Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security-aware design for cyber-physical systems : a platform-based approach
Lin C., Sangiovanni-Vincentelli A., Springer International Publishing, New York, NY, 2017. 102 pp. Type: Book (978-3-319513-27-0)
Date Reviewed: Oct 13 2017

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we depend on them and to what extent we end up becoming an integral part of the overall attack surface.

Real-life objects blend with digital technologies to create cyber-physical systems spanning several dimensions, from transportation systems, like cars and planes, to smart grids and robotic systems, with excursions into body trackers and medical devices.

The benefits are indisputable, and cyber-physical systems have a definite potential to make our lives better and more secure. At the same time, as adoption becomes widespread, alarms emerge on related risks, where faults in safety-critical systems can result in serious consequences. From that perspective, cyber-attacks are becoming a concern, as attackers have started an aggressive campaign of exploration and exploitation of vulnerabilities, for publicity, profit, and malevolence.

Chung-Wei Lin and Alberto Sangiovanni-Vincentelli set the record straight starting from the first page of their book: they state that adding security mechanisms after the design of a cyber-physical system has been completed is very difficult, and sometimes impossible. The so-called V-model, in which architecture, design, implementation, integration, and operations are defined without consideration for security requirements, needs to evolve into a systematic approach, where security is considered from the early stages, together with all other design constraints.

This is what their book is about: providing examples of a structured methodology for security-aware design, combining mathematical abstractions with system-specific examples, offering a roadmap for adoption that is realistically rooted in current widespread implementations of cyber-physical systems.

On the practical side, this tiny yet dense publication presents the security mechanisms for the controller area network (CAN) protocol, the most used serial protocol for in-vehicle networked architectures, to protect against masquerade and replay attacks. The discussion extends to cover security-aware design for time-division multiple access (TDMA) real-time distributed systems, which present different constraints than CAN-based systems. The important role of key management strategies in providing greater security with a balanced overhead is also explained. A final section covers security-aware design for vehicle-to-vehicle (V2V) communications with the dedicated short-range communication (DSRC) technology. Key decisions are presented on the arbitration of sending rates and authentication rates, both playing dominant roles in systems performance, for safety and security.

The authors have produced an interesting book, supplemented by a very rich bibliographic section, which serves as a source for reference and increased awareness to the practitioner community.

Reviewer:  Alessandro Berni Review #: CR145588 (1712-0765)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy