Table 1: Roles and rights belonging to IEC-62351-8.
Rights associated with IEC-62351-8 roles
Roles
View
Read
Dataset
Reporting
Fileread
Filewrite
Filemgnt
Control
Config
Settinggroup
Security
V
a
X X
O
b
X X X X
E
c
X X X X X X X
I
d
X X X X X
S
e
X X X X X X X X X
S
f
X X X X
R
g
X X X X X
a
Viewer: capacity to view data objects.
b
Operator: capacity to view data objects and values, and perform control.
c
Engineer: capacity to view data objects and values, access datasets and files, and
configure servers.
d
Installer: capacity to view data objects and values, write files and configure
servers.
e
SECADM: capacity to manage users-roles-rights, and change security setting.
f
SECAUD: capacity to audit the system by viewing audit logs.
g
RBACMNT: hereditary role from the SECADM with only the ability to manage
roles and rights.
(e.g., access to Viewers or Installers) but also avoids
the saturation of the communication channels.
However, although the dynamic access in critical
situations benefits the management in the field, the
use of RBAC does not, in any way, guarantee the re-
silience in the field. It is also necessary to adapt au-
tomatic protection mechanisms with the capacity to
solve a determined situation. This feature is precisely
what differs this research from our previous work (Al-
caraz et al., 2016), where the goal was only to provide
access to critical environments in a less restrictive sit-
uation. Namely, the control in (Alcaraz et al., 2016)
is always possible from anywhere and at time, but it
does not consider the restoration measures required in
crisis situations and resilience assurance.
The dynamic preservation of control structural
properties generally results in additional computa-
tional costs (Alcaraz and Wolthusen, 2014), where
surprisingly there is lack of literature to provide guid-
ance on the selection of suitable restoration tech-
niques. For example, Nakayama et al. (Nakayama
et al., 2012) use tie-set notions in order to implement
ring-based solutions against link failures. A variant
of this solution is the rapid spanning tree protocol
(RSTP), an evolution of the spanning tree protocol
(STP), which can be used to manage traffic loops and
broadcast congestion in mesh topologies (Marchese
and Mongelli, 2012). Tree-like structures are also ap-
plied to group and activate, via a nice tree decom-
position, backup instances of driver nodes in charge
of delivering control signals to the rest of the nodes
in the network (Alcaraz and Wolthusen, 2014), or
to build edge-redundant networks to activate backup
links (Alcaraz and Wolthusen, 2014; M
´
edard et al.,
1999; Quattrociocchi et al., 2014). Therefore, more
research is required to address issues relating to re-
silience against adversarial influences in critical con-
texts, particularly in a real-world situation.
The rest of this paper is organized as follows. Sec-
tion 2 introduces the restoration model for strongly in-
terconnected environments, and the correctness proof
and complexity. Section 3 demonstrates the validity
using a case study composed of different experimen-
tal simulations. Finally, Section 4 concludes the paper
and outlines future work.
2 POWER DOMINANCE IN CPSS
In this section, we adapted our previous work (Al-
caraz and Wolthusen, 2014) via an extension using
Algorithm 2.1 in order to repair damages caused by
the removal of edges (e.g., isolations or disconnec-
tions of a few links), and damages caused by the ad-
dition of new edges, probably due to the insertion of
false data injection attacks. More specifically, the ap-
proach proposed in this paper will provide the follow-
ing reparation strategies:
• re-link without parametrization (STG-1) with a
complexity cost of O
n
2
;
• re-link based on the search of those nodes with a
minimum diameter (STG-2) of O
n
2
; and
• the use of backups of N
D
through a tree-like struc-
ture based on a tree decomposition (STG-3) of ex-
ponential order.
Of the three reparation strategies, our research
principally focuses on STG-2 as the computational
cost is less than STG-3, and the parametrization helps
restrict the restoration processes. As for structural
changes and their detection, the gateways have to pe-
riodically measure the diameter (e.g., using breadth-
first search of O
n
) to verify the real reach of a de-
termined node, and validating, in this case, the degree
of accessibility from/to the gateway. Once structural
changes have been detected, Algorithm 2.1 verifies
the acyclicity of the network in order to satisfy the
first condition [C1]. If it contains cycles caused by the
injection of edges, then it first needs to clean the loops
and then check for unobserved nodes and restore
those nodes without observation (possibly caused by
the removal of cycles) through the strategy STG-x,
such that x = {1, 2, 3} (Alcaraz and Wolthusen, 2014).
Although restoration is ensured at this point, the
condition of keeping the direction of control from the
gateway still needs to be addressed. To do this, the
procedure CONNECT TO GATEWAY has to search for
each n
d
i
∈ N
D
(i.e., driver nodes with no parent) to
connect to the gateway such that (gateway, n
d
i
) ∈ E.
However, these new connections force us to consider
Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems
21