Security and Communication Networks

Safety and Security Coengineering in Embedded Systems


Publishing date
01 Apr 2019
Status
Published
Submission deadline
30 Nov 2018

1Fraunhofer IESE, Kaiserslautern, Germany

2Siemens AG, Braunschweig, Germany

3AIT Austrian Institute of Technologie, Seibersdorf, Austria

4Airbus, Munich, Germany

5TU Darmstadt, Darmstadt, Germany


Safety and Security Coengineering in Embedded Systems

Description

Driven by large-scale scientific, technologic, and socioeconomic developments, virtually any domain of embedded (cyber-physical) systems (ES, CPS) is presently subject to the same megatrends of increasing levels of interconnection and cooperation.

In the automotive domain, future cars will be highly automated and they will cooperate to optimize the overall performance (traffic flow; platooning scenarios, etc.) and to prevent accidents (e.g., warning because of obstacle on the road and general awareness with respect to the driving behavior and plans of the other cars). This opens up diverse security attack vectors and attacks might well be affecting system safety. In the railway domain, there is, for instance, the ETCS system as part of the ERTMS (European Rail Transport Management System) providing high interoperability and standardized communication and control replacing the large number of national train protection systems; vulnerability to attacks would be extremely safety critical. In the manufacturing and process industry domain, highly automated and partially autonomous systems of all kinds are interconnected and controlled, respectively, exchange critical data, where cyberattacks may lead to safety-critical incidents of high impact on people and environment. Our dependency on particularly electric energy leads to the same critical implications in our power grids and other critical infrastructures.

Consequently, in context of such domains of safety-critical embedded systems of systems, we presently see a very high potential in new cooperation-based applications and services, but we also see significant engineering challenges regarding the indispensable assurance of the trustworthiness of the systems. In particular, from a safety perspective, basic assumptions like predictability of system behavior and environment, which are foundational for the state of the practice approaches and established standards, are not sufficient anymore. One reason for that is that the significant increase in communication links (connectivity) and the potential dynamic integration of unsecure systems as well as the reconfiguration in adaptive open systems provide plenty of attack surface from a cybersecurity point of view. However, a safety-critical system that is not secure may also be not sufficiently safe what in turn could have an impact on the question of placing the product in the market. Consequently, safety can no longer be engineered isolated from security and we require new integrated approaches with respect to analysis, engineering, and validation of these important properties over the whole system lifetime.

This special issue aims to address a corresponding range of topics related to the coengineering of cybersecurity and safety in embedded systems (of systems).

Potential topics include but are not limited to the following:

  • Safety and security coanalysis (e.g., extended hazard analyses, vulnerability and threat analysis) in embedded systems (of systems)
  • Coengineering of safety and security for embedded systems (of systems)
  • Safety and security patterns for embedded systems (of systems)
  • System architectures for safe and secure embedded systems (of systems)
  • Safety and security in open systems of systems (e.g., trustworthiness of third-party systems)
  • Integrated risk assessment (i.e., what does the interplay imply with respect to the notion of risk, which is different for functional safety and security)
  • Integrated cause-effect analyses
  • Software and hardware design aspects for safety and security
  • Methods, tools, and techniques for engineering safe and secure embedded systems
  • Safety and security measures for embedded systems, conflicts, and synergies
  • Verification and validation with respect to safety and security in the context of embedded systems
  • Integrated safety and security argumentation and cases for typical domains of embedded systems
  • Domain-specific problems and solutions
  • Concrete case studies and experience reports
  • Standardization, qualification, and certification issues
  • Current related developments in standardization

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 5381856
  • - Editorial

Safety and Security Coengineering in Embedded Systems

Daniel Schneider | Jens Braband | ... | Stefan Katzenbeisser
  • Special Issue
  • - Volume 2019
  • - Article ID 8348925
  • - Research Article

Security Requirements Engineering in Safety-Critical Railway Signalling Networks

Markus Heinrich | Tsvetoslava Vateva-Gurova | ... | Christian Schlehuber
  • Special Issue
  • - Volume 2019
  • - Article ID 4869167
  • - Research Article

SSPSoC: A Secure SDN-Based Protocol over MPSoC

Soultana Ellinidou | Gaurav Sharma | ... | Jean-Michel Dricot
  • Special Issue
  • - Volume 2019
  • - Article ID 8690853
  • - Research Article

SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks

Meiyu Zhang | Qianying Zhang | ... | Yong Guan
  • Special Issue
  • - Volume 2019
  • - Article ID 8936784
  • - Research Article

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems

Fute Shang | Buhong Wang | ... | Tengyao Li
  • Special Issue
  • - Volume 2019
  • - Article ID 4614721
  • - Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Yasuyuki Kawanishi | Hideaki Nishihara | ... | Yoichi Hata
  • Special Issue
  • - Volume 2019
  • - Article ID 1719585
  • - Research Article

Single-Round Pattern Matching Key Generation Using Physically Unclonable Function

Yuichi Komano | Kazuo Ohta | ... | Ingrid Verbauwhede
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.