Title :
A trusted computing architecture for critical infrastructure protection
Author_Institution :
Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL, USA
Abstract :
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control underlying physical processes so as to optimize system objectives based on physical properties/constraints and the current and estimated state of the system. Such systems usually require performance guarantees and support for security: wrongly received or missed commands can render the entire system unstable. Yet, securing cyber-physical systems with heterogeneous components is still an open and challenging problem. In this paper we propose a trusted computing architecture for critical infrastructure protection based on the trusted computing paradigm. We discuss the threat model, the vulnerabilities, real-time availability, run-time integrity and show how to get resilience against intentional and unintentional faults by using trusted computing enabled components and an access control structure that enforces need-to-get-now (availability) policies. We conclude by showing how this approach can be used to secure substation automation systems of an IEC/TR 61850-90-5-compliant electricity grid.
Keywords :
IEC standards; authorisation; critical infrastructures; embedded systems; invasive software; power grids; substation automation; substation protection; trusted computing; IEC/TR 61850-90-5-compliant electricity grid; access control structure; critical infrastructure protection; cyber component control; cyber-physical system; heterogeneous component; real-time availability; resilience; run-time integrity; security; state estimation; substation automation system; threat model; trusted computing architecture; unintentional fault; vulnerability; Access control; Availability; Computer architecture; IEC standards; Real-time systems; Software; IEC/TR 61850–90–5; Universal Composability; critical infrastructures; cyber-physical systems; electricity grid;
Conference_Titel :
Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference on
Conference_Location :
Piraeus
Print_ISBN :
978-1-4799-0770-0
DOI :
10.1109/IISA.2013.6623706