A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems

  • Giedre SabaliauskaiteEmail author
  • Sridhar Adepu
  • Aditya Mathur
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10242)


A Six-Step Model (SSM) is proposed for modeling and analysis of Cyber-Physical System (CPS) safety and security. SSM incorporates six dimensions (hierarchies) of a CPS, namely, functions, structure, failures, safety countermeasures, cyber-attacks, and security countermeasures. The inter-dependencies between these dimensions are defined using a set of relationship matrices. SSM enables comprehensive analysis of CPS safety and security, as it uses system functions and structure as a knowledge-base for understanding what effect the failures, cyber-attacks, and selected safety and security countermeasures might have on the system. A water treatment system is used as an example to illustrate how the proposed model could serve as a useful tool in the safety and security modeling and analysis of critical infrastructures.


Cyber-Physical Systems Failures Safety Cyber-attacks Security GTST-MLD 3-Step Model 


  1. 1.
    Adepu, S., Mathur, A.: Distributed detection of single-stage multipoint cyber attacks in a water treatment plant. In: The 11th ACM Asia Conference on Computer and Communications Security, May 2016, in PressGoogle Scholar
  2. 2.
    Brissaud, F., Barros, A., Bérenguer, C., Charpentier, D.: Reliability study of an intelligent transmitter. In: 15th ISSAT International Conference on Reliability and Quality in Design, pp. 224–233. International Society of Science and Applied Technologies (2009)Google Scholar
  3. 3.
    Brissaud, F., Barros, A., Bérenguer, C., Charpentier, D.: Reliability analysis for new technology-based transmitters. Reliab. Eng. Syst. Saf. 96(2), 299–313 (2011)CrossRefGoogle Scholar
  4. 4.
    Kim, I., Modarres, M.: Application of goal tree-success tree model as the knowledge-base of operator advisory systems. Nucl. Eng. Des. 104(1), 67–81 (1987)CrossRefGoogle Scholar
  5. 5.
    Kornecki, A.J., Subramanian, N., Zalewski, J.: Studying interrelationships of safety and security for software assurance in cyber-physical systems: approach based on Bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1393–1399. IEEE (2013)Google Scholar
  6. 6.
    Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)CrossRefGoogle Scholar
  7. 7.
    Modarres, M., Roush, M., Hunt, R.: Application of goal trees for nuclear power plant hardware protection. In: Proceedings of the Eight International Conference on Structural Mechanics in Reactor Technology, Brussels, Belgium (1985)Google Scholar
  8. 8.
    Modarres, M., Cheon, S.W.: Function-centered modeling of engineering systems using the goal tree-success tree technique and functional primitives. Reliab. Eng. Syst. Saf. 64(2), 181–200 (1999)CrossRefGoogle Scholar
  9. 9.
    Novak, T., Treytl, A.: Functional safety and system security in automation systems-a life cycle model. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, pp. 311–318. IEEE (2008)Google Scholar
  10. 10.
    Piètre-Cambacédès, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (boolean logic driven markov processes). In: 2010 IEEE International Conference on Systems Man and Cybernetics (SMC), pp. 2852–2861. IEEE (2010)Google Scholar
  11. 11.
    Piètre-Cambacédès, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013)CrossRefGoogle Scholar
  12. 12.
    Simon, H.A.: The architecture of complexity. In: Proceedings of the American Philosophical Society, pp. 467–482 (1962)Google Scholar
  13. 13.
    SWaT: Secure Water Treatment Testbed (2015).
  14. 14.
    Weinberger, S.: Computer security: is this the start of cyberwarfare? Nature 174, 142–145 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Giedre Sabaliauskaite
    • 1
    Email author
  • Sridhar Adepu
    • 1
  • Aditya Mathur
    • 1
  1. 1.Singapore University of Technology and DesignSingaporeSingapore

Personalised recommendations