The main difficulty of the modelling process itself
lies within the construction of the interaction matrix.
In this paper, we assume that a rigorous specification
of the control programs containing pre- and post-
conditions is available (which in practice will not
always be the case). However, if such specifications
do exist in a formal notation, even an automatic or at
least semi-automatic generation of the interaction
matrix is possible. One can conclude this from the
code generation features present in specification and
design tools for software, which take the pre- and
post-conditions as input and transforms them into
another formal description (code). The maintenance
of the model, which is necessary if changes in the
configuration or the control programs occur, depends
on the formal specifications of the changes, too.
As mentioned above a lot of work is still to be
done to transfer the model to real practical
applications with a large number of components.
REFERENCES
Adepu, S., Mathur, A., Gunda, J., and Djokic, S. 2015.
Algorithms and Architectures for Parallel Processing.
In Proceedings of the 15th International Conference,
ICA3PP 2015, Zhangjiajie, China, Part III. Springer
International Publishing, pp. 785–798.
Lee, E. 2008. Cyber Physical Systems: Design Challenges.
Technical Report UCB/EECS-2008-8. EECS
Department, UC California, Berkeley.
http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EE
CS-2008-8.html [online; Dec 20
th
2018].
Stouffer, K., Pillitteri, V. and Lightman, S. 2015. Guide to
industrial control systems (ICS) security. Special
Publication (NIST SP) - 800-82 Rev 2.
Sridhar, S., Hahn, A. and Govindarasu, M. 2012. Cyber–
Physical System Security for the Electric Power Grid.
In Proceedings of IEEE 100(1), pp 210-224.
Zhao, M., Walker, J. and Wang, C. 2013. Challenges and
Opportunities for Securing Intelligent Transportation
System. IEEE Journal on Emerging and Selected
Topics in Circuits and Systems 3(1), pp 96–105.
Haque, S., Aziz, S. and Rahman, M. 2014. Review of
Cyber-Physical System in Healthcare, International
Journal of Distributed Sensor Networks 10(4).
Falliere, N., Murchu, L. and Chien, E. 2011. W32. stuxnet
dossier, White paper, Symantec Corp., Security
Response 5.
https://www.symantec.com/content/dam/symantec/doc
s/security-center/white-papers/security-response-w32-
stuxnet-dossier-11-en.pdf [online: Dec 20
th
2018].
Symantec 2014. Dragonfly: Cyberespionage Attacks
against Energy Suppliers.
https://www.symantec.com/content/dam/symantec/doc
s/security-center/white-papers/dragonfly-
cyberespionage-attacks-14-en.pdf 2014 [online: Apr 6
th
2017].
Lee, R., Assante, M. and Conway, T. 2016. Analysis of the
cyber attack on the Ukrainian power grid. Electricity
Information Sharing and Analysis Center SANS-ISC
and E-ISAC.
Chandola, V., Banerjee, A. and Kuma, V. 2009. Anomaly
detection: A survey, ACM Computing Surveys Volume
41(3).
Monica, S, and Bergenti, F. 2018. Outline of a
Generalization of Kinetic Theory to Study Opinion
Dynamics, International Symposium on Distributed
Computing and Artificial Intelligence.
Monica, S, and Bergenti, F. 2016. An analytic study of
opinion dynamics in multi-agent systems, Computers &
Mathematics with Applications,
10.1016/j.camwa.2017.03.008.
Keung, Y., Li, B. and Zhang, Q. 2010. The intrusion
detection in mobile sensor network, in Proceedings of
the eleventh ACM international symposium on Mobile
ad hoc networking and computing (MobiHoc '10).
ACM, New York, 2010, 11-20.
Pareschi, L. and Toscani, G. 2013. Interacting Multiagent
Systems: Kinetic Equations and Montecarlo Methods,
Oxford University Press, Oxford.
Bellouquid, A. and Delitala, M. 2006. Mathematical
Modelling of Complex Biological Systems, Birkhäuser,
Boston.
Eigner, O., Kreimel P. and Tavolato, P. 2018. Attacks on
Industrial Control Systems – Modelling and Anomaly
Detection. In ICISSP 2018 - 4th International
Conference on Information Systems Security and
Privacy, 2nd International Workshop on FORmal
methods for Security Engineering – ForSE.
SCITEPRESS.
Analytical Modelling of Cyber-physical Systems
689