kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Employing Redundancy to Leverage Cybersecurity Protection of Safety-Critical Systems
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0009-0000-3916-1707
2023 (English)In: Proceedings - 2023 10th International Conference on Dependable Systems and Their Applications, DSA 2023, Institute of Electrical and Electronics Engineers (IEEE) , 2023, p. 282-287Conference paper, Published paper (Refereed)
Abstract [en]

Safety-critical systems become increasingly open and interconnected, which makes them a target of various cyberattacks. Such cyberattacks might jeopardise system safety and availability. Many safety-critical systems, such as railways, have a very long life cycle and hence, a large number of legacy components. The implementation of modern security protection mechanisms is often restricted due to the rigidness of legacy architecture and high re-certification costs. Therefore, it is desirable to efficiently utilise the potential already present in the system and enhance cybersecurity protection without major modifications. Safety-critical systems usually contain a high degree of redundancy required to achieve fault tolerance. In this paper, we investigate how to utilise redundancy to enhance cybersecurity protection. We demonstrate that by introducing diversity in the redundant architectures and implementing security monitoring, we can potentially enhance cybersecutiry protection of safety-critical systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2023. p. 282-287
Keywords [en]
cyberattacks, dependability, fault tolerance, redundancy, safety
National Category
Computer Systems Embedded Systems
Identifiers
URN: urn:nbn:se:kth:diva-341620DOI: 10.1109/DSA59317.2023.00041Scopus ID: 2-s2.0-85179507604OAI: oai:DiVA.org:kth-341620DiVA, id: diva2:1822829
Conference
10th International Conference on Dependable Systems and Their Applications, DSA 2023, Tokyo, Japan, Aug 10 2023 - Aug 11 2023
Note

Part of ISBN 9798350304770

QC 20231228

Available from: 2023-12-28 Created: 2023-12-28 Last updated: 2025-01-17Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Troubitsyna, Elena

Search in DiVA

By author/editor
Troubitsyna, Elena
By organisation
Theoretical Computer Science, TCS
Computer SystemsEmbedded Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 44 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf