conditioning system. Additionally, before any data
is transmitted between the components, they encrypt
their messages to avoid eavesdropping attacks. These
additional steps (authorisation and encryption) are
mainly security-related tasks, which are not directly
linked to the purpose of the interaction and produce
costs (e.g. execution time, computing resources, etc.).
Due to the complexity of interactions, the num-
ber of participating components and performed tasks,
an approach is needed to measure how much it costs
for providing security at runtime. Measuring security
costs of an interaction enables (i) redesigning inter-
actions to produce less security-related costs, (ii) pre-
dicting future security costs based on past measure-
ments, and (iii) detecting anomalies based on the ex-
pected security costs in comparison to actually mea-
sured security costs of an interaction. To address
this challenge, we propose an initial approach to au-
tomatically measure the resulting costs of providing
security by using a Security Cost Modelling Frame-
work as shown in Figure 1. The proposed framework
is an extension of our previous work (Ivkic et al.,
2019), where we proposed an Onion Layer Model,
which formally describes a CPS including its inter-
actions, the participating components and their per-
formed tasks.
In this paper, we extend the Onion Layer Model
by proposing a Security Cost Modelling Framework,
which uses additional mechanisms to collect data
about the interacting components (Component Moni-
toring) and their performed tasks (Task Tracing). The
gathered runtime data is then combined with a Cost
Metric Catalogue, which contains security cost met-
rics and is used to measure the security-related tasks
performed by components during interactions. Fur-
thermore, we extend the Onion Layer Model to be
able to measure security costs at a specific point in
time, explain how these mechanisms could be used
in a harness for measuring security costs and discuss
how they can be implemented.
The remainder of this paper is organised as fol-
lows: Section II summarises the related work in the
field and presents the background of this paper. Next,
in Section III, we present a use case for measuring
and controlling the temperature of a physical room.
Based on that we present the Security Cost Modelling
Framework and explain the building blocks needed to
measure security costs at runtime. Finally, in Section
IV we give an outline of future work in the field.
2 RELATED WORK
There are various approaches, platforms and frame-
works supporting the CPS and IoT movement. Derha-
my et al. (2015) summarise commercially avail-
able IoT frameworks including the IoTivity frame-
work (IoTivity, 2015), the IPSO Alliance framework
(Shelby and Chauvenet, 2012), the Light Weight Ma-
chine to Machine (LWM2M) framework (Alliance,
2012), the AllJoyn framework (Alliance, 2016) and
the Smart Energy Profile 2.0 (SEP2.0) (Alliance and
Alliance, 2013). Most of the cloud-based frameworks
follow a data-driven architecture in which all involved
IoT-components are connected to a global cloud using
one SOA protocol. The Arrowhead Framework (Dels-
ing, 2017), on the contrary, follows an event-driven
approach, in which a local cloud is governed through
the use of core systems for registering and discovering
service, authorisation and orchestration. Since every-
thing within an Arrowhead Local Cloud is a service,
new supporting systems can be developed and added
to the already existing ones.
Regarding cyber security, there are many studies
proposing approaches and frameworks which focus
on evaluating security without referring to the result-
ing costs. Additionally, some of the presented ap-
proaches are limited by the usage of a single met-
ric, like process performance in Dumas et al. (2013),
and Gruhn and Laue (2006). Even though this metric
could help to estimate the costs of security it is mainly
used to evaluate the process of software implementa-
tion. Other related work focuses on methods for mea-
suring how secure a specific system is by evaluating
whether a security control has been implemented or
not (Hayden, 2010; Pfleeger, 2009; Tariq, 2012; Luna
et al., 2011). Unfortunately, these approaches provide
little insight into how to measure the costs of security.
Yee (2013) provides a summary of related work re-
garding security metrics. He first explains that many
security metrics exist, but most of them are ineffective
and not meaningful. Furthermore, the author provides
a definition of a good and a bad metric and applies
his definition on various frameworks in a literature re-
search.
This paper builds on Ivkic et al. (2019) where we
introduce an Onion Layer Model for formally describ-
ing how the costs of security can be modelled within a
CPS. This initial investigation included a mathemati-
cal expression for describing the costs of security dur-
ing the interaction of components and their performed
security-related tasks. Additionally, we showed how
the Onion Layer Model could be used to evaluate the
costs of security for two specific use cases in an ex-
emplary evaluation. To extend this work the key new
contribution of this paper is to present an approach for
automatically identifying the components of an inter-
action and their performed tasks at runtime. Further-
more, we extend the previous mathematical expres-
A Framework for Measuring the Costs of Security at Runtime
489