Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Title | Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Siddiqui, Fahad, Hagan, Matthew, Sezer, Sakir |
Conference Name | 2019 32nd IEEE International System-on-Chip Conference (SOCC) |
Keywords | Active Defence, business operations, CPS Resilience, critical infrastructure, critical infrastructures, cyber physical systems, cyber resilience, Cyber Resilient Embedded System, Cyber-Physical Embedded System, embedded architectures, embedded security domains, embedded security microarchitecture, embedded security requirements, Embedded systems, embedded technologies, international security regulations, microarchitectural characteristics, next-generation critical infrastructure, pubcrawl, Recover, Resiliency, Resilient Security Architectures, Response, security breach, security foundation, security methods, security of data, Security Regulation, serious embedded security challenges, technology manufacturers |
Abstract | The mass integration and deployment of intelligent technologies within critical commercial, industrial and public environments have a significant impact on business operations and society as a whole. Though integration of these critical intelligent technologies pose serious embedded security challenges for technology manufacturers which are required to be systematically approached, in-line with international security regulations.This paper establish security foundation for such intelligent technologies by deriving embedded security requirements to realise the core security functions laid out by international security authorities, and proposing microarchitectural characteristics to establish cyber resilience in embedded systems. To bridge the research gap between embedded and operational security domains, a detailed review of existing embedded security methods, microarchitectures and design practises is presented. The existing embedded security methods have been found ad-hoc, passive and strongly rely on building and maintaining trust. To the best of our knowledge to date, no existing embedded security microarchitecture or defence mechanism provides continuity of data stream or security once trust has broken. This functionality is critical for embedded technologies deployed in critical infrastructure to enhance and maintain security, and to gain evidence of the security breach to effectively evaluate, improve and deploy active response and mitigation strategies. To this end, the paper proposes three microarchitectural characteristics that shall be designed and integrated into embedded architectures to establish, maintain and improve cyber resilience in embedded systems for next-generation critical infrastructure. |
DOI | 10.1109/SOCC46988.2019.1570548325 |
Citation Key | siddiqui_establishing_2019 |
- embedded systems
- technology manufacturers
- serious embedded security challenges
- Security Regulation
- security of data
- security methods
- security foundation
- security breach
- Response
- Recover
- pubcrawl
- next-generation critical infrastructure
- microarchitectural characteristics
- international security regulations
- embedded technologies
- Resilient Security Architectures
- embedded security requirements
- embedded security microarchitecture
- embedded security domains
- embedded architectures
- Cyber-Physical Embedded System
- Cyber Resilient Embedded System
- cyber resilience
- cyber physical systems
- critical infrastructures
- critical infrastructure
- CPS resilience
- business operations
- Active Defence
- Resiliency