Publication detail

Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach

ŠVÉDA, M. VRBA, R.

Original Title

Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach

English Title

Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach

Type

conference paper

Language

en

Original Abstract

This paper deals with an approach to security analysis of IP-based computer networks for cyber-physical applications. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties.

English abstract

This paper deals with an approach to security analysis of IP-based computer networks for cyber-physical applications. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties.

Keywords

Cyber-physical system, security analysis, IP networks

RIV year

2013

Released

09.09.2013

Publisher

Institute of Electrical and Electronics Engineers

Location

New York

ISBN

978-1-4673-5943-6

Book

IEEE Proceedings AFRICON 2013

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

101

Pages to

106

Pages count

6

Documents

BibTex


@inproceedings{BUT103502,
  author="Miroslav {Švéda} and Radimír {Vrba}",
  title="Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach",
  annote="This paper deals with an approach to security analysis of IP-based computer
networks for cyber-physical applications. The method developed stems from
a formal model of network topology with changing link states, and deploys bounded
model checking of network security properties supported by SAT-based decision
procedure. Its implementation consists of a set of tools that provide automatic
analysis of router configurations, network topologies, and states with respect to
checked properties.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="IEEE Proceedings AFRICON 2013",
  chapter="103502",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2013",
  month="september",
  pages="101--106",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}