Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-9
Year of Publication : 2019
Authors :  Dr. Silvance Abeka
DOI :  10.14445/22312803/IJCTT-V67I9P112

MLA

MLA Style:Dr. Silvance Abeka "Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review" International Journal of Computer Trends and Technology 67.9 (2019):65-77.

APA Style Dr. Silvance Abekas. Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical ReviewInternational Journal of Computer Trends and Technology, 67(9),65-77.

Abstract
Internet of Things (IoT) is an emerging computing concept that describes a structure in which everyday physical objects, each provided with unique identifiers, are connected to the Internet without requiring human interaction. Long-term and self-sustainable operation are key components for realization of such a complex network, and entail energy-aware devices that are potentially capable of harvesting their required energy from ambient sources. Among different energy harvesting methods such as vibration, light and thermal energy extraction, wireless energy harvesting (WEHIoT) has proven to be one of the most promising solutions by virtue of its simplicity, ease of implementation and availability. In this proposed project, we present an overview of enabling technologies for efficient WEHIoT, analyze the life-time of WEH-enabled IoT devices.

Reference
[1] Sebastian B., & Stephan D. (2018).Towards a Theory of Software Development Expertise. In Proceedings of the 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Pp. 1-14.
[2] Dennis B., Guanglou Z., & Craig V. (2017). A critical analysis of security vulnerabilities and countermeasures in a smart ship system. Proceedings of the 15th Australian Information Security Management Conference. Pp.81-87.
[3] Hambling D. (2017). Ships fooled in GPS spoofing attack suggest Russian cyberweapon.
[4] National Institute of Standards and Technology. (2017). Framework for Improving Critical Infrastructure Cybersecurity. Draft Version 1.1.
[5] Hudson Analytix Inc. (2017). Global Threats: Cybersecurity in Ports (Donald Duck, Daughters & Dollars. Hemispheric Conference on Port Competitiveness & Security: Finding the Right Balance, University of Miami, Center for International; Business Education & Research. [
6] Symantec Security Response. (2017). Petya ransomware outbreak: Here?s what you need to know.
[7] Santamarta R. (2014). SATCOM terminals: Hacking by air, sea, and land.
[8] Mertens M. (2014). Securing VSAT Terminals.
[9] Arash N., & Stuart M. (2015). A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet. IEEE Transactions On Dependable And Secure Computing. Pp. 1-20.
[10] Johansson E., Sommestad T., &Ekstedt M.(2009). Issues of cyber security in scada-systems-on the importance of awareness. In 20th International Conference and Exhibition onElectricity Distribution-Part 1, IET. Pp. 1–4.
[11] Motzek A., &Möller R. (2017). Context- and bias-free probabilistic mission. Computers & Security. Vol. 65, pp. 166-186.
[12] Lange M., Kuhr F., &Möller R. (2016). Using a Deep Understanding of Network Activities for Network Vulnerability Assessment. In Proceedings of the 1st International Workshop on AI for Privacy and Security.
[13] Noel S., Ludwig J., Jain P., Johnson D., Thomas R., McFarland J., King B., Webster S., &Tello B.(2016). Analyzing Mission Impacts of Cyber Actions. In NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact, Istanbul.
[14] Mark S. (2017). Building Secure Software for Mission Critical Systems. Software Solutions Symposium. Pp. 1-50.
[15] Tobby S. (2017). Critical Infrastructure and the Internet of Things.Centre for International Governance Innovation and Chatham House. Pp. 1-20.
[16] Daugherty, Paul, Prith Banerjee, WalidNegm and Allan E. Alter. 2015. “Driving Unconventional Growth through the Industrial Internet of Things.” Accenture.
[17] Hayden E., Michael A., & Tim C. (2014). An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity. A SANS Analyst Whitepaper.
[18] Kwon J. 2015. Smoking Gun: South Korea Uncovers Northern Rival?s Hacking Codes. CNN.
[19] Vallance C. 2016. Ukraine cyber-attacks „could happen to UK. BBC.com
[20] Randy H., & Susan S.(2016). Secure Software Engineering Best Practices. NSF Cybersecurity Summit. Pp. 1-140.
[21] Georgios K., Georgios G., &Athina M. (2016). Cyber Security Trends and their implications in ICS. JRC Technical Reports.Pp.1-28.
[22] Erlingsson U. (2016). Data-driven Software Security: Models and Methods. ArXiv. Pp.1-7.
[23] Tice C., Roeder T., Collingbourne P., Checkoway S., Erlingsson U., Lozano L., and Pike G.(2014). Enforcing forward-edge control-flow integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Conference on Security Symposium, ser. SEC?14. Pp. 941–955.
[24] Katerina G., & Jacob T. (2017). Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports. IEEE 28th International Symposium on Software Reliability Engineering. Pp. 152-163.

[25] Alonso J., Grottke M., Nikora A., & Trivedi K. (2013). An empirical investigation of fault repairs and mitigations in space mission system software. In 43rd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Pp. 1–8.
[26] Cotroneo D., Grottke M., Natella R., Pietrantuono R., & Trivedi K. (2013). Fault triggers in open-source software: An experience report. In 24th IEEE International Symposium on Software Reliability Engineering (ISSRE). Pp. 178–187.
[27] Grottke M., Nikora A., & Trivedi K. (2010). An empirical investigation of fault types in space mission system software. In 40th IEEE/IFIP International Conference on Dependable Systems Networks (DSN). Pp. 447–456.
[28] Di Martino C., Kalbarczyk Z., Iyer R., Baccanico F., Fullop J., & Kramer J.(2014). Lessons learned from the analysis of system failures at petascale: The case of Blue Waters. In 44th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Pp. 610–621.
[29] Luigi B., Angelo M., & Alberto S. (2017). iAgile: Mission Critical Military Software Development. International Conference on High Performance Computing & Simulation. Pp. 545- 552.
[30] Chris W. (2017). The State Of Software Security Today. Veracode. Pp. 1-44.
[31] Arman S., Youn K., Yuriy B., Nenad M. (2018). Poster: MakingWell-Informed Software Design Decisions. ACM/IEEE 40th International Conference on Software Engineering: Companion Proceedings. Pp. 262-263.
[32] Esfahani N., Malek S., &Razavi K. (2013). GuideArch: Guiding the exploration of architectural solution space under uncertainty. In International Conference on Software Engineering (ICSE). Pp. 43–52.
[33] Langhammer M., Shahbazian A., Medvidovic N., and Reussner R. (2016). Automated extraction of rich software models from limited system information. In IEEE/IFIP Working Conference on Software Architecture (WICSA).Pp. 99–108.
[34] Aleti A., Buhnova B., Grunske L., Koziolek A., and Meedeniya I. (2013). Software architecture optimization methods: A systematic literature review. IEEE Transactions on Software Engineering (TSE).Vol. 39, Issue 5, pp.658–683.
[35] Me G., Calero C., and Lago P.(2016). Architectural patterns and quality attributes interaction. In IEEE Workshop on Qualitative Reasoning about Software Architectures (QRASA). IEEE.
[36] Shahbazian A., Edwards G., and Medvidovic N. (2016). An end-to-end domain specific modeling and analysis platform. In Proceedings of the 8th International Workshop on Modeling in Software Engineering, ACM. Vol.16, pp. 8–12.

Keywords
Remote Sensing Systems, Risk Anaysis, Body Area Networks, Supervisory Control and Data Acquisition,Industrial Control System, Cyber Physical System