ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu

10
Issue
vol 67 / October, 2024
Article

DOI 10.17586/0021-3454-2020-63-11-1040-1045

UDC 004.056.53

FORMATION OF REQUIREMENTS FOR THE DESIGN PROCESS OF SECURE CYBER-PHYSICAL SYSTEMS

D. S. Levshun
St. Petersburg Federal Research Center of the RAS, St. Petersburg Institute for Informatics and Automation of the RAS, Laboratory of Computer Security Problems; Junior Researcher; ITMO University, Faculty of Secure Information Technologies;


Read the full article 

Abstract. An approach to formation of requirements for the design process of secure cyber-physical systems is described. This approach covers one of the stages of the design and verification methodology for such systems. During this stage, the customer's wishes are transformed into specific requirements and constraints, which determines the design process. The transformation is performed based on the formed knowledge base. As an example of the approach application, the process of forming requirements for the design of a mobile robot for an object perimeter monitoring is presented.
Keywords: security by design, cyber-physical system, customer's wishes, requirements formation

References:
  1. Levshun D.S., Kotenko I.V., Chechulin A.А. Vestnik of St. Petersburg State University of Technology and Design Series 1. Natural and technical science, 2019, no. 4, pp. 19–22. (in Russ.)
  2. Shamal Faily. Further Applications of CAIRIS for Usable and Secure Software Design. Designing Usable and Secure Software with IRIS and CAIRIS, Springer, Cham, 2018, рр. 239–254.
  3. Kobashi T., Washizaki H., Yoshioka N., Kaiya H., Okubo T., Fukazawa Y. Exploring Security in Software Architecture and Design, IGI Global, 2019, рр. 136–169.
  4. Ardeshiricham A., Hu W., Marxen J., Kastner R. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, IEEE, 2017, рр. 1691–1696.
  5. Zhang D., Wang Y., Suh G.E., Myers A.C. ACM Sigplan Notices, 2015, no. 4(50), pp. 503–516.
  6. Xu X., He B., Yang W., Zhou X., Cai Y. IEEE Transactions on Information Forensics and Security, 2015, no. 2(11), pp. 373–387.
  7. Wang B., Zhong S.M., Dong X.C. Communications in Nonlinear Science and Numerical Simulation, 2016, vol. 39, рр. 108–117.
  8. Takahashi S., Ikeda T., Shinagawa Y., Kunii T.L., Ueda M. Computer Graphics Forum, Edinburgh, UK: Blackwell Science Ltd, 1995, no. 3(14), pp. 181–192.
  9. Wang Z., Karpovsky M., Bu L. IEEE Transactions on Computers, 2015, no. 8(65), pp. 2443–2455.
  10. Scott-Hayward S. Proceedings of the 1st Conference on Network Softwarization (NetSoft), IEEE, 2015, рр. 1–5.
  11. Desnitsky V., Levshun D., Chechulin A., Kotenko I. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. JoWUA, 2016, no. 2(7), pp. 60–80.
  12. Saleem K., Derhab A., Al-Muhtadi J., Shahzad B. Computers in Human Behavior, 2015, vol. 51, рр. 977–985.
  13. Huang J., Huang C.T. International Conference on Communications (ICC), IEEE, 2011, рр. 1–5.
  14. Penas O., Plateaux R., Patalano S., Hammadi M. Computers in Industry, 2017, vol. 86, рр. 52–69.
  15. Lin Z., Yu S., Lü J., Cai S., Chen G. IEEE Transactions on Circuits and Systems for Video Technology, 2014, no. 7(25), pp. 1203–1216.
  16. Levshun D.S Chechulin A.А., Kotenko I.V. Proceedings of Telecommunication Universities, 2019, no. 4(5), pp. 114–123, DOI:10.31854/1813-324X-2019-5-4-113-122. (in Russ.)
  17. Desnitsky V., Chechulin A., Kotenko I., Levshun D., Kolomeec M. Informatics and Automation (SPIIRAS Proceedings), 2016, no. 5(48), pp. 5–31, DOI: 10.15622/sp.48.1.