意的是,依赖电信网络提供基础设施服务监控的智能设备的威胁载体数量将增加。由于这些设备中的许多都是公众可以访问的,因此社会工程攻击的风险和物理黑客攻击的脆弱性加剧了。成功的风险缓解需要CI的许多利益相关者之间的合作,在连接设备之间的接口上实施安全措施,以在成功绕过一项安全措施的情况下限制对资产的访问。由于CI网络之间的相互依赖性增加,运营商必须制定备份计划,以在5G中断或类似故障的情况下,保持最重要的服务在较小的带宽上运行。随着5G能力的不断发展和风险格局的演变,需要进行持续的研究,CI所有者和运营商应准备好更新安全措施,以领先于已识别的风险和威胁。
{"title":"Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems","authors":"Paola Vargas,&nbsp;Iris Tien","doi":"10.1016/j.ijcip.2023.100617","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100617","url":null,"abstract":"<div><p>5 G technology promises a wide range of benefits for critical infrastructure (CI), including improved reliability, increased efficiency, cost savings, and increased worker safety. However, it also brings many new risks that CI owners and operators must be prepared for to facilitate effective risk mitigation and response. These risks, however, have not been systematically assessed for CI systems. This paper investigates how the cyber-physical risk landscape will be impacted by 5 G for four major CI sectors in detail: smart transportation, smart water, smart power, and smart oil and gas networks. Compared to prior work only examining a single CI network, the authors present a comprehensive assessment of the types of threats that these sectors can expect based on past incidents, the new vulnerabilities introduced by 5 G and existing vulnerabilities exacerbated by the introduction of more connected devices, along with mitigation recommendations for each risk. Risks associated with the rollout of and transition to 5 G, risks from 5 G network disruptions, cyberattack risks, and privacy risks are included. While each of the sectors has a unique risk profile, general themes also emerged across multiple CI networks. Notably, there will be an increased number of threat vectors from smart devices reliant on the telecommunications network to provide monitoring and control of infrastructure services. Because many of these devices are accessible by the public, the risk of social engineering attacks and vulnerability to physical hacking are exacerbated. Successful risk mitigation requires collaboration among CI's many stakeholders to implement security measures at the interfaces between connected devices to limit the access to assets in case one security measure is successfully bypassed. Due to the increased interdependencies between CI networks, operators must create backup plans to keep the most essential services running on a smaller bandwidth in case of a 5 G outage or similar failure. As 5 G capabilities continue to develop and the risk landscape evolves, ongoing research is needed and CI owners and operators should be prepared to update security measures to remain ahead of identified risks and threats.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100617"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rule-based anomaly detection for railway signalling networks 基于规则的铁路信号网络异常检测
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100603
Markus Heinrich , Arwed Gölz , Tolga Arul , Stefan Katzenbeisser

We propose a rule-based anomaly detection system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and collisions, if our countermeasure is not employed. We apply safety principles of railway operation to create a distributed anomaly detection system that inspects incoming commands on the signals and points. The proposed anomaly detection system detects mistimed control messages against light signals, points and train detection systems that lead to derailments and collisions without producing false positives, while it requires only a small amount of overhead in terms of network communication and latency compared to normal train operation.

我们提出了一种基于规则的铁路信号异常检测系统,该系统可以减轻Dolev Yao攻击者的攻击,该攻击者能够通过发布合法但时机不对的控制消息来注入控制命令以执行语义攻击。该系统还以同样的效果减轻了被攻击者破坏的信号盒的影响。如果我们不采取对策,我们认为攻击者可能会导致列车脱轨和碰撞。我们应用铁路运营的安全原则创建了一个分布式异常检测系统,用于检查信号和点上的传入命令。所提出的异常检测系统针对光信号、点和列车检测系统检测定时错误的控制信息,这些信息会导致脱轨和碰撞,而不会产生误报,而与正常列车运行相比,它只需要少量的网络通信和延迟开销。
{"title":"Rule-based anomaly detection for railway signalling networks","authors":"Markus Heinrich ,&nbsp;Arwed Gölz ,&nbsp;Tolga Arul ,&nbsp;Stefan Katzenbeisser","doi":"10.1016/j.ijcip.2023.100603","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100603","url":null,"abstract":"<div><p><span>We propose a rule-based anomaly detection<span> system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands to perform semantic attacks by issuing licit but mistimed control messages. The system as well mitigates the effects of a signal box compromised by an attacker with the same effect. We consider an attacker that could cause train derailments and collisions, if our </span></span>countermeasure<span> is not employed. We apply safety principles of railway operation to create a distributed anomaly detection system that inspects incoming commands on the signals and points. The proposed anomaly detection system detects mistimed control messages against light signals, points and train detection systems that lead to derailments and collisions without producing false positives, while it requires only a small amount of overhead in terms of network communication and latency compared to normal train operation.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 ","pages":"Article 100603"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50192874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications AKAASH:一种可实现的控制器-导频数据链路通信的认证、密钥协议和安全切换方法
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.ijcip.2023.100619
Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov
{"title":"AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications","authors":"Suleman Khan, G. S. Gaba, An Braeken, Pardeep Kumar, A. Gurtov","doi":"10.1016/j.ijcip.2023.100619","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100619","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100619"},"PeriodicalIF":3.6,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1