Advertisement

A Security Framework for Systems-of-Systems

  • Dhiah el Diehn I. Abou-Tair
  • Sahel Alouneh
  • Ala Khalifeh
  • Roman Obermaisser
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

Systems of systems have been used recently in many complex scenarios to simplify network communication, resources allocation and management. Given the dynamic and heterogeneous nature of systems of systems, providing security in such an environment is challenging and requires significant management and processing resources. In this paper, a security framework based on the Multi-Label Switching Protocol is proposed, which not only provides the network with connectivity, reliability and Quality of Service, but also adds several security features such as traffic separation and isolation with minimal management and configuration overhead. Furthermore, a more advanced security configuration based on the integration of IPsec and Multi-Label Switching Protocol is proposed.

Keywords

Systems of Systems Security framework MPLS 

Notes

Acknowledgments

The authors acknowledge the financial support of the Deanship of Scientific Research at the German Jordanian University for the presented work in this paper.

References

  1. 1.
    Kennedy, M., Llewellyn-Jones, D., Shi, Q., Merabti, M.: System-of-systems security: a survey. In: The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 21–22 June 2010Google Scholar
  2. 2.
    Chiprianov, V., Gallon, L., Munier, M., Aniorte, P., Lalanne, V.: Challenges in security engineering of systems-of-systems. In: Conference de l’Ingenierie Logiciel (CIEL), Paris, France (2014)Google Scholar
  3. 3.
    Ruiz, J.F., Rudolph, C., Maña, A., Arjona, M.: A security engineering process for systems of systems using security patterns. In: 2014 IEEE International Systems Conference Proceedings, pp. 8–11, March 2014Google Scholar
  4. 4.
    Belloir, N., Chiprianov, V., Ahmad, M., Munier, M., Gallon, L., Bruel, J.-M.: Using relax operators into an MDE security requirement elicitation process for systems of systems. In: Proceedings of the 2014 European Conference on Software Architecture Workshops (ECSAW 2014), Article 32, p. 4. ACM, New York (2014)Google Scholar
  5. 5.
    Agrawal, D.: A new schema for security in dynamic uncertain environments. In: 2009 IEEE Sarnoff Symposium, pp. 1–5. IEEE (2009)Google Scholar
  6. 6.
    Trivellato, D., Zannone, N., Etalle, S.: Poster: protecting information in systems of systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pp. 865–868. ACM, New York (2011)Google Scholar
  7. 7.
    Zhou, B., Arabo, A., Drew, O., Llewellyn-Jones, D., Merabti, M., Shi, Q., Waller, A., Craddock, R., Jones, G., Yau, A.: Data flow security analysis for system-of-systems in a public security incident. In: 3rd Conference on Advances in Computer Security and Forensics. Liverpool John-Moores University (2008)Google Scholar
  8. 8.
    Guariniello, C., DeLaurentis, D.: Communications, information, and cyber security in systems-of-systems: assessing the impact of attacks through interdependency analysis. Procedia Comput. Sci. 28, 720–727 (2014)CrossRefGoogle Scholar
  9. 9.
    Alouneh, S., Agarwal, A., En-Nouaary, A.: A novel path protection scheme for MPLS networks using multi-path routing. Comput. Netw. 53(9), 1530–1545 (2009). ISSN 1389-1286CrossRefGoogle Scholar
  10. 10.
    Lemeshko, O.V., Yeremenko, O.S., Tariki, N., Hailan, A.M.: Fault-tolerance improvement for core and edge of IP network. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), Lviv 2016, pp. 161–164 (2016)Google Scholar
  11. 11.
    Obermaisser, R., Abuteir, M., Khalifeh, A., Abou-Tair, D.D.I.: Systems-of-systems framework for providing real-time patient monitoring and care: challenges and solutions. In: International Workshop on ICTs for Improving Patients Rehabilitation Research Techniques, pp. 129–142. Springer, Heidelberg (2014)Google Scholar
  12. 12.
    Security of the MPLS Architecture, white paper, Cisco Systems, Inc. http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/mxinf_ds.pdf

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Dhiah el Diehn I. Abou-Tair
    • 1
  • Sahel Alouneh
    • 1
  • Ala Khalifeh
    • 1
  • Roman Obermaisser
    • 2
  1. 1.School of Electrical Engineering and Information TechnologyGerman Jordanian UniversityAmmanJordan
  2. 2.Chair of Embedded SystemsUniversity of SiegenSiegenGermany

Personalised recommendations