DOI 10.17586/0021-3454-2020-63-11-1040-1045
UDC 004.056.53
FORMATION OF REQUIREMENTS FOR THE DESIGN PROCESS OF SECURE CYBER-PHYSICAL SYSTEMS
St. Petersburg Federal Research Center of the RAS, St. Petersburg Institute for Informatics and Automation of the RAS, Laboratory of Computer Security Problems; Junior Researcher; ITMO University, Faculty of Secure Information Technologies;
Read the full article
Abstract. An approach to formation of requirements for the design process of secure cyber-physical systems is described. This approach covers one of the stages of the design and verification methodology for such systems. During this stage, the customer's wishes are transformed into specific requirements and constraints, which determines the design process. The transformation is performed based on the formed knowledge base. As an example of the approach application, the process of forming requirements for the design of a mobile robot for an object perimeter monitoring is presented.
Keywords: security by design, cyber-physical system, customer's wishes, requirements formation
References:
References:
- Levshun D.S., Kotenko I.V., Chechulin A.А. Vestnik of St. Petersburg State University of Technology and Design Series 1. Natural and technical science, 2019, no. 4, pp. 19–22. (in Russ.)
- Shamal Faily. Further Applications of CAIRIS for Usable and Secure Software Design. Designing Usable and Secure Software with IRIS and CAIRIS, Springer, Cham, 2018, рр. 239–254.
- Kobashi T., Washizaki H., Yoshioka N., Kaiya H., Okubo T., Fukazawa Y. Exploring Security in Software Architecture and Design, IGI Global, 2019, рр. 136–169.
- Ardeshiricham A., Hu W., Marxen J., Kastner R. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, IEEE, 2017, рр. 1691–1696.
- Zhang D., Wang Y., Suh G.E., Myers A.C. ACM Sigplan Notices, 2015, no. 4(50), pp. 503–516.
- Xu X., He B., Yang W., Zhou X., Cai Y. IEEE Transactions on Information Forensics and Security, 2015, no. 2(11), pp. 373–387.
- Wang B., Zhong S.M., Dong X.C. Communications in Nonlinear Science and Numerical Simulation, 2016, vol. 39, рр. 108–117.
- Takahashi S., Ikeda T., Shinagawa Y., Kunii T.L., Ueda M. Computer Graphics Forum, Edinburgh, UK: Blackwell Science Ltd, 1995, no. 3(14), pp. 181–192.
- Wang Z., Karpovsky M., Bu L. IEEE Transactions on Computers, 2015, no. 8(65), pp. 2443–2455.
- Scott-Hayward S. Proceedings of the 1st Conference on Network Softwarization (NetSoft), IEEE, 2015, рр. 1–5.
- Desnitsky V., Levshun D., Chechulin A., Kotenko I. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. JoWUA, 2016, no. 2(7), pp. 60–80.
- Saleem K., Derhab A., Al-Muhtadi J., Shahzad B. Computers in Human Behavior, 2015, vol. 51, рр. 977–985.
- Huang J., Huang C.T. International Conference on Communications (ICC), IEEE, 2011, рр. 1–5.
- Penas O., Plateaux R., Patalano S., Hammadi M. Computers in Industry, 2017, vol. 86, рр. 52–69.
- Lin Z., Yu S., Lü J., Cai S., Chen G. IEEE Transactions on Circuits and Systems for Video Technology, 2014, no. 7(25), pp. 1203–1216.
- Levshun D.S Chechulin A.А., Kotenko I.V. Proceedings of Telecommunication Universities, 2019, no. 4(5), pp. 114–123, DOI:10.31854/1813-324X-2019-5-4-113-122. (in Russ.)
- Desnitsky V., Chechulin A., Kotenko I., Levshun D., Kolomeec M. Informatics and Automation (SPIIRAS Proceedings), 2016, no. 5(48), pp. 5–31, DOI: 10.15622/sp.48.1.