mdh.sePublikationer
Ändra sökning
Avgränsa sökresultatet
1 - 25 av 25
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Causevic, Aida
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Ashjaei, Seyed Mohammad Hossein
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Ashgar, Syed Usman
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    On incorporating security parameters in service level agreements2019Ingår i: CLOSER 2019 - Proceedings of the 9th International Conference on Cloud Computing and Services Science, SciTePress , 2019, s. 48-57Konferensbidrag (Refereegranskat)
    Abstract [en]

    With development of cloud computing new ways for easy, on-demand, Internet-based access to computing resources have emerged. In such context a Service Level Agreement (SLA) enables contractual agreements between service providers and users. Given an SLA, service users are able to establish trust in that the service outcome corresponds to what they have demanded during the service negotiation process. However, an SLA provides a limited support outside of basic Quality of Service (QoS) parameters, especially when it comes to security. We find security as an important factor to be included in adjusting an SLA according to user defined objectives. Incorporating it in an SLA is challenging due to difficulty to provide complete and quantifiable metrics, thus we propose to focus on a systematic way of addressing security using the security process. In this paper we investigate ways in which security might be incorporated already in the service negotiation process and captured in an SLA. We propose a corresponding process to develop and maintain an SLA that considers both design-, and run-time. To demonstrate the approach we built upon the existing SLAC language and extend its syntax to support security. An example of a service being provided with security guarantees illustrates the concept.

  • 2.
    El Hachem, Jamal
    et al.
    Universite Pau & Pays Adour, LIUPPA, France.
    Sedaghatbaf, Ali
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    System of Systems (SoS) represent a set of independent Constituent Systems (CS) that collaborate in order to provide functionalities that they are unable to achieve independently. We consider SoS as a set of connected services that needs to be adequately protected. The integration of these independent, evolutionary and distributed systems, intensifies SoS complexity and emphasizes the behavior uncertainty, which makes an SoS security analysis a critical challenge. One of the major priorities when designing SoS, is to analyze the unknown dependencies among CS services and vulnerabilities leading to potential cyberattacks. The aim of this work is to investigate how Software Engineering approaches could be leveraged to analyze the cyberattack propagation problem within an SoS. Such analysis is essential for an efficient SoS risk assessment performed early at the SoS design phase and required to protect the SoS from possibly high impact attacks affecting its safety and security. In order to achieve our objective, we present a model-driven analysis approach, based on Bayesian Networks, a sensitivity analysis and Common Vulnerability Scoring System (CVSS) with aim to discover potential cyberattacks propagation and estimate the probability of a security failure and its impact on SoS services. W

  • 3.
    Filipovikj, Predrag
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Service Realizability Check as a Technique to Support a Service Security Assurance CaseKonferensbidrag (Refereegranskat)
  • 4. Gore, R. N.
    et al.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    In Sync with Today's Industrial System Clocks2020Ingår i: 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, Institute of Electrical and Electronics Engineers Inc. , 2020, s. 785-790Konferensbidrag (Refereegranskat)
    Abstract [en]

    Synchronization is essential for correct and consistent operation of automation systems. Synchronized devices accurately time-stamp the events and enable timely communication of messages over a communication network. In absence of a common time base, critical functions of automation systems cannot be carried out in a safe fashion. Unsynchronized systems may lead to malfunctions such as false alarms, wrong decisions and erroneous outcomes resulting into serious showstopper for plant operations. Despite technical advances in synchronization, industrial automation systems have lagged compared to telecommunication and financial services in utilization of latest synchronization technology. Thus, there is a need to investigate the adoption of synchronization in industrial networks, its current state and implementation problems. We carried out an extensive literature search in a structured way to study the evolution of synchronization in automation systems. We also investigated today's industrial automation systems and their network topologies to get insight into the synchronization techniques and mechanisms being used. As an outcome of study, the paper highlights the challenges related to synchronization in existing automation networks that need to be addressed in the immediate and short-term future. 

  • 5.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Monitoring for Securing Clock Synchronization2018Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    In today's society, more and more embedded computer systems are connecting. There are many different types of embedded systems including industrial networks, Internet of Things (IoT), distributed control systems, connected vehicles, etc. Most such cyber-physical systems (CPS), regardless of their specifics, have a communication part that enables data exchange between system entities and external entities. Today, many commercial systems adopt heterogeneous solutions including a combination of wired and wireless communication. Using both technologies together brings benefits in terms of flexibility and reliability, but it also imposes new challenges, such as maintaining system security. Security of connected CPS therefore becomes paramount to address.

    One of the most critical properties of CPS is related to timing, as the vast majority of all CPS have real-time requirements due to interaction with a physical process, and communication therefore follows some kind of schedule with deadlines. In time-triggered networks, transmissions occur at pre-defined instants in time, but also in event-driven communication, data usefulness can be based on a timestamp, and consequently, to judge data validity and order of events, nodes need to interpret the received timestamp based on its own time. Both implementations make clock synchronization an essential network asset. Therefore, the first step in securing CPS is an investigation of ways to break clock synchronization. The next step is development of a solution that allows detection of malicious influence in the system and mitigates its consequences.

    In this thesis, a threat model and a vulnerability analysis of clock synchronization is built upon IEEE 1588, a standard widely used in industry for establishing and maintaining clock synchronization. As a mitigation strategy, a distributed monitoring solution is proposed to detect if an adversary is influencing clock synchronization in the network. The monitor strategy is based on dynamic rules for switching between different network states: no adversary present, quarantine mode and attack detected. Next, game theory is used to investigate the interaction between an adversary and the monitor. Furthermore, the time chase between an adversary and the monitor is examined to see how the monitor strategy influences the outcome of the adversary actions. Safety and security interaction is also considered to see which implications the proposed security solution has on the safety domain. Finally, the monitoring approach is abstracted and analyzed for different estimations of channel reliability to investigate the applicability of the solution in different settings, and as a result a methodology for black channel state manager design is presented.

    Ladda ner fulltext (pdf)
    fulltext
  • 6.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Securing Clock Synchronization in Industrial Heterogeneous Networks2016Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Today, wireless solutions for industrial networks are becoming more and more appealing since they increase flexibility and enable the use of additional wireless sensors, but also bring such advantages as mobility and weight reduction. Wired networks, on the other hand, are reliable and, more importantly, already existing in most distributed control loops. Heterogeneous networks consisting of wireless as well as wired sub-networks are gaining attention as such networks combine the advantages of both approaches. However, wireless communication links are more vulnerable to security breaches because of their broadcast nature. For this reason, industrial heterogeneous networks require a new type of security solutions, since they have different system assets and security objectives. This thesis aims to secure industrial heterogeneous networks. Such networks have real-time requirements due to interaction with some physical process, and thus have a schedule with one or more deadlines for data delivery in order to comply with the timing requirements of the application. The necessity to follow the schedule implies that all network participants should share the same notion of time and be synchronized. This fact makes clock synchronization a fundamental asset for industrial networks. The first step towards developing a security framework for industrial heterogeneous networks with real-time requirements is therefore to investigate ways of breaching clock synchronization. Once the vulnerabilities of this asset have been identified, the next step is to propose solutions to detect malicious attacks and mitigate their influence. The thesis provides a vulnerability analysis of the asset synchronization based on the widely deployed IEEE 1588 standard, and identifies a possibility to break clock synchronization through a combination of a man-in-the-middle attack and a delay attack. This attack is appealing to an adversary as it can target any network requiring synchronization. Next, several mitigation techniques, such as a relaxed synchronization condition mode, delay bounding and using knowledge of existing environmental conditions, are identified, making the network more resilient against these kinds of attacks. Finally, a network monitor aiming to detect anomalies introduced by the adversary performing attacks targeting clock synchronization is proposed as a mean to detect the delay attack. 

    Ladda ner fulltext (pdf)
    fulltext
  • 7.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Towards security case run-time adaptation by system decomposition into services2018Ingår i: Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Institute of Electrical and Electronics Engineers Inc. , 2018, s. 4102-4108Konferensbidrag (Refereegranskat)
    Abstract [en]

    For interconnected and complex systems, security is paramount for establishing trust in their correctness and design adequacy. Thus, security needs to be assured and a corresponding security assurance case needs to be presented to system stakeholders, security assessors, as well as to system users. However, security is dynamic by its nature and to maintain its acceptable security level, frequent updates might be required. Traditionally, a security assurance case is built from scratch whenever a change occurs, however given the cost of resources needed for such a task, a more effective and less time consuming way of handling updates is needed. Hence, the challenge of security case run-time adaptation is considered in this work. We survey the state of the art in security assurance and security case development to refine the challenge and identify system decomposition as one the enablers for security case run-time adaptation. We propose to apply system decomposition in terms of services and use service choreographies to facilitate security case run-time adaptation. The proposed approach is illustrated on an E-gas example.

  • 8.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hänninen, Kaj
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Thane, Henrik
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Hansson, Hans
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A Systematic Way to Incorporate Security in Safety Analysis2018Ingår i: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018, Luxembourg, Luxemburg, 2018, s. 166-171Konferensbidrag (Refereegranskat)
    Abstract [en]

    Today's systems are being built to connect to public or semi-public networks, are able to communicate with other systems, e.g., in the context of Internet-of-Things (IoT), involve multiple stakeholders, have dynamic system reconfigurations, and operate in increasingly unpredictable environments. In such complex systems, assuring safety and security in a continuous and joint effort is a major challenge, not the least due to the increasing number of attack surfaces arising from the increased connectivity. In this paper we present an approach that aims to bridge the gap between safety and security engineering. The potential of the approach is illustrated on the example of E-gas system, discussing the cases when unintentional faults as well as malicious attacks are taken into consideration when assuring safety of the described system. 

  • 9.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Clock Synchronization Considerations in Security Informed Safety Assurance of Autonomous Systems of Systems2017Ingår i: IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, s. 8385-8390Konferensbidrag (Refereegranskat)
    Ladda ner fulltext (pdf)
    fulltext
  • 10.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    El Hachem, J.
    Université Pau and Pays Adour, LIUPPA, Pau, France.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Investigating attack propagation in a SoS via a service decomposition2019Ingår i: Proceedings - 2019 IEEE World Congress on Services, SERVICES 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, s. 9-14Konferensbidrag (Refereegranskat)
    Abstract [en]

    A term systems of systems (SoS) refers to a setup in which a number of independent systems collaborate to create a value that each of them is unable to achieve independently. Complexity of a SoS structure is higher compared to its constitute systems that brings challenges in analyzing its critical properties such as security. An SoS can be seen as a set of connected systems or services that needs to be adequately protected. Communication between such systems or services can be considered as a service itself, and it is the paramount for establishment of a SoS as it enables connections, dependencies, and a cooperation. Given that reliable and predictable communication contributes directly to a correct functioning of an SoS, communication as a service is one of the main assets to consider. Protecting it from malicious adversaries should be one of the highest priorities within SoS design and operation. This study aims to investigate the attack propagation problem in terms of service-guarantees through the decomposition into sub-services enriched with preconditions and postconditions at the service levels. Such analysis is required as a prerequisite for an efficient SoS risk assessment at the design stage of the SoS development life cycle to protect it from possibly high impact attacks capable of affecting safety of systems and humans using the system.

  • 11.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Girs, Svetlana
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    The Challenge of Safety Tactics Synchronization for Cooperative Systems2019Ingår i: International workshop on Interplay of Security, Safety and System/Software Architecture ISSA-2018, 2019, s. 50-58Konferensbidrag (Refereegranskat)
    Abstract [en]

    Given rapid progress in integrating operational and industrial technologies and recent increase in the level of automation in safety-related systems, cooperative cyber-physical systems are emerging in a self-contained area requiring new approaches for addressing their critical properties such as safety and security. The notion of tactics is used to describe a relation between a system input and its corresponding response. Cooperative functionalities often rely on wireless communication and incoherent behavior of different wireless channels makes it challenging to achieve harmonization in deployment of systems' tactics. In this work we focus on safety tactics for cooperative cyber-physical systems as a response to inputs related to both safety and security, i.e., we are interested in security informed safety, and formulate a challenge of synchronization of safety tactics between the cooperating systems. To motivate the requirement on such synchronization we consider a car platoon, i.e., a set of cooperative vehicles, as an example and illustrate possible hazards arising from unsynchronized tactics deployment.

  • 12.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Gutiérrez, Marina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Steiner, Wilfried
    TTTech Computertechnik AG, Austria.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Dobrin, Radu
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Protecting Clock Synchronization: Adversary Detection through Network Monitoring2016Ingår i: Journal of Electrical and Computer Engineering, ISSN 2090-0147, E-ISSN 2090-0155, artikel-id 6297476Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Today, industrial networks are often used for safetycritical applications with real-time requirements. The architecture of such applications usually has a time-triggered nature that has message scheduling as a core property. Real-time scheduling can be applied only in networks where nodes share the same notion of time, i.e., they are synchronized. Therefore, clock synchronization is one of the fundamental assets of industrial networks with real-time requirements. However, standards for clock synchronization, i.e., IEEE 1588, do not provide the required level of security. This raises the question about clock synchronization protection. In this paper we identify a way to break synchronization based on the IEEE 1588 standard by conducting a man-in-the-middle (MIM) attack followed by a delay attack. MIM attack can be accomplished through e.g., Address Resolution Protocol (ARP) poisoning. Using AVISPA tool we evaluate the potential to perform an ARP poisoning attack. Next, an analysis of the consequences of introducing delays is made, showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding and using knowledge of environmental conditions, can be made to make the network more robust/resilient against these kinds of attacks. Lastly, network monitoring is proposed as a technique to detect anomalies introduced by an adversary performing attacks targeting clock synchronization. The monitoring capabilities are added to the network using a Configuration Agent, which, based on data obtained from the network, is able to detect an attack. The main contribution of the paper is a detailed problem description and evaluation of a security vulnerability in IEEE 1588 against delay attacks together with an evaluation of several approaches as possible mitigation techniques for the attack.

  • 13.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Sljivo, Irfan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Safety and Security Co-Analyses: A Systematic Literature Review2019Ingår i: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 13, nr 3, s. 2189-2200Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Latest technological trends lead toward systems connected to public networks even in critical domains. Bringing together safety and security work is becoming imperative, as a connected safety-critical system is not safe if it is not secure. The main objective of this study is to investigate the current status of safety and security co-analysis in system engineering by conducting a systematic literature review. The steps of the review are the following: the research questions identification; agreement upon a search string; applying the search string to chosen databases; a selection criterion formulation for the relevant publications filtering; selected papers categorization and analysis. We focused on the early system development stages and identified 33 relevant publications categorized as follows: combined safety and security approaches that consider the mutual influence of safety and security; safety-informed security approaches that consider influence of safety on security; and security-informed safety approaches that consider influence of security on safety. The results showed that a number of identified approaches are driven by needs in fast developing application areas, e.g., automotive, while works focusing on combined analysis are mostly application area independent. Overall, the study shows that safety and security co-analysis is still a developing domain.

    Ladda ner fulltext (pdf)
    fulltext
  • 14.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, E.
    Halmstad University, Halmstad, Sweden.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Towards secure wireless TTEthernet for industrial process automation applications2014Ingår i: 19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014, 2014, s. Article number 7005310-Konferensbidrag (Refereegranskat)
    Abstract [en]

    TTEthernet is a communication platform which builds on Ethernet, but extends it to include fault-tolerance and real-time mechanisms. The existing TTEthernet technology is developed for wired networks. A natural step for improving and extending the current application field is the introduction of a mixed wired and wireless network. However, this step requires research both about possible adaptation of existing systems as well as implementation of new technologies. A central research question is the security aspects of real-time sensor networks using wired and wireless technologies based on TTEthernet. In this paper, we identify and classify the most important aspects to consider in order to provide secure communications in such safety-critical industrial applications and propose a potential solution to address identified issues.

  • 15.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Steiner, W.
    TTech Computertecnik AG, Vienna, Austria.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Game theory applied to secure clock synchronization with IEEE 15882016Ingår i: IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    Industrial applications usually have real-time requirements or high precision timing demands. For such applications, clock synchronization is one of the main assets that needs to be protected against malicious attacks. To provide sufficient accuracy for distributed time-critical applications, appropriate techniques for preventing or mitigating delay attacks that breach clock synchronization are needed. In this paper, we apply game theory to investigate possible strategies of an adversary, performing attacks targeting clock synchronization on the one hand and a network monitor, aiming to detect anomalies introduced by the adversary on the other. We investigate the interconnection of payoffs for both sides and propose the quarantine mode as a mitigation technique. Delay attacks with constant, linearly increasing, and randomly introduced delays are considered, and we show how the adversary strategy can be estimated by evaluating the detection coefficient, giving the network monitor the possibility to deploy appropriate protection techniques.

  • 16.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Steiner, Wilfried
    TTTech Computertechnik AG, Austria.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    A Survey of Security Frameworks Suitable for Distributed Control Systems2015Ingår i: International Conference on Computing and Network Communications CoCoNet'15, 2015, s. 205-211Konferensbidrag (Refereegranskat)
    Abstract [en]

    Nowadays distributed control systems have become more and more common and important in everyday life. However, as many distributed control systems become mobile, wireless, autonomous, ubiquitous and connected, the need for secure communication is imminent. In particular, the need for a general security framework with sufficiently flexible structure, and applicable for various use cases, emerges. Especially this applies to control system based on heterogeneous networks consisting of a wired and a wireless parts. Wired networks are nowadays often connected to Internet and thereby more exposed to potential attackers, and wireless networks are, by nature, more vulnerable to eavesdropping, jamming and hijacking. In this paper we define a scope of use cases based on distributed control, together with requirements for evaluating existing security solutions and frameworks. In addition, several frameworks, mainly from the area of industrial automation, are surveyed and evaluated based on the identified use cases and security requirements.

  • 17.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Steiner, Wilfried
    TTTech Computertechnik AG, Austria.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Risk Evaluation of an ARP Poisoning Attack on Clock Synchronization for Industrial Applications2016Ingår i: Proceedings of the IEEE International Conference on Industrial Technology, 2016, Vol. may, s. 872-878, artikel-id 7474866Konferensbidrag (Refereegranskat)
    Abstract [en]

    Nowadays, mixed wireless and wired networks are used everywhere in everyday life, including in industry where they often support time-critical applications. Industrial applications with high precision requirements are subject to real-time constraints, and thus one of the main assets, regardless of application area, is clock synchronization. Considering such networks, synchronization is the first thing to secure against a possible malicious adversary. In this paper, we consider ARP poisoning as a possible technique to disrupt clock synchronization and evaluate the effects of such an attack on the IEEE 1588 standard. We describe possible ways of performing ARP poisoning to disrupt synchronization and survey several mitigation techniques and their applicability within the industrial application area.

  • 18.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Monitoring of Clock Synchronization in Cyber-Physical Systems: A Sensitivity Analysis2017Ingår i: International Conference on Internet of Things, Embedded Systems and Communications 2017 IINTEC 2017, 2017, s. 134-139Konferensbidrag (Refereegranskat)
    Abstract [en]

    Clock synchronization is a core asset to protect when securing cyber-physical systems with a time-triggered architecture. One of the most challenging attacks to protect against is a delay attack, where an adversary delays one of the synchronization messages, making node offset calculations incorrect for keeping clocks synchronized. One way to detect a breach of clock synchronization is by monitoring the offsets calculated in a node according to the clock synchronization algorithm. The analysis in this work assumes that the distributed nodes need to share the same notion of time and for this reason, uses the IEEE 1588 standard. Using this approach, a monitor needs to make a decision about if and when a node is under attack, in which case rules and methods for decision making should be put in place. There are many aspects to consider when setting thresholds for the monitored values in order to make such a decision. In this work we conduct an analysis of monitor indicators and an investigation of their applicability. Further, we identify dependencies within the proposed monitoring approach and conduct a sensitivity analysis of the parameters needed to make a decision about a system being under attack. The analysis outcomes allow to identify important parameters to consider while thresholding indicators and enables a greater generality in their applicability.

    Ladda ner fulltext (pdf)
    fulltext
  • 19.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Mats, Björkman
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Delay attack versus clock synchronization - A time chase2017Ingår i: Proceedings of the IEEE International Conference on Industrial Technology, 2017, s. 1136-1141Konferensbidrag (Refereegranskat)
    Abstract [en]

    Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching between Normal, Quarantine or Attack Detected states. Further, we propose a way to define thresholds for decision-making based on theoretical analysis of the indicator values influenced by an attack. In addition, we formulate the problem of adversary influence detection in the network as a detection theory problem and use it to derive an additional indicator for the network monitor. Finally, we analyze the time chase between the monitor and an adversary to investigate which factors influence the final outcome. 

    Ladda ner fulltext (pdf)
    fulltext
  • 20.
    Lisova, Elena
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Uhlemann, Elisabeth
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Åkerberg, Johan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Steiner, Wilfried
    TTTech Computertechnik AG, Austria.
    Björkman, Mats
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Game Theory Applied to Secure Clock Synchronization with IEEE 15882016Rapport (Övrigt vetenskapligt)
  • 21.
    Mubeen, Saad
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Feljan, Aneta Vulgarakis
    Ericsson Res, Stockholm, Sweden..
    A Perspective on Ensuring Predictability in Time-critical and Secure Cooperative Cyber Physical Systems2019Ingår i: 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), IEEE , 2019, s. 1379-1384Konferensbidrag (Refereegranskat)
    Abstract [en]

    Recent advancement in the development of embedded systems and in the integration of operational and industrial technologies has accelerated the progress of cyber-physical systems (CPSs) development. Cooperation of such systems allows to achieve new functionalities. However, often these systems are time-critical; hence, the developers of these systems are required to provide guarantees of the systems' properties, such as predictability and security. In this paper, we start by glancing through the research devoted to developing time predictable and secure embedded systems. Thereon, we extend the discussion to time-critical and secure CPSs and point out the challenges related to ensuring predictability during their development. In this context, we emphasize the importance of security as a prerequisite for time predictability. Moreover, we identify the gaps in the state of the art and describe our view on ensuring predictability in time-critical and secure CPSs.

  • 22.
    Steiner, Wilfried
    et al.
    TTTech Computertechnik AG, Austria.
    Gutiérrez Peón, Pablo
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system. TTTech Computertechnik AG, Austria.
    Gutiérrez, Marina
    TTTech Computertechnik AG, Austria.
    Mehmed, Ayhan
    TTTech Computertechnik AG, Austria.
    Rodriguez-Navas, Guillermo
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Pozo Pérez, Francisco Manuel
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Next Generation Real-Time Networks Based on IT Technologies2016Ingår i: 21st IEEE Conference on Emerging Technologies and Factory Automation ETFA'16, 2016, s. Article number 7733580-Konferensbidrag (Refereegranskat)
    Abstract [en]

    Ethernet-based networks have found their way into industrial communication more than a decade ago. However, while industry and academia developed Ethernet variants to also meet real-time and fault-tolerant requirements, recent standardization efforts within the IEEE 802 will broadly bring standard IT switched Ethernet in future industrial communication networks. As first standards of IEEE 802.1 time-sensitive networking (TSN) are becoming published at the time of this writing, we review these standards and formulate further research challenges that still go beyond current standard developments. Furthermore, we report on recent research results from the RetNet project that target these research challenges.

  • 23.
    Surkovic, Amer
    et al.
    Mälardalens högskola.
    Hanic, Dzana
    Mälardalens högskola.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Aida
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Wenslandt, David
    Knightec AB, Sweden.
    Falk, Carl
    Knightec AB, Sweden.
    Towards Attack Models in Autonomous Systems of Systems2018Ingår i: 2018 13th System of Systems Engineering Conference, SoSE 2018, 2018, s. 583-585, artikel-id 8428701Konferensbidrag (Refereegranskat)
  • 24.
    Šljivo, Irfan
    et al.
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Afshar, Sara
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Agent-centred Approach for Assuring Ethics in Dependable Service Systems2017Ingår i: 13th IEEE World Congress on Services SERVICES 2017, 2017, s. 51-58, artikel-id 8036721Konferensbidrag (Refereegranskat)
    Abstract [en]

    As the world enters the information era, more and more dependable services controlling and even making our decisions are moved to the ubiquitous smart devices. While various standards are in place to impose the societal ethical norms on decision-making of those devices, the rights of the individuals to satisfy their own moral norms are not addressed with the same scrutiny. Hence, the right of the individuals to reason on their own and evaluate morality of certain decisions is at stake, as many decisions are outsourced from the user to the service providers and third party stakeholders without the user's full awareness of all the aspects of those decisions. In this work we propose an agent-centred approach for assuring ethics in dependable technological service systems. We build upon assurance of safety and security and propose the notion of ethics assurance case as a way to assure that individual users have been made aware of all the ethically challenging decisions that might be performed or enabled by the service provider. We propose a framework for identifying and categorising ethically challenging decisions, and documenting the ethics assurance case. We apply the framework on an illustrative example.

  • 25. Šurković, A.
    et al.
    Hanić, D.
    Lisova, Elena
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Causevic, Adnan
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Lundqvist, Kristina
    Mälardalens högskola, Akademin för innovation, design och teknik, Inbyggda system.
    Wenslandt, D.
    Knightec AB, Västerås, Sweden.
    Falk, C.
    Knightec AB, Västerås, Sweden.
    Incorporating attacks modeling into safety process2018Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag , 2018, Vol. 11094, s. 31-41Konferensbidrag (Refereegranskat)
    Abstract [en]

    Systems of systems (SoS) are built as a collection of systems capable of fulfilling their own function, as well as contributing to other functionalities. They are expected to increase production efficiency and possibly decrease human involvement in harmful environments, and in many cases such systems are safety-critical. For SoS it is a paramount to provide both safety and security assurance. It is not sufficient to analyze and provide assurance of these properties independently due to their mutual connection. Hence, a joint effort addressing safety and security that provides joint guarantees on both properties, is required. In this paper we provide a safety and security assurance argument by incorporating an adversary point of view, and identify potential failures coming from the security domain that might lead to an already identified set of hazards. In this way system assets, vulnerabilities and ways to exploit them can be assessed. As an outcome mitigation strategies coming from security considerations can be captured by the safety requirements. The approach is illustrated on an autonomous quarry.

1 - 25 av 25
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf