Security-Aware Design Methodology and Optimization for Cyber-Physical Systems
Chung-Wei Lin, Alberto Sangiovanni-Vincentelli

Citation
Chung-Wei Lin, Alberto Sangiovanni-Vincentelli. "Security-Aware Design Methodology and Optimization for Cyber-Physical Systems". Talk or presentation, 29, October, 2014; Poster presented at the 2014 TerraSwarm Annual Meeting.

Abstract
Cyber-security attacks can cause very critical effects on cyber-physical systems, and these attacks become even more threatening as cyber-physical systems are more connected with the physical environment, surrounding infrastructures, and other systems. Security mechanisms are able to protect against attacks, but there are some challenges of applying them on cyber-physical systems, such as open environments, tight resources, strict timing requirements, and large numbers of devices. These challenges make the systems very difficult or sometimes impossible to add security mechanisms after their initial design stages without violating other system constraints. It is therefore desired to develop a systematic approach in the design stages to address security, satisfy all design constraints, and optimize design objectives. In this work, we propose a general security-aware design methodology to address security together with other design constraints. The methodology is different from a traditional one because it is accompanied with security mechanism selection which depends on both of functional models and architecture platforms. Besides security-aware mapping and security mechanism selection, the methodology can also be used for architecture selection. Based on the methodology, we consider in-vehicle communications with the Controller Area Network (CAN) protocol and a Time Division Multiple Access (TDMA) protocol and Vehicle-to-Vehicle (V2V) communications with the Dedicated Short-Range Communication (DSRC) technology. We present and solve security-aware mapping problems for these protocols. Experimental results demonstrate the trade-off between security and safety and achieve designs with all constraints satisfied.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Chung-Wei Lin, Alberto Sangiovanni-Vincentelli. <a
    href="http://www.terraswarm.org/pubs/417.html"><i>Security-Aware
    Design Methodology and Optimization for Cyber-Physical
    Systems</i></a>, Talk or presentation,  29,
    October, 2014; Poster presented at the <a
    href="http://www.terraswarm.org/conferences/14/annual"
    >2014 TerraSwarm Annual Meeting</a>.
  • Plain text
    Chung-Wei Lin, Alberto Sangiovanni-Vincentelli.
    "Security-Aware Design Methodology and Optimization for
    Cyber-Physical Systems". Talk or presentation,  29,
    October, 2014; Poster presented at the <a
    href="http://www.terraswarm.org/conferences/14/annual"
    >2014 TerraSwarm Annual Meeting</a>.
  • BibTeX
    @presentation{LinSangiovanniVincentelli14_SecurityAwareDesignMethodologyOptimizationForCyberPhysical,
        author = {Chung-Wei Lin and Alberto Sangiovanni-Vincentelli},
        title = {Security-Aware Design Methodology and Optimization
                  for Cyber-Physical Systems},
        day = {29},
        month = {October},
        year = {2014},
        note = {Poster presented at the <a
                  href="http://www.terraswarm.org/conferences/14/annual"
                  >2014 TerraSwarm Annual Meeting</a>.},
        abstract = {Cyber-security attacks can cause very critical
                  effects on cyber-physical systems, and these
                  attacks become even more threatening as
                  cyber-physical systems are more connected with the
                  physical environment, surrounding infrastructures,
                  and other systems. Security mechanisms are able to
                  protect against attacks, but there are some
                  challenges of applying them on cyber-physical
                  systems, such as open environments, tight
                  resources, strict timing requirements, and large
                  numbers of devices. These challenges make the
                  systems very difficult or sometimes impossible to
                  add security mechanisms after their initial design
                  stages without violating other system constraints.
                  It is therefore desired to develop a systematic
                  approach in the design stages to address security,
                  satisfy all design constraints, and optimize
                  design objectives. In this work, we propose a
                  general security-aware design methodology to
                  address security together with other design
                  constraints. The methodology is different from a
                  traditional one because it is accompanied with
                  security mechanism selection which depends on both
                  of functional models and architecture platforms.
                  Besides security-aware mapping and security
                  mechanism selection, the methodology can also be
                  used for architecture selection. Based on the
                  methodology, we consider in-vehicle communications
                  with the Controller Area Network (CAN) protocol
                  and a Time Division Multiple Access (TDMA)
                  protocol and Vehicle-to-Vehicle (V2V)
                  communications with the Dedicated Short-Range
                  Communication (DSRC) technology. We present and
                  solve security-aware mapping problems for these
                  protocols. Experimental results demonstrate the
                  trade-off between security and safety and achieve
                  designs with all constraints satisfied.},
        URL = {http://terraswarm.org/pubs/417.html}
    }
    

Posted by Chung-Wei Lin on 29 Oct 2014.
Groups: tools

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.