Using Tree-Based Approaches to Analyze Dependability and Security on I&C Systems in Safety-Critical Systems

Chi Shiang Cho*, Wei Ho Chung, Sy Yen Kuo

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

13 Scopus citations

Abstract

This study uses event trees and fault trees to analyze dependability issues on instrumentation and control systems in safety-critical systems. In an event tree, each state can be constructed as a fault tree and each fault tree can be converted to an ordered binary decision diagram (OBDD). The state probability can then be evaluated by quantifying the corresponding OBDD. We present an algorithm to combine OBDDs and evaluate each outcome probability for both statistically-independent (s-independent) and statistically-dependent (s-dependent) events. For s-independent events, the outcome probability can be easily obtained by probability multiplications of the associated branch states. For s-dependent events, we present an algorithm to combine OBDDs and compute each outcome probability. In the security domain, we analyze cyberphysical security issues with attack trees. The countermeasures and different levels/layers of protection are also presented. The integration of the dependability and security analysis are adopted by combining event trees, fault trees, and attack trees. A case study is presented to demonstrate that the integration of dependability and security is feasible and the improvement of outcome risk is significant through adopting security countermeasures.

Original languageEnglish
Pages (from-to)1118-1128
Number of pages11
JournalIEEE Systems Journal
Volume12
Issue number2
DOIs
StatePublished - 01 06 2018
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2007-2012 IEEE.

Keywords

  • Attack tree
  • combination of ordered binary decision diagram (COBDD)
  • cyberphysical security
  • event tree (ET)
  • fault tree
  • ordered binary decision diagram (OBDD)

Fingerprint

Dive into the research topics of 'Using Tree-Based Approaches to Analyze Dependability and Security on I&C Systems in Safety-Critical Systems'. Together they form a unique fingerprint.

Cite this