-
Cyber-Physical Systems Security: a Systematic Map** Study
Authors:
Yuriy Zacchia Lun,
Alessandro D'Innocenzo,
Ivano Malavolta,
Maria Domenica Di Benedetto
Abstract:
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic map** study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118…
▽ More
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic map** study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.
△ Less
Submitted 31 May, 2016;
originally announced May 2016.
-
Link Failure Detection in Multi-hop Control Networks
Authors:
Alessandro D'Innocenzo,
Maria Domenica Di Benedetto,
Emmanuele Serra
Abstract:
A Multi-hop Control Network (MCN) consists of a plant where the communication between sensors, actuators and computational unit is supported by a wireless multi-hop communication network, and data flow is performed using scheduling and routing of sensing and actuation data. We characterize the problem of detecting the failure of links of the radio connectivity graph and provide necessary and suffi…
▽ More
A Multi-hop Control Network (MCN) consists of a plant where the communication between sensors, actuators and computational unit is supported by a wireless multi-hop communication network, and data flow is performed using scheduling and routing of sensing and actuation data. We characterize the problem of detecting the failure of links of the radio connectivity graph and provide necessary and sufficient conditions on the plant dynamics and on the communication protocol. We also provide a methodology to \emph{explicitly} design the network topology, scheduling and routing of a communication protocol in order to satisfy the above conditions.
△ Less
Submitted 26 August, 2011;
originally announced August 2011.
-
Arenas of Finite State Machines
Authors:
Giordano Pola,
Maria D. Di Benedetto,
Elena De Santis
Abstract:
Finite state machines are widely used as a sound mathematical formalism that appropriately describes large scale, distributed and complex systems. Multiple interactions of finite state machines in complex systems are well captured by the notion of non-flat systems. Non--flat systems are "finite state machines" where each "state" can be either a basic state or an aggregate of finite state machines.…
▽ More
Finite state machines are widely used as a sound mathematical formalism that appropriately describes large scale, distributed and complex systems. Multiple interactions of finite state machines in complex systems are well captured by the notion of non-flat systems. Non--flat systems are "finite state machines" where each "state" can be either a basic state or an aggregate of finite state machines. By expanding a non-flat system, a flat system is obtained which is an ordinary finite state machine. In this paper we introduce a novel class of non--flat systems called Arena of Finite State Machines (AFSM). AFSMs are collections of finite state machines that interact concurrently through a communication network. We propose a notion of compositional bisimulation that allows checking bisimulation equivalence of AFSMs by directly exploiting their communication networks and hence, without the need of expanding the AFSMs to finite state machines. Compositional bisimulation allows a computational complexity reduction when checking bisimulation equivalence of AFSMs, as formally quantified in the paper. An application of the proposed framework to the regulation of gene expression in the bacterium Escherichia coli is also presented.
△ Less
Submitted 11 December, 2011; v1 submitted 1 June, 2011;
originally announced June 2011.
-
Hide-and-Seek with Directional Sensing
Authors:
Alessandro Borri,
Shaunak D. Bopardikar,
Joao P. Hespanha,
Maria D. Di Benedetto
Abstract:
We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the plane. The searcher is a mobile agent, and whenever it physically visits a sensor, the sensor returns a random direction, corresponding to a half-plane in which the hidden object is loc…
▽ More
We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher, who wishes to reach the object by querying sensors placed in the plane. The searcher is a mobile agent, and whenever it physically visits a sensor, the sensor returns a random direction, corresponding to a half-plane in which the hidden object is located. We first present a novel search heuristic and characterize bounds on the expected distance covered before reaching the object. Next, we model this game as a large-dimensional zero-sum dynamic game and we apply a recently introduced randomized sampling technique that provides a probabilistic level of security to the hider. We observe that, when the randomized sampling approach is only allowed to select a very small number of samples, the cost of the heuristic is comparable to the security level provided by the randomized procedure. However, as we allow the number of samples to increase, the randomized procedure provides a higher probabilistic security level.
△ Less
Submitted 7 April, 2011;
originally announced April 2011.