Generating Client Side Policies for Cyber-Physical Safety

Cyber phyiscal systems are increasingly connected to the Internet for reasons of convenience and efficiency. However, such cyber-physical systems are exposed to new vulnerabilities since they may be compromised by an attack from the Internet. In addition to traditional network security mechanisms, such systems need additional mechanism which can prevent the exploitation of their physical vulnerabilities. We propose an architecture in which the behavior of the system can be controlled by having it generate the policies for its own protection automatically.

[1]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[2]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[3]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[4]  Alasdair Gilchrist Industry 4.0: The Industrial Internet of Things , 2016 .

[5]  Jorge Lobo,et al.  Representing and Learning Grammars in Answer Set Programming , 2019, AAAI.

[6]  Elisa Bertino,et al.  Generative policy model for autonomic management , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[7]  Ananthram Swami,et al.  The Internet of Battle Things , 2016, Computer.

[8]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[9]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[10]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.