Skip to main content
Top

2023 | OriginalPaper | Chapter

Utilising Redundancy to Enhance Security of Safety-Critical Systems

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

For many safety-critical systems, implementing modern cybersecurity protection mechanisms is hindered by legacy design and high re-certification costs. Since such systems are typically designed to be highly reliable, they usually contain a large number of redundant components used to achieve fault tolerance. In this paper, we discuss challenges in utilising redundancy inherently present in the architectures of safety-critical systems to enhance system cybersecurity protection. We consider classic redundant architectures and analyse their ability to protect against cyberattacks. By evaluating the likelihood of a successful cyberattack on a redundant architecture under different implementation conditions, we conclude that redundancy in combination with diversity has better potential to be utilised for cybersecurity protection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference CENELEC - EN 50126–1. Railway Applications - The Specification and Demonstration of Reliability, Availability, Maintainability and Safety (RAMS) - Part 1: Generic RAMS Process CENELEC - EN 50126–1. Railway Applications - The Specification and Demonstration of Reliability, Availability, Maintainability and Safety (RAMS) - Part 1: Generic RAMS Process
3.
go back to reference Storey, N.: Safety-Critical Computer Systems. Addison-Wesley, Boston (1996) Storey, N.: Safety-Critical Computer Systems. Addison-Wesley, Boston (1996)
4.
go back to reference Koren, I., Mani Krishna, C.: Fault tolerant Systems, 2nd ed. Elsevier, Amsterdam (2007) Koren, I., Mani Krishna, C.: Fault tolerant Systems, 2nd ed. Elsevier, Amsterdam (2007)
5.
go back to reference de Bortoli, A., Bouhaya, L., Feraille, A.: A life cycle model for high-speed rail infra-structure: environmental inventories and assessment of the Tours-Bordeaux railway in France. Int. J. Life Cycle Assess. 25, 814–830 (2020)CrossRef de Bortoli, A., Bouhaya, L., Feraille, A.: A life cycle model for high-speed rail infra-structure: environmental inventories and assessment of the Tours-Bordeaux railway in France. Int. J. Life Cycle Assess. 25, 814–830 (2020)CrossRef
6.
go back to reference International Standard., “Industrial communication networks - Network and system se-curity - Part 3–3: System security requirements and security levels,” IEC, Edition 1.0 2013–08 International Standard., “Industrial communication networks - Network and system se-curity - Part 3–3: System security requirements and security levels,” IEC, Edition 1.0 2013–08
7.
go back to reference International Standard, “Security for industrial automation and control systems - Part 2–4: Security program requirements for IACS service providers,” IEC, Edition 1.0 2015–06 International Standard, “Security for industrial automation and control systems - Part 2–4: Security program requirements for IACS service providers,” IEC, Edition 1.0 2015–06
8.
go back to reference Amendment 1, “Security for industrial automation and control systems - Part 2–4: Security program requirements for IACS service providers,” IEC, Edition 1.0 2017–08 Amendment 1, “Security for industrial automation and control systems - Part 2–4: Security program requirements for IACS service providers,” IEC, Edition 1.0 2017–08
9.
go back to reference Oxford Dictionary of Statistics., Oxford University Press (2002) Oxford Dictionary of Statistics., Oxford University Press (2002)
10.
go back to reference Littlewood, B.: The impact of diversity upon common mode failures. Reliab. Eng. Syst. Saf. 51(1), 101–113 (1996)CrossRef Littlewood, B.: The impact of diversity upon common mode failures. Reliab. Eng. Syst. Saf. 51(1), 101–113 (1996)CrossRef
11.
go back to reference Tsoupidi, R.M., Lozano, R.C., Troubitsyna, E., Papadimitratos, P.: Securing Optimized Code Against Power Side Channels. arXiv preprint arXiv:2207.02614 Tsoupidi, R.M., Lozano, R.C., Troubitsyna, E., Papadimitratos, P.: Securing Optimized Code Against Power Side Channels. arXiv preprint arXiv:​2207.​02614
12.
go back to reference Tsoupidi, R.M., Troubitsyna, E., Papadimitratos, P.: Thwarting code-reuse and side-channel attacks in embedded systems. arXiv preprint arXiv:2304.13458 Tsoupidi, R.M., Troubitsyna, E., Papadimitratos, P.: Thwarting code-reuse and side-channel attacks in embedded systems. arXiv preprint arXiv:​2304.​13458
14.
go back to reference Littlewood, B., Strigini, L.: Redundancy and diversity in security. In: European Symposium on Research in Computer Security (2004) Littlewood, B., Strigini, L.: Redundancy and diversity in security. In: European Symposium on Research in Computer Security (2004)
15.
16.
17.
go back to reference Vistbakka, I., Troubitsyna, E.: Towards a formal approach to analysing security of safety-critical systems. In: 14th European Dependable Computing Conference (EDCC). Iasi, Romania, 2018, pp. 182–189 (2018) Vistbakka, I., Troubitsyna, E.: Towards a formal approach to analysing security of safety-critical systems. In: 14th European Dependable Computing Conference (EDCC). Iasi, Romania, 2018, pp. 182–189 (2018)
18.
go back to reference Poorhadi, E., Troubitsyna, E., Dan, G.: Analysing the impact of security attacks on safety using SysML and event-B. In: Seguin, C., Zeller, M., Prosvirnova, T. (eds.) Model-Based Safety and Assessment. IMBSA 2022. LNCS, vol. 13525. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15842-1_13 Poorhadi, E., Troubitsyna, E., Dan, G.: Analysing the impact of security attacks on safety using SysML and event-B. In: Seguin, C., Zeller, M., Prosvirnova, T. (eds.) Model-Based Safety and Assessment. IMBSA 2022. LNCS, vol. 13525. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-15842-1_​13
Metadata
Title
Utilising Redundancy to Enhance Security of Safety-Critical Systems
Author
Elena Troubitsyna
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-40953-0_16

Premium Partner