Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3314058.3317731acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster
Public Access

Simulation based evaluation of security and resilience in railway infrastructure

Published: 01 April 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Autonomous and connected vehicle technologies are rapidly emerging in the modern railway domain. Traditional standalone systems are now becoming more sophisticated, resulting in more distributed interfaces, and a larger attack surface. As such, there now exists a tightly coupled cyber-physical nature that makes a cyber-attack capable of not only exfiltrating sensitive data, but also manipulating safety-critical operations of the system. This manipulation can cause the train to experience unsafe conditions, potentially leading to derailments, explosions, and collisions. This makes it as important as ever to build in security and resilience at the earliest stages of design, making deployment infrastructure more safe, reliable, and predictable in a compromising environment. In this poster we demonstrate how to analyze the security and resilience of railway infrastructure by utilizing a domain specific simlation based framework. Our framework includes a simulation cluster with both transportation and network modeling capabilities, a graphical design studio to rapidly develop attack scenarios againt railway networks, and a results dashboard that includes real time visualization of various metrics. Additionally, we not only support software-in-the-loop, but have integrated a hardware-in-the-loop testbed to test realistic attacks that occur within the deployment environment. We illustrate the capabilities of our developed framework with a connected railway case study of the Washington D.C Metro rail network.

    References

    [1]
    Grafana - the open platform for analytics and monitoring. https://grafana.com/. (Accessed on 02/22/2019).
    [2]
    Veins. https://veins.car2x.org/. (Accessed on 02/04/2019).
    [3]
    M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz. Sumo-simulation of urban mobility. In The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, volume 42, 2011.
    [4]
    B. Chen, C. Schmittner, Z. Ma, W. G. Temple, X. Dong, D. L. Jones, and W. H. Sanders. Security analysis of urban railway systems: the need for a cyber-physical perspective. In International Conference on Computer Safety, Reliability, and Security, pages 277--290. Springer, 2014.
    [5]
    M. Maróti, R. Kereskényi, T. Kecskés, P. Völgyesi, and A. Lédeczi. Online collaborative environment for designing complex computational systems. Procedia Computer Science, 29:2432--2441, 2014.
    [6]
    S. N. Z. Naqvi, S. Yfantidou, and E. Zimányi. Time series databases and influxdb. Studienarbeit, Université Libre de Bruxelles, 2017.
    [7]
    H. Neema, B. Potteiger, X. Koutsoukos, C. Tang, and K. Stouffer. Metrics-driven evaluation of cybersecurity for critical railway infrastructure. In 2018 Resilience Week (RWS), pages 155--161. IEEE, 2018.
    [8]
    A. Varga and R. Hornig. An overview of the omnet++ simulation environment. In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, page 60. ICST (Institute for Computer Sciences, Social-Informatics and âĂę, 2008.

    Cited By

    View all
    • (2021)Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30480479(4797-4819)Online publication date: 2021

    Index Terms

    1. Simulation based evaluation of security and resilience in railway infrastructure

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        HotSoS '19: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security
        April 2019
        149 pages
        ISBN:9781450371476
        DOI:10.1145/3314058
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Sponsors

        • National Security Agency: National Security Agency

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 April 2019

        Check for updates

        Author Tags

        1. cyber-physical systems
        2. hardware-in-the-loop
        3. railway
        4. resiliency
        5. simulation based design

        Qualifiers

        • Poster

        Funding Sources

        Conference

        HotSoS
        Sponsor:
        • National Security Agency
        HotSoS: Hot Topics in the Science of Security Symposium
        April 1 - 3, 2019
        Tennessee, Nashville, USA

        Acceptance Rates

        Overall Acceptance Rate 34 of 60 submissions, 57%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)47
        • Downloads (Last 6 weeks)6

        Other Metrics

        Citations

        Cited By

        View all
        • (2021)Software Verification and Validation of Safe Autonomous Cars: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30480479(4797-4819)Online publication date: 2021

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media