https://www.mdu.se/

mdu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Risk Mitigation of Cyber Physical Systems: A Case Study of a Flight Simulator
Capital University of Science and Technology (C.U.S.T.), Islamabad, Pakistan.ORCID iD: 0000-0002-7840-8589
National University of Computer and Emerging Science (FAST), Islamabad, Pakistan. (Software Engineering & Automation Lab (SEAL))ORCID iD: 0000-0001-5576-6212
Johannes Kepler University Linz, Linz, Austria. (Software Competence Center Hagenberg GmbH, Hagenberg,Austria)
University of Lahore, Islamabad, Pakistan.ORCID iD: 0000-0002-2313-9107
2019 (English)In: Database and Expert Systems Applications: DEXA 2019 International Workshops BIOKDD, IWCFS, MLKgraphs and TIR, Linz, Austria, August 26–29, 2019, Proceedings, Springer, 2019, Vol. 1062, p. 129-138Conference paper, Published paper (Refereed)
Abstract [en]

Avionics has seen a greatest shift in technology over the last two decades. The severity of the consequences resulting from a lack of risk management in avionics can be seen from recent incidents of unmanned aerial vehicles being hacked or in the hacking of vendor-controlled systems installed in commercial aircrafts. Over a million incidents related to security breaches at cyber layer have been recorded over the last decade, among which 350,000 cyber-attacks alone have taken place in the year 2018. Unfortunately, only a limited set of studies have been conducted on security risk management, particularly specific to avionics. In this article, we aim to identify, analyze and mitigate the security risks of 6 Degree of Freedom Flight Simulator. As a result, we identify 8 risks of level 3–4 as per the IEC 61508 standard. Further analysis of the identified risks yields in another 34 risks. We then mitigate the severity of the identified risks from level 4 to level 2 as per the IEC 61508 standard. The cryptosystem used for risk mitigation performed relatively faster as compared to some of the most recently proposed encryption schemes.

Place, publisher, year, edition, pages
Springer, 2019. Vol. 1062, p. 129-138
Series
Communications in Computer and Information Science, E-ISSN 1865-0937 ; 1062
Keywords [en]
Cyber Physical Systems (CPS), Cyber-security, Risk identification, Risk assessment, Risk mitigation, Risk management, Cryptosystem
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:mdh:diva-55622DOI: 10.1007/978-3-030-27684-3_17ISI: 000711190500017Scopus ID: 2-s2.0-85071872495ISBN: 978-3-030-27683-6 (print)ISBN: 978-3-030-27684-3 (electronic)OAI: oai:DiVA.org:mdh-55622DiVA, id: diva2:1585694
Conference
DEXA: International Conference on Database and Expert Systems Applications
Available from: 2021-08-17 Created: 2021-08-17 Last updated: 2021-12-01Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Zahid, MaryamInayat, IrumMehmood, Zahid
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 270 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf