Skip to main content

CPS-CSH Cyber-Physical Analysis and Design

  • Conference paper
Critical Information Infrastructures Security

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7722))

  • 1318 Accesses

Abstract

Existing methodologies to assess cyber-physical systems (CPSs) are hampered by their diverse nature and complexity. This paper proposes a model for cyber-physical systems design and analysis rooted in the social science approach to complex system analysis, Critical System Heuristics (CSH). The model affords an analysis at both the level of abstraction of functionality and the type of functionality within a CPS. The CPS-CSH model is developed and examples from reliability for electric smart grid systems and security for water distribution systems are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, E.: Cyber physical systems: Design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369 (May 2008)

    Google Scholar 

  2. Ulrich, W.: Beyond methodology choice: Critical systems thinking as critically systemic discourse. Journal of the Operational Research Society 54(4), 325–342 (2003)

    Article  MathSciNet  Google Scholar 

  3. Dueas-Osorio, L., Craig, J.I., Goodno, B.J.: Probabilistic response of interdependent infrastructure networks. In: Proceedings of the 2nd Annual Meeting of the Asian-pacific Network of Centers for Earthquake Engineering Research (ANCER), Honolulu, Hawaii (July 2004)

    Google Scholar 

  4. Laprie, J.C., Kanoun, K., Kaaniche, M.: Modelling interdependencies between the electricity and information infrastructures. In: Proc. of the Int’l Conf. on Computer Safety, Reliability and Security (SAFECOMP), pp. 54–67 (September 2007)

    Google Scholar 

  5. Dondossola, G., Garrone, F., Szanto, J., Fiorenza, G.: Emerging Information Technology Scenarios for the Control and Management of the Distribution Grid. In: Proc. of the 19th Int’l Conf. on Electricity Distribution (2007)

    Google Scholar 

  6. Geer, D.: Security of Critical Control Systems Sparks Concern. Computer 39(1), 20–23 (2006)

    Article  Google Scholar 

  7. Deconinck, G., Belmans, R., Driesem, J., Nauwelaers, B., Lil, E.V.: Reaching for 100% Reliable Electricity Services: Multi-system Interactions and Fundamental Solutions. In: Proc. of the DIGESEC-CRIS Workshop 2006 Influence of Distributed Generation and Renewable Generation on Power System Security, Magdeburg, Germany (December 2006)

    Google Scholar 

  8. Office of Electric Transmission and Distribution: “Grid 2030”: A National Vision for Electricity’s Second 100 Years (2003)

    Google Scholar 

  9. Kazemi, S., Fotuhi-Firuzabad, B.R.: Reliability assessment of an automated distribution system. IET Generation, Transportation and Distribution 1(2), 223–233 (2007)

    Article  Google Scholar 

  10. A summary of control system security standards activities in the energy sector. Technical report, Department of Energy, Office of Electricity Delivery and Energy Reliability, Washington, DC (2005)

    Google Scholar 

  11. Final report on workshop on future directions in cyber-physical systems security. Technical report, Department of Homeland Security (2010)

    Google Scholar 

  12. Habermas, J.: Communication and the evolution of society. Beacon, Boston, MA (1979)

    Google Scholar 

  13. Jeppesen, S.: Exploring an explicit use of the concept of sustainability in transport planning. Systemic Practice and Action Research 24(2), 133–146 (2011)

    Article  Google Scholar 

  14. Maru, Y., Woodford, K.: Enhancing emancipatory systems methodologies for sustainable development. Systemic Practice and Action Research 14(1), 61–77 (2001)

    Article  Google Scholar 

  15. Faza, A., Sedigh, S., McMillin, B.: Integrated cyber-physical fault injection for reliability analysis of the smart grid. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 277–290. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)

    Article  Google Scholar 

  17. Akella, R., Tang, H., McMillin, B.: Analysis of information flow security in cyber-physical systems. International Journal of Critical Infrastructure Protection 3-4, 157–173 (2010)

    Article  Google Scholar 

  18. Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Stealthy deception attacks on water SCADA systems. In: HSCC, pp. 161–170 (2010)

    Google Scholar 

  19. Ulrich, W.: Operational research and critical systems thinking-an integrated perspective part 1: OR as applied systems thinking. Journal of the Operational Research Society, 1–20 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fitch, D., Sedigh, S., McMillin, B., Akella, R. (2013). CPS-CSH Cyber-Physical Analysis and Design. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds) Critical Information Infrastructures Security. Lecture Notes in Computer Science, vol 7722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41485-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41485-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41484-8

  • Online ISBN: 978-3-642-41485-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics