Preview

Proceedings of Telecommunication Universities

Advanced search

Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks

https://doi.org/10.31854/1813-324X-2023-9-1-105-115

Abstract

The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includes models of hardware, software and hardware-software elements, interfaces, protocols and links between system elements, models of attacker and attack actions. The key difference of the developed model lies in the possibility of full representation of microcontroller-based systems, while other solutions have a drawback of designing such systems without taking into account the interactions of their devices with each other and other systems. In addition, the developed model is modular and extensible, aims to ensure the security of the designed solution from cyber-physical attacks, and considers security elements as an integral part of the final solution.

About the Author

D. Levshun
Saint-Petersburg Federal Research Center of the Russian Academy of Sciences
Russian Federation

St. Petersburg, Russian Federation



References

1. Levshun D., Gaifulina D., Chechulin A., Kotenko I. Problematic Issues of Information Security of Cyber-Physical Systems. Informatics and Automation. 2020;19(5):1050‒1088. (in Russ.) DOI:10.15622/ia.2020.19.5.6

2. Levshun D., Chechulin A., Kotenko I. Design lifecycle for secure cyber-physical systems based on embedded devices. Zaŝita informacii. Inside. 2017;4(76):53‒59. (in Russ.)

3. Kotenko I., Chechulin A., Levshun D. Security analysis of railway transport infrastructure on the base of analytical modeling. Zaŝita informacii. Inside. 2017;6(78):48‒57. (in Russ.)

4. Levshun D., Chechulin A., Kotenko I. A Comprehensive Model of Secure Cyber-Physical Systems for their Design and Verification. Proc. of Telecom. Universities. 2019;5(4):114–123 (in Russ.) DOI:10.31854/1813-324X-2019-5-4-114-123

5. Levshun D., Chechulin A., Kotenko I. Design of Secure Data Transfer Environment Using the I2C Protocol as an Example. Zaŝita informacii. Inside. 2018;4(82):54‒62. (in Russ.)

6. Islam J., Habiba U., Kabir H., Martuza KG., Akter F., Hafiz F., et al. Design and Development of Microcontroller Based Wireless Humidity Monitor. IOSR Journal of Electrical and Electronics Engineering. 2018;13(2):41‒46. DOI:10.9790/1676-1302034146

7. Sowah RA., Boahene DE., Owoh DC., Addo R., Mills G.A., Owusu-Banahene W., et al. Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework. Journal of Sensors. 2020;2020:1‒22. DOI:10.1155/2020/8868602

8. Tebueva F.B., Rosenko A.P., Nechvoloda V.E. Development of Methods and Software Modules Security Assessment Information of Limited Distribution. Proceedings of the Young Scientist's Third International Workshop on Trends in Information Processing, YSIP3 2019, 17‒20th September 2019, Stavropol, Russia. CEUR; 2019.

9. Mutharasu S., Divya V., Bharathi D.K., Elakkiya M.V., Janani E. Design and implementation of agrobot by using IoT. International Journal of Advance Research, Ideas and Innovations in Technology. 2019;5(2):10‒13.

10. Kovtunenko A., Bilyalov A., Valeev S. Distributed Streaming Data Processing in IoT Systems Using Multi-agent Soft-ware Architecture. Proceedings of the 18th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2018, and 11th Conference on Internet of Things, Smart Spaces, and Next Generation Networks and Systems, ruSMART 2018, 27–29 August 2018, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.11118. Cham: Springer; 2018. p.572‒583. DOI:10.1007/978-3-030-01168-0_51

11. Ceken C., Abdurahman D. Simulation Modeling of An IoT Based Cold Chain Logistics Management System. Sakarya University Journal of Computer and Information Sciences. 2019;2(2):89‒100. DOI:10.35377/saucis.02.02.598963

12. Ashouri M., Lorig F., Davidsson P., Spalazzese R. Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics. Future Internet. 2019;11(11):235. DOI:10.3390/fi11110235

13. Giménez P., Molína B. Palau C.E., Esteve M. SWE Simulation and Testing for the IoT. Proceedings of the International Conference on Systems, Man, and Cybernetics, 13‒16 October 2013, Manchester, UK. IEEE; 2013. PP. 356‒361. DOI:10.1109/SMC.2013.67

14. Andres-Maldonado P., Lauridsen M., Ameigeiras P., Lopez-Soler J.M. Analytical Modeling and Experimental Validation of NB-IoT Device Energy Consumption. IEEE Internet of Things Journal. 2019;6(3):5691‒5701. DOI:10.1109/JIOT.2019.2904802

15. Udoh S.J., Srivastava V.M. Analytical Modeling of Radio Network Performance for 5G (Non-Standalone) and It's Network Connectivity. Journal of Communications. 2020;15(12):886‒895. DOI:10.12720/jcm.15.12.886-895

16. Bhavana A., Nandha Kumar A.N. An Analytical Modeling for Leveraging Scalable Communication in IoT for Inter-Domain Routing. Proceedings of the Computational Methods in Systems and Software, CoMeSySo 2018, 12‒14 September 2018. Advances in Intelligent Systems and Computing. vol.859. Cham: Springer; 2018. p.1‒11. DOI:10.1007/978-3-030-00211-4_1

17. Hu F., Lu Y., Vasilakos A.V., Hao Q., Ma R., Patil Y., et al. Robust Cyber–Physical Systems: Concept, models, and implementation. Future Generation Computer Systems. 2016;56:449‒475. DOI:10.1016/j.future.2015.06.006

18. Penas O., Plateaux R., Patalano S., Hammadi M. Multi-scale approach from mechatronic to Cyber-Physical Systems for the design of manufacturing systems. Computers in Industry. 2017;86:52‒69. DOI:10.1016/j.compind.2016.12.001

19. Scott-Hayward S. Design and deployment of secure, robust, and resilient SDN controllers. Proceedings of the 1st Conference on Network Softwarization, NetSoft, 13‒17 April 2015, London, UK. IEEE; 2015. p.1‒5. DOI:10.1109/NETSOFT.2015.7258233

20. Hu F., Hao Q., Bao K. A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation. IEEE Communications Surveys & Tutorials. 2014;16(4):2181‒2206. DOI:10.1109/COMST.2014.2326417

21. Lin Z., Yu S., Lü J., Cai S., Chen G. Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time Secure Video Communication System. IEEE Transactions on Circuits and Systems for Video Technology. 2014;25(7):1203‒1216. DOI:10.1109/TCSVT.2014.2369711

22. NIST. National Institute of Standards and Technology. URL: https://www.nist.gov [Accessed 3rd February 2023]

23. Desnitsky V., Kotenko I., Chechulin A. Configuration-based approach to embedded device security. Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, 17‒19 October 2012, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.7531. Berlin, Heidelberg: Springer; 2012. p.270‒285. DOI:10.1007/978-3-642-33704-8_23

24. UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems. 2011. URL: https://www.omg.org/spec/MARTE/1.1/PDF [Accessed 3rd February 2023]

25. Chechulin A., Kotenko I., Desnitsky V. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, 17‒19 October 2012, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.7531. Berlin, Heidelberg: Springer; 2012. p.146‒155. DOI:10.1007/978-3-642-33704-8_13

26. CORDIS. Design of Secure and Energy-Efficient Embedded Systems for Future Internet Applications. URL: https://cordis.europa.eu/project/id/256668 [Accessed 3rd February 2023]


Review

For citations:


Levshun D. Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks. Proceedings of Telecommunication Universities. 2023;9(1):105-115. (In Russ.) https://doi.org/10.31854/1813-324X-2023-9-1-105-115

Views: 297


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)