Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A systematic mapping study on security for systems of systems

Published: 18 October 2023 Publication History

Abstract

In the late twentieth century, the term “System of Systems” (SoS) became popular to describe a complex system made up of a combination of independent constituent systems. Since then, several studies have been conducted to support and assess SoS management, functionality, and performance. Due to the evolutionary nature of SoS and the non-composability of the security properties of its constituent systems, it is difficult to assess or evaluate SoS security. This paper provides an up-to-date survey on SoS security, aimed at stimulating and guiding further research efforts. This systematic mapping study (SMS) focuses on SoS security, privacy, and trust. Our SMS identified 1828 studies from 6 digital libraries, 87 of which were selected that presented approaches analyzing, evaluating, or improving security. We classified these studies using nine research questions that focused on the nature of the studies, the studied SoS, or the study validation. After examining the selected studies, we identified six gaps and as many future work directions. More precisely, we observed that few studies examine SoS problems and instead propose specific solutions, making it challenging to develop generalizable approaches. Furthermore, the lack of standardization has hindered the reuse of existing approaches, making it difficult for solutions to be generalized to other SoS. In addition, the lack of descriptions of industrial environments in the literature makes it difficult to design realistic validation environments. As a result, the validation of new SoS research remains a challenge in the field.

References

[1]
Graciano Neto, V. V., Guessi, M., Oliveira, L. B. R., Oquendo, F., Nakagawa, E. Y.: Investigating the model-driven development for systems-of-systems. In: Proceedings of the 2014 European Conference on Software Architecture Workshops - ECSAW ’14, New York, New York, USA: ACM Press, 2007, pp. 1–8.
[2]
Bianchi, T., Santos, D. S., Felizardo, K. R.: Quality attributes of systems-of-systems: a systematic literature review. In: Proceedings of the 3rd International Workshop on Software Engineering for Systems-of-Systems, SESoS 2015, pp. 23–30, (2015).
[3]
Maier MW Architecting principles for systems-of-systems Syst. Eng. 1998 1 267-284
[4]
Petković M and Jonker W Security, Privacy, and Trust in Modern Data Management 2007 Berlin Springer
[5]
Olivero, M. A., Bertolino, A., Dominguez-Mayo, F. J., Escalona, M. J., Matteucci, I.: Addressing security properties in systems of systems: challenges and ideas. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11732 LNCS, pp. 138–146, (2019).
[6]
Kitchenham B and Charters S Guidelines for performing Systematic Literature reviews in Software Engineering Version 2.3 Engineering 2007 45 4ve 1051
[7]
Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineering, Vol. 17, p. 10, (2008).
[8]
Petersen K, Vakkalanka S, and Kuzniarz L Guidelines for conducting systematic mapping studies in software engineering: an update Inf. Softw. Technol. 2015
[9]
Boulding KE General systems theory—the skeleton of science Manage. Sci. 1956 2 3 197-208
[10]
Maier, M. W.: Research challenges for systems-of-systems context: collaborative systems. In: Aerospace Corporation, pp. 1–6, (2005). Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1571630&isnumber=33257
[11]
Budgen, D., Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceeding of the 28th International Conference on Software Engineering—ICSE ’06, sn, (2006), p. 1051.
[12]
Klein, J., Van Vliet, H.: A systematic review of system-of-systems architecture. In: QoSA 2013 - Proceedings of the 9th International ACM Sigsoft Conference on the Quality of Software Architectures, pp. 13–21, (2013).
[13]
Nielsen CB, Larsen PG, Fitzgerald J, Woodcock J, and Peleska J Systems of systems engineering: basic concepts, model-based techniques, and research directions ACM Comput. Surv. 2015 48 2 1-41
[14]
Axelsson, J.: A systematic mapping of the research literature on system-of-systems engineering. In: 2015 10th System of Systems Engineering Conference (SoSE), pp. 18–23 (2015)
[15]
Guessi, M., Neto, V. V. G., Bianchi, T., Felizardo, K. R., Oquendo, F., Nakagawa, E. Y.: A systematic literature review on the description of software architectures for systems of systems. In: Proceedings of the ACM Symposium on Applied Computing, Vol. 13–17-Apri, No. v, pp. 1433–1440, (2015).
[16]
Vargas, I. G., Gottardi, T., Teresinha, R., Braga, V.: Approaches for integration in system of systems: A systematic review. In: Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, pp. 32–38, (2016).
[17]
Daneva, M., Lazarov, B.: Requirements for smart cities: results from a systematic review of literature. In: 2018 12th International Conference on Research Challenges in Information Science (RCIS), in International Conference on Research Challenges in Information Science, Vol. 2018- May. IEEE, May 2018, pp. 1–6.
[18]
Olivero MA, Bertolino A, Dominguez-Mayo FJ, Matteucci I, and Escalona MJ A delphi study to recognize and assess systems of systems vulnerabilities Inf. Softw. Technol. 2022 68 74
[19]
Wohlin C Guidelines for snowballing in systematic literature studies and a replication in software engineering ACM Int. Conf. Proc. Ser. 2014
[20]
Johannesson P and Perjons E An Introduction to Design Science 2014 Cham Springer
[21]
DoD: Chapter 4—Systems Engineering. In: DoD Defense Aquisition Guidebook, (2004)
[22]
Dahmann, J. S., Baldwin, K. J.: Understanding the current state of US defense systems of systems and the implications for systems engineering. In: 2008 IEEE International Systems Conference Proceedings, SysCon 2008, pp. 99–105 (2008).
[23]
Shull, F., Singer, J., Sjoberg, D. I. K.: Guide to Advanced Empirical Software Engineering, (2008).
[24]
Zhou, X., Jin, Y., Zhang, H., Li, S., Huang, X.: A map of threats to validity of systematic literature reviews in software engineering. In: Proceedings of the Asia-Pacific Software Engineering Conference, APSEC, (2016).
[25]
He, F., Agwuegbo, C., Rao, N. S. V., Ma, C. Y. T.: A sequential game of defense and attack on an interdependent system of systems. In: 2018 21st International Conference on Information Fusion, FUSION 2018, pp. 2535–2541 (2018).
[26]
Pieters, W.: Defining ‘the weakest link’: comparative security in complex systems of systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CLOUDCOM), Vol 2. International Conference on Cloud Computing Technology and Science, pp. 39–44 (2013).
[27]
Rubin SH and Bouabana-Tebibel T Nncs: Randomization and informed search for novel naval cyber strategies Stud. Comput. Intell. 2015 621 193-223
[28]
Montanari, M., Campbell, R. H., Sampigethaya, K., Li, M. : A security policy framework for eEnabled fleets and airports. In: 2011 Aerospace Conference, pp. 1–11 (2011).
[29]
Causevic, A.: A risk and threat assessment approaches overview in autonomous systems of systems. In: 2017 XXVI International conference on Information, Communication and Automation Technologies (ICAT), Institute of Electrical and Electronics Engineers Inc., pp. 1–6 (2017).
[30]
Turnley, J., et al.: Modeling human-technology interaction as a sociotechnical system of systems. In: 2017 12th System of Systems Engineering Conference (SOSE), (2017)
[31]
Silva, E., Batista, T., Oquendo, F.: A mission-oriented approach for designing system-of-systems. In: 015 10th System of Systems Engineering Conference (SoSE), IEEE, pp. 346–351 (2015).
[32]
Maksuti S et al. Automated and secure onboarding for system of systems IEEE Access 2021 9 111095-111113
[33]
Malik, A. A., Mahboob, A., Khan, A., Zubairi, J.: Application of cyber security in emerging C4ISR systems, (2011).
[34]
Nichols, C., Dove, R.: Architectural patterns for self-organizing systems-of-systems. In: 21st Annual International Symposium of the International Council on Systems Engineering, INCOSE 2011, pp. 851–862 (2011).
[35]
Olivero MA, Bertolino A, Domínguez-Mayo FJ, Escalona MJ, and Matteucci I Digital persona portrayal: Identifying pluridentity vulnerabilities in digital life J. Inf. Secur. Appl. 2020 52 102492
[36]
Finke, M., de Waard, P., Recchilongo, P., Lahaije, R., Baumann, U.: Validating a European ATM security system architecture. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC). IEEE-AIAA Digital Avionics Systems Conference. IEEE, pp. 27–35 (2018).
[37]
Lisova, E., El Hachem, J., Causevic, A.: Investigating attack propagation in a SoS via a service decomposition. In: G. M. O. K. R.-M. S. S. Y. W. S. W. Z. Chang C.K., Chen P. (Ed.), 2019 IEEE World Congress on Services (SERVICES), Institute of Electrical and Electronics Engineers Inc., pp. 9–14 (2019).
[38]
Hachem JEL et al. Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems J. Syst. Softw. 2020 162 110484
[39]
Allian, A. P., Paulo, S., Allian, A. P.: Promoting trust in interoperability of systems-of-systems. In: Proceedings of the 13th European Conference on Software Architecture—ECSA ’19 - volume 2, vol. 2, pp. 67–70, (2019).
[40]
Nicklas, J., Mamrot, M., Winzer, P., Lichte, D., Marchlewitz, S., Wolf, K.: Use case based approach for an integrated consideration of safety and security aspects for smart home applications. In: 2016 11th System of Systems Engineering Conference (SoSE), pp. 1–6 (2016).
[41]
Corallo, A., Lazoi, M., Lezzi, M., Luperto, A.: Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. In: Computers in Industry, vol. 137. Elsevier B.V., (2022).
[42]
Chen, D., Meinke, K., Ostberg, K., Asplund, F., Baumann, C.: A knowledge-in-the-loop approach to integrated safety and security for cooperative system-of-systems. In: 2015 IEEE 7th International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 13–20 (2015).
[43]
Mexis, N., Anagnostopoulos, N. A., Chen, S., Bambach, J., Arul, T., Katzenbeisser, S.: A lightweight architecture for hardware-based security in the emerging era of systems of systems. In: ACM J Emerg Technol Comput Syst, vol. 17, no. 3, (2021).
[44]
Mohamed, N., Al-Jaroodi, J.: A middleware framework to address security issues in integrated multisystem applications. In: SysCon 2019—13th Annual IEEE International Systems Conference, Proceedings, (2019).
[45]
Hachem, J. E., Khalil, T. A., Chiprianov, V., Babar, A., Aniorte, P.: A model driven method to design and analyze secure architectures of systems-of-systems. In; Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, Institute of Electrical and Electronics Engineers Inc., pp. 166–169 (2017).
[46]
Adetoye, A., Creese, S., Goldsmith, M., Hopkins, P.: A modelling approach for interdependency in digital systems-of-systems security—extended abstract. In: Xenakis, C., Wolthusen, S. (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science, vol. 6712 LNCS. Heidelberger platz 3, D-14197. Springer, Berlin, pp. 153–156 (2011).
[47]
Javed Y, Felemban M, Shawly T, Kobes J, and Ghafoor A A partition-driven integrated security architecture for cyberphysical systems Computer (Long Beach Calif) 2020 53 3 47-56
[48]
Hatzivasilis, G., Papaefstathiou, I., Manifavas, C., Papadakis, N.: A reasoning system for composition verification and security validation. In: 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4 (2014).
[49]
Ruiz, J. F., Rudolph, C., Mana, A., Arjona, M.: A security engineering process for systems of systems using security patterns. In: 2014 8th Annual IEEE Systems Conference (SYSCON). Annual IEEE Systems Conference, pp. 8–11 (2014)
[50]
Trivellato, D., Zannone, N., Etalle, S.: A security framework for systems of systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, pp. 182–183 (2011).
[51]
D. el D. I. Abou-Tair, Alouneh, S., Khalifeh, A., Obermaisser, R.: A security framework for systems-of-systems. In: Park, J.J., Loia, V., Yi, G., Sung, Y. (Eds.), Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol. 474, pp. 427–432 (2018).
[52]
Feng N, Wang HJ, and Li M A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis Inf. Sci. 2014 256 57-73
[53]
Aigner, A., Khelil, A.: A security scoring framework to quantify security in cyber-physical systems. In: Proceedings of the 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2021, Institute of Electrical and Electronics Engineers Inc., pp. 199–206 (2021).
[54]
Carturan, S. B. O. G., Goya, D. H.: A systems-of-systems security framework for requirements definition in cloud environment. In: Proceedings of the 13th European Conference on Software Architecture - Volume 2, ECSA ’19. New York, NY, USA: ACM, pp. 235–240 (2019).
[55]
Petratos, P., Faccia, A.: Accounting information systems and system of systems: assessing security with attack surface methodology. In: Proceedings of 2019 3rd International Conference On Cloud And Big Data Computing (ICCBDC 2019). ICCBDC 2019. New York, USA: ACM, pp. 100–105 (2019).
[56]
Olivero, M. A., Bertolino, A., Dominguez-Mayo, F. J., Escalona, M. J., Matteucci, I.: Addressing security properties in systems of systems: challenges and ideas. In: Calinescu, R., Di Giandomenico, F., (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science, vol. 11732.Springer, Cham, pp. 138–146 (2019).
[57]
Dahmann, J., Rebovich, G., Turner, G.: An actionable framework for system of systems and mission area security engineering. In: 2014 8th Annual IEEE Systems Conference (SYSCON), Annual IEEE Systems Conference, pp. 12–17 (2014).
[58]
Canzani, E., Kaufmann, H., Lechner, U.: An operator-driven approach for modeling interdependencies in critical infrastructures based on critical services and sectors. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10242 LNCS, pp. 308–320, (2017).
[59]
Lakshminarayanan, S., Souvannarnarth, M.: Applying model based systems engineering approach to smart grid software systems security requirements. In: 22nd Annual International Symposium of the International Council on Systems Engineering, INCOSE 2012 and the 8th Biennial European Systems Engineering Conference 2012, EuSEC 2012, Rome, pp. 13–20 (2012). [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883526951&partnerID=40&md5=d9694907fae25abf87b6ecf6aefec6a3
[60]
Khashooei, B. A., Vasenev, A., Kocademir, H. A., Mathijssen, R.: Architecting system of systems solutions with security and data-protection principles. In: 2021 16th International System of Systems Engineering Conference, SoSE 2021, Institute of Electrical and Electronics Engineers Inc., pp. 43–48 (2021).
[61]
Ki-Aries, D.: Assessing security risk and requirements for systems of systems. In: 2018 IEEE 26th International Requirements Engineering Conference (RE), pp. 454–459 (2018).
[62]
Ki-Aries, D., Faily, S., Dogan, H., Williams, C.: Assessing system of systems security risk and requirements with OASoSIS. In: B. K. L. S.-W. Faily S., Mead N. (Eds.), 2018 IEEE 5th International Workshop on Evolving Security Privacy Requirements Engineering (ESPRE). Institute of Electrical and Electronics Engineers Inc., pp. 14–20 (2018).
[63]
Burton, I., Straub, J.: Autonomous distributed electronic warfare system of systems. In: 2019 14th Annual Conference System of Systems Engineering (SOSE), pp. 96–101 (2019)
[64]
Pelliccione P et al. Beyond connected cars: a systems of systems perspective Sci. Comput. Program. 2020 191 102414
[65]
Lisova, E., Čaušević, A., Uhlemann, E., Björkman, M.: Clock synchronization considerations in security informed safety assurance of autonomous systems of systems. In: IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 8385–8390 (2017).
[66]
Wan, K., Alagar, V.: Context-aware security solutions for cyber physical systems. In: Vinh, P.C., Hung, N.M., Tung, N.T., Suzuki, J. (Eds.), Context-Aware Systems and Applications, (ICCASA 2012). Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, vol. 109, pp. 18–29 (2013)
[67]
Ashiku, L., Dagli, C.: Cybersecurity as a centralized directed system of systems using SoS explorer as a tool. In: 2019 14th Annual Conference System of Systems Engineering, SoSE 2019, pp. 140–145 (2019).
[68]
Axelrod, C. W.: Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles. In: 2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), pp. 1–6 (2017).
[69]
Straub, J., et al.: CyberSecurity considerations for an interconnected self-driving car system of systems. In: 2017 12th System of Systems Engineering Conference (SOSE), (2017)
[70]
Fitzgerald J, Riddle S, Casoto P, and Kristensen K Dependable system of systems engineering: the COMPASS project ERCIM NEWS 2014 97 26-27
[71]
Hofer, F.: Enhancing security and reliability for smart-systems’ architectures. In: 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 150–153 (2018).
[72]
El Hachem, J., et al.: Extending a multi-agent systems simulation architecture for systems-of-systems security analysis to cite this version: HAL Id: hal-01908398 Extending a Multi-Agent Systems Simulation Architecture for Systems-of-Systems Security Analysis, (2018)
[73]
Cioroaica, E., Purohit, A., Buhnova, B., Schneider, D.: Goals within trust-based digital ecosystems. In: Proceedings - 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems, SESoS/WDES 2021, Institute of Electrical and Electronics Engineers Inc., pp. 1–7 (2021).
[74]
Fuchs, A., Rieke, R.: Identification of security requirements in systems of systems by functional security analysis. In: Casimiro, A., DeLemos, R., Gacek, C. (Eds.), Architecting Dependable Systems VII. Lecture Notes in Computer Science, vol. 6420. Heidelberger platz 3, D-14197. Springer, Berlin, pp. 74–96 (2010).
[75]
Surkovic, A., et al.: Incorporating attacks modeling into safety process. In: Gallina, B., kavhaug, A., Schoitsch, E., Bitsch, F. (Eds.), Computer Safety, Reliability, and Security, SAFECOMP 2018. Lecture Notes in Computer Science, vol. 11094. Gewerbestrasse 11, Cham, CH-6330, Switzerland: Springer international publishing AG, pp. 31–41 (2018).
[76]
Biffl, S., Eckhart, M., Lüder, A., Weippl, E.L Introduction to security and quality improvement in complex cyber-physical systems engineering. In: Security and Quality in Cyber-Physical Systems Engineering. Springer, Cham, pp. 1–29 (2019).
[77]
Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., Rahman, M. A.: IoTSAT: A formal framework for security analysis of the internet of things (IoT). In: 2016 IEEE Conference on Communications and Network Security, CNS 2016, IEEE Conference on Communications and Network Security. Institute of Electrical and Electronics Engineers Inc., pp. 180–188 (2017).
[78]
Waller, A., Craddock, R.: Managing runtime re-engineering of a System-of-Systems for cyber security. In: 2011 6th International Conference on System of Systems Engineering, Albuquerque, NM, pp. 13–18 (2011).
[79]
El Hachem, J., et al.: Model driven software security architecture of systems-of-systems. In: R. S. D. J. Potanin A., Murphy G.C. (Eds.), Proceedings - Asia-Pacific Software Engineering Conference, APSEC, IEEE Computer Society, pp. 89–96 (2016).
[80]
Eichmann, O. C., Melzer, S., God, R.: Model-based development of a system of systems using unified architecture framework (UAF): a case study. In: 2019 IEEE International Systems Conference (SysCon), Institute of Electrical and Electronics Engineers Inc., pp. 1–8 (2019).
[81]
Rao, N. S. V., Ma, C. Y. T., He, F.: On defense strategies for recursive system of systems using aggregated correlations. In: 2018 21st International Conference on Information Fusion (FUSION), pp. 507–514 (2018)
[82]
Lucia S, Kögel M, Zometa P, Quevedo DEE, and Findeisen R Predictive control in the era of networked control and communication—a perspective IFAC-PapersOnLine 2015 48 23 322-331
[83]
Schoitsch, E.: Safety versus security-related trade-offs and emergent behaviours in cyber-physical systems. In: IDIMT 2013—Information Technology Human Values, Innovation and Economy, 21st Interdisciplinary Information Management Talks, Prague, 2013, pp. 181–196. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896816527&partnerID=40&md5=f86758a419963b0d4d3b535a4f142382
[84]
El Hachem, J., Lisova, E., Cauševic, A.: Securing system-of-systems through a game theory approach. In: Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, pp. 1443–1446 (2021).
[85]
Maksuti S, Zsilak M, Tauber M, and Delsing J Security and autonomic management in system of systems Infocommun. J. 2021 13 3 66-75
[86]
Olivero, M. A., et al.: Security assessment of systems of systems. In: Proceedings of the 2019 IEEE/ACM 7th International Workshop on Software Engineering for Systems-of-Systems and 13th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems, SESoS-WDES 2019, pp. 62–65, (2019).
[87]
Bicaku A, Zsilak M, Theiler P, Tauber M, and Delsing J Security standard compliance verification in system of systems IEEE Syst. J. 2021
[88]
Ferraz, F. S., Guimaraes Ferraz, C. A.: Smart City Security Issues: Depicting information security issues in the role of a urban environment. In: 2014 IEEE/ACM 7th International Conference on Utility And Cloud Computing (UCC), International Conference on Utility and Cloud Computing, pp. 842–847 (2014)
[89]
Ormrod, D., Scott, K.: Strategic foresight and resilience through cyber-wargaming. In: European Conference on Information Warfare and Security, ECCWS, pp. 319–327 (2019). [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85070015147&partnerID=40&md5=e27d26e902877268806c0a6ce2e2a103
[90]
Ki-Aries, D., Faily, S., Dogan, H., Williams, C.: System of systems characterisation assisting security risk assessment. In: 2018 13th Annual Conference On System of Systems Engineering (SOSE), pp. 485–492 (2018)
[91]
Derhamy H, Eliasson J, and Delsing J System of system composition based on decentralized service-oriented architecture IEEE Syst. J. 2019 13 4 3675-3686
[92]
Bukowski L System of systems dependability—theoretical models and applications examples Reliab. Eng. Syst. Saf. 2016 151 76-92
[93]
Madan, B. B.: System of systems security. In: Rainey, L.B., Tolk, A (Eds.), Modeling and Simulation Support for System of Systems Engineering Applications, pp. 565–580 (2015).
[94]
Zafar N, Arnautovic E, Diabat A, and Svetinovic D System security requirements analysis: a smart grid case study Syst. Eng. 2014 17 1 77-88
[95]
Ceccarelli A et al. Threat analysis in systems-of-systems: an emergence-oriented approach ACM Trans. Cyber-Phys. Syst. 2018 3 2 18:1-18:24
[96]
Surkovic, A., et al.: Towards attack models in autonomous systems of systems. In: 2018 13th System of Systems Engineering Conference, SoSE 2018, Institute of Electrical and Electronics Engineers Inc., pp. 583–585 (2018).
[97]
El Hachem, J., Chiprianov, V., Babar, A., Aniorte, P.: Towards methodological support for secure architectures of software-intensive systems-of-systems. In: Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, SiSoS@ECSA ’16. New York, NY, USA: ACM, pp. 9:1--9:6 (2016).
[98]
El Hachem, J.: Towards model driven architecture and analysis of system of systems access control. In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, pp. 867–870 (2015).
[99]
Chiprianov, V., Falkner, K., Gallon, L., Munier, M.: Towards modelling and analysing non-functional properties of systems of systems. In: CooK, S., Ireland, V., Gorod, A., Ferris, T., Do, Q. (Eds.), Proceedings of the 9th International Conference on System of Systems Engineering: The Socio-Technical Perspective, SoSE 2014, pp. 289–294 (2014).
[100]
Chiprianov, V., Gallon, L., Salameh, K., Munier, M., El Hachem, J., El Hachem, J.: Towards security software engineering the smart grid as a system of systems. In: 2015 10th System of Systems Engineering Conference (SOSE), IEEE, pp. 77–82 (2015).
[101]
Rein, A., Rieke, R., Jaeger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Becue, A., CuppensBoulahia, N., Cuppens, F., Katsikas, S., Lambrinoudakis, C (Eds.), Security of Industrial Control Systems and Cyber Physical Systems. Lecture Notes in Computer Science, vol. 9588. Gewerbestrasse 11, Cham, Ch-6330, Switzerland: Springer International Publishing AG, pp. 31–47 (2016).
[102]
El Hachem, J., Sedaghatbaf, A., Lisova, E., Causevic, A.: Using Bayesian networks for a cyberattacks propagation analysis in systems-of-systems. In: 2019 26th Asia-Pacific Software Engineering Conference (APSEC), in Asia-Pacific Software Engineering Conference, vol. 2019- Decem. IEEE, Dec. 2019, pp. 363–370.
[103]
Belloir, N., Chiprianov, V., Ahmad, M., Munier, M., Gallon, L., Bruel, J.-M. M.: Using relax operators into an MDE security requirement elicitation process for systems of systems. In: Proceedings of the 2014 European Conference on Software Architecture Workshops, in ECSAW ’14. New York, NY, USA: ACM, pp. 32:1–32:4 (2014).
[104]
Aigner, A., Khelil, A.: A scoring system to efficiently measure security in cyber-physical systems. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 1141–1145 (2020).
[105]
Chiprianov, V., Gallon, L., Munier, M., Aniorte, P., Lalanne, V.: Challenges in security engineering of systems-of-systems. In: Troisiéme Conférence en Ingénierie du Logiciel, no. June, pp. 137–151, (2014). Available: http://munier.perso.univ-pau.fr/research/papers/2014/2014-CIEL/CIEL_2014_VC_LG_MM_PAn_VL_actes.pdf
[106]
Guariniello C and DeLaurentis D Communications, information, and cyber security in systems-of-systems: assessing the impact of attacks through interdependency analysis Procedia Comput. Sci. 2014 28 Cser 720-727
[107]
Merabti, M., Kennedy, M., Hurst, W.: Critical infrastructure protection: A 21st century challenge. In: 2011 International Conference on Communications and Information Technology, ICCIT 2011, pp. 1–6 (2011).
[108]
Humayed A, Lin J, Li F, and Luo B Cyber-physical systems security—a survey IEEE Internet Things J. 2017
[109]
Messe, N., Belloir, N., Chiprianov, V., Cherfa, I., Fleurquin, R., Sadou, S.: Development of secure system of systems needing a rapid deployment. In: 2019 14th Annual Conference System of Systems Engineering (SOSE), 345 E 47th St, New York, NY 10017 USA: IEEE, pp. 152–157 (2019)
[110]
Shone, N., Shi, Q., Merabti, M., Kifayat, K.: Misbehaviour monitoring on system-of-systems components. In: Crispo, B., Sandhu, R., CuppensBoulahia, N., Conti, M., Lanet, J.L., (eds.), 2013 International Conference on Risks and Security of Internet and Systems (CRISIS), in International Conference on Risks and Security of Internet and Systems (2013)
[111]
Shone, N., Shi, Q., Merabti, M., Kifayat, K.: Securing complex system-of-systems compositions. In: European Conference on Information Warfare and Security, ECCWS, pp. 370–379 (2013). [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893433123&partnerID=40&md5=dc00401df5ee53497d159e63a6632059
[112]
Dahmann, J., Rebovich, G., McEvilley, M., Turner, G.: Security engineering in a system of systems environment. In: 2013 7th annual IEEE international systems conference (SYSCON 2013), in Annual IEEE Systems Conference, pp. 364–369 (2013).
[113]
Lauritsen, R. W.: Systems of systems with security, p. 30,34, (2013)

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Information Security
International Journal of Information Security  Volume 23, Issue 2
Apr 2024
838 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 18 October 2023
Accepted: 02 September 2023

Author Tags

  1. Human factor
  2. Security
  3. System of systems
  4. Systematic mapping study
  5. Privacy
  6. Trust

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media