Trust-but-Verify in Cyber-Physical Systems
暂无分享,去创建一个
Cyber-physical systems span a wide spectrum, from long-lived legacy systems to more modern installations. Trust is an issue that arises across the spectrum, albeit with different variants of goals and constraints. On the one end of the spectrum, legacy systems are characterized by function-based designs in which trust is an implicitly in-built concept -- the operation is historically designed, implemented, and optimized in a benign stance with respect to intended use. On the other end of the spectrum, modern systems are characterized by offerings from manufacturers, vendors, and system installers -- the devices and deployments use a variety of security features that offer promises of increased trust. All along this spectrum of cyber-physical systems, extending trust beyond the traditional cyber portions to the arteries that connect the physical portions to the cyber portions is a major challenge. Here, we identify a Trust-but-Verify approach that spans this spectrum in addressing trust.
[1] Hamid Sharif,et al. A Novel Vetting Approach to Cybersecurity Verification in Energy Grid Systems , 2020, 2020 IEEE Kansas Power and Energy Conference (KPEC).
[2] Srikanth B. Yoginath,et al. Detecting Sensors and Inferring their Relations at Level-0 in Industrial Cyber-Physical Systems , 2019, 2019 IEEE International Symposium on Technologies for Homeland Security (HST).
[3] Philip Irminger,et al. On the Effectiveness of Recurrent Neural Networks for Live Modeling of Cyber-Physical Systems , 2019, 2019 IEEE International Conference on Industrial Internet (ICII).