The Quintessence of Information Security of a Cyber-physical System

2018;
: pp. 58 - 68
Authors: 

Valeriy Dudykevych, GalynaMykytyn, Andrii Rebets

Department of Information Security, Lviv Polytechnic National University, S. Bandery Str., 12, Lviv, 79013, UKRAINE,
E-mail:

  1. vdudykev@polynet.lviv.ua
  2. cosmos-zirka@ukr.net
  3. a.rebets@ukr.net

The quintessence of an information security (IS) of cyber-physical systems (CPS) was presented, which is deployed on the level of complex security system (CSS) creation paradigm and conception as well as the CSS universal platform in the field “threats – profiles – tools”; it is also implemented in the part of CSS integral model of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” and cryptographic protection of CPS wireless communication environment based on block data encryption of algorithm “Kalyna”. Use of such basic approach and three-level CPS will allow creating of high effective information security technologies of each CPS segments – cyberspace (CS), communication environment (CE), physical space (PS) as well as the whole three-level structure.

  1. Proekt Stratehii kibernetychnoi bezpeky Ukrainy. – [Elektronnyi resurs]. – Rezhym dostupu: http://www.niss. gov. ua/public/File/2013_nauk_an_rozrobku/kiberstrateg. pdf.
  2. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. – Brussels, 7.2.2013. – [Online resource]. – Access at: http://www. eeas. europa. eu/archives/docs/policies/eu-cyber-security/cybsec_comm_en. pdf.
  3. General Data Protection Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. – [Online resource]. – Access at: http://ec. europa. eu/justice/dataprotection/reform/files/regulation_oj_en. pdf.
  4. Melnyk A. O. Intehratsiia rivniv kiberfizychnoi systemy /A. O. Melnyk // Visnyk Natsionalnoho universytetu “Lvivska politekhnika”, Kompiuterni systemy ta merezhi. – 2015. – No. 830. – С 61–68.
  5. Information technology. Security techniques. Evaluation criteria for IT security. Part 1–3: ISO/IEC 15408-1:2009, ISO/IEC 15408-2:2008, ISO/IEC 15408-3:2008. – [Active from 2009.01.01]. – Switzerland: ISO copyright office, 2009. – 56, 161, 150 p.
  6. Imre Horváth, Bart H. M. Gerritsen. Cyber-physical systems: concepts, technologies and implementation principles // 9th International Symposium on Tools and Methods of Competitive Engineering (TMCE), May 7 – 11, 2012, Karlsruhe, Germany.
  7. Jay Lee, Behrad Bagheri, Hung-An Kao. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems // NSF Industry/University Cooperative Research Center on Intelligent Maintenance Systems (IMS), University of Cincinnati, Cincinnati, OH, United States, 2014.
  8. Melnyk A. O. Kiber-fizychni systemy: problemy stvorennia ta napriamy rozvytku // Visnyk NU “Lvivska politekhnika”. Kompiuterni systemy ta merezhi. – 2014. – No. 806. – С. 154–161.
  9. National Institute of Standards and Technology Special Publication 800-53. – NIST SP 800-53 – 2011. – 155 р.
  10. Yuriy Zacchia Lun, Alessandro D’Innocenzo, Ivano Malavolta [and others] Cyber-Physical Systems Security: a Systematic Mapping Study // ArXiv. – 2016. – 32 p.
  11. Tianbo Lu, Jinyang Zhao, Lingling Zhao [and others] Towards a Framework for Assuring Cyber Physical System Security // International Journal of Security and Its Applications. – Vol. 9, No. 3. – 2015 – P. 25–40.
  12. Jeff Hughesa, George Cybenkob Three Tenets for Secure Cyber-Physical System Design and Assessment // Cyber Sensing. – 2014. – Vol. 9097. – 15 p.
  13. Guangyu Wu, Jian Sun, Jie Chen A survey on the security of cyber-physical systems // Control Theory and Technology. – 2016. – Vol. 14, No. 1. – P. 2–10.
  14. Information technology. Security techniques. Information security management systems. Requirements: ISO/IEC 27001:2013. – [Active from 2013.10.01]. – Switzerland: ISO copyright office, 2013. – 23 p.
  15. Francesco Regazzoni, Ilia Polian Securing the hardware of cyber-physical systems // 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). – 16–19 Jan. 2017. – P. 194–199.
  16. Space product assurance. Methods and techniques to support the assessment of software dependability and safety. – ECSS-Q-80-03, 2006. – 122 p.
  17. Information processing systems. Open Systems Interconnection. Basic Reference Model – Part 2: Security Architecture, – ISO 7498-2:1989. – 32 p.
  18. Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia: DSTU 7624: 2014. – [Chynnyi vid 2015-07-01]. – K: Derzhspozhyvstandart, 2016. – 117 с.