A systematic mapping study on security for systems of systems
2023, International Journal of Information Security
https://doi.org/10.1007/S10207-023-00757-0Abstract
In the late twentieth century, the term "System of Systems" (SoS) became popular to describe a complex system made up of a combination of independent constituent systems. Since then, several studies have been conducted to support and assess SoS management, functionality, and performance. Due to the evolutionary nature of SoS and the non-composability of the security properties of its constituent systems, it is difficult to assess or evaluate SoS security. This paper provides an up-to-date survey on SoS security, aimed at stimulating and guiding further research efforts. This systematic mapping study (SMS) focuses on SoS security, privacy, and trust. Our SMS identified 1828 studies from 6 digital libraries, 87 of which were selected that presented approaches analyzing, evaluating, or improving security. We classified these studies using nine research questions that focused on the nature of the studies, the studied SoS, or the study validation. After examining the selected studies, we identified six gaps and as many future work directions. More precisely, we observed that few studies examine SoS problems and instead propose specific solutions, making it challenging to develop generalizable approaches. Furthermore, the lack of standardization has hindered the reuse of existing approaches, making it difficult for solutions to be generalized to other SoS. In addition, the lack of descriptions of industrial environments in the literature makes it difficult to design realistic validation environments. As a result, the validation of new SoS research remains a challenge in the field.
References (128)
- 21 Application of cybersecurity in emerging C4ISR systems [33] 22 Applying model-based systems engineering approach to smart grid software systems security requirements [59] 23
- Architecting System of Systems Solutions with Security and Data-Protection Principles [60] 24 Architectural Patterns for Self-Organizing Systems-of-Systems [34] 25
- Assessing Security Risk and Requirements for Systems of Systems [61] 26
- Assessing System of Systems Security Risk and Requirements with OASoSIS [62] 27 Automated and Secure Onboarding for System of Systems [32] 28 Autonomous Distributed Electronic Warfare System of Systems [63] 29 Beyond connected cars: A systems of systems perspective [64] 30 Clock synchronization considerations in security informed safety assurance of autonomous systems of systems [65] 31
- Context-Aware Security Solutions for Cyber Physical Systems [66] 32 Cybersecurity as a centralized directed system of systems using SoS explorer as a tool [67] 33 Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles [68] 34
- Cybersecurity Considerations for an Interconnected Self-Driving Car System of Systems [69] 35
- Defining "The Weakest Link": Comparative Security in Complex Systems of Systems [26] 36 Dependable System of Systems Engineering: the COMPASS Project [70] Identification of Security Requirements in Systems of Systems by Functional Security Analysis [74] 42 Incorporating Attacks Modeling into Safety Process [75] 43 Introduction to Security and Quality Improvement in Complex Cyber-Physical Systems Engineering [76] 44 Investigating Attack Propagation in a SoS via a Service Decomposition [37] 45 IoTSAT: A formal framework for security analysis of the internet of things (IoT) [77] 46 Managing runtime re-engineering of a System-of-Systems for cybersecurity [78] 47 Model-Driven Software Security Architecture of Systems-of-Systems
- Model-based Development of a System of Systems Using Unified Architecture Framework (UAF): A Case Study [80] 49 Modeling human-technology interaction as a sociotechnical System of Systems [30] 50
- Modeling, analyzing, and predicting security cascading attacks in smart buildings systems-of-systems [38] 51 Nncs: Randomization and informed search for novel naval cyber strategies [27] 52 On Defense Strategies for Recursive System of Systems Using Aggregated Correlations [81] 53 Predictive Control in the Era of Networked Control and Communication-a Perspective [82] 54 Promoting trust in interoperability of systems-of-systems [39] 55 Safety vs. Security-related trade-offs and emergent behaviors in cyber-physical systems [83] 56 Securing System-of-Systems through a Game Theory Approach [84] 57 Security and Autonomic Management in System of Systems [85] 58 Security Assessment of Systems of Systems [86] 59 Security Standard Compliance Verification in System of Systems [87] 60
- Smart City Security Issues: Depicting information security issues in the role of an urban environment [88] 61 Strategic foresight and resilience through cyber-wargaming [89] 62 System of Systems Characterization assisting Security Risk Assessment [90] 63 System of Systems Composition Based on Decentralized Service-Oriented Architecture [91] 64 System of Systems dependability-Theoretical models and applications examples [92] 65 System of Systems Security [93] 66 System security requirements analysis: A smart grid case study [94] 67 Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach [95] 68 Toward Attack Models in Autonomous Systems of Systems [96] 69 Toward Methodological Support for Secure Architectures of Software-intensive Systems-of-systems
- Toward Model-Driven Architecture and Analysis of System of Systems Access Control [98] 71 Toward modeling and analyzing non-functional properties of systems of systems [99] 72 Toward Security Software Engineering the Smart Grid as a System of Systems [100] [104] 79 Challenges in security engineering of systems-of-systems [105] 80
- Communications, information, and cybersecurity in systems-of-systems: assessing the impact of attacks through interdependency analysis [106] 81 Critical infrastructure protection: a twenty-first century challenge [107] 82 Cyber-physical systems security: A survey [108] 83 Development of Secure System of Systems Needing a Rapid Deployment [109] 84 Misbehavior monitoring on system-of-systems components [110] 85 Securing complex system-of-systems compositions [111] 86 Security engineering in a system of systems environment [112] 87 Systems of Systems with Security [113] References
- Graciano Neto, V. V., Guessi, M., Oliveira, L. B. R., Oquendo, F., Nakagawa, E. Y.: Investigating the model-driven development for systems-of-systems. In: Proceedings of the 2014 European Conference on Software Architecture Workshops -ECSAW '14, New York, New York, USA: ACM Press, 2007, pp. 1-8. https:// doi.org/10.1145/2642803.2642825
- Bianchi, T., Santos, D. S., Felizardo, K. R.: Quality attributes of systems-of-systems: a systematic literature review. In: Proceed- ings of the 3rd International Workshop on Software Engineering for Systems-of-Systems, SESoS 2015, pp. 23-30, (2015). https:// doi.org/10.1109/SESoS.2015.12
- Maier, M.W.: Architecting principles for systems-of-systems. Syst. Eng. 1, 267-284 (1998). https://doi.org/10.1002/(SICI )1520-6858(1998)1:4%3C267::AID-SYS3%3E3.0.CO;2-D
- Petković, M., Jonker, W.: Security, Privacy, and Trust in Mod- ern Data Management. Springer, Berlin (2007). https://doi.org/ 10.1007/978-3-540-69861-6
- Olivero, M. A., Bertolino, A., Dominguez-Mayo, F. J., Escalona, M. J., Matteucci, I.: Addressing security properties in systems of systems: challenges and ideas. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelli- gence and Lecture Notes in Bioinformatics), Vol. 11732 LNCS, pp. 138-146, (2019). https://doi.org/10.1007/978-3-030-30856- 8_10
- Kitchenham, B., Charters, S.: Guidelines for performing Sys- tematic Literature reviews in Software Engineering Version 2.3. Engineering 45(4ve), 1051 (2007). https://doi.org/10.1145/1134 285.1134500
- Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineer- ing, Vol. 17, p. 10, (2008). https://doi.org/10.1142/S021819400 7003112
- Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for con- ducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. (2015). https://doi.org/10.1016/j.in fsof.2015.03.007
- Boulding, K.E.: General systems theory-the skeleton of science. Manage. Sci. 2(3), 197-208 (1956)
- Maier, M. W.: Research challenges for systems-of-systems context: collaborative systems. In: Aerospace Corporation, pp. 1-6, (2005). Available: http://ieeexplore.ieee.org/stamp/st amp.jsp?tp=&arnumber=1571630&isnumber=33257
- Budgen, D., Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceeding of the 28th International Conference on Software Engineering-ICSE '06, sn, (2006), p. 1051. https://doi.org/10.1145/1134285.1134500
- Klein, J., Van Vliet, H.: A systematic review of system-of-systems architecture. In: QoSA 2013 -Proceedings of the 9th International ACM Sigsoft Conference on the Quality of Software Archi- tectures, pp. 13-21, (2013). https://doi.org/10.1145/2465478.24 65490
- Nielsen, C.B., Larsen, P.G., Fitzgerald, J., Woodcock, J., Peleska, J.: Systems of systems engineering: basic concepts, model-based techniques, and research directions. ACM Comput. Surv. 48(2), 1-41 (2015). https://doi.org/10.1145/2794381
- Axelsson, J.: A systematic mapping of the research literature on system-of-systems engineering. In: 2015 10th System of Systems Engineering Conference (SoSE), pp. 18-23 (2015)
- Guessi, M., Neto, V. V. G., Bianchi, T., Felizardo, K. R., Oquendo, F., Nakagawa, E. Y.: A systematic literature review on the description of software architectures for systems of systems. In: Proceedings of the ACM Symposium on Applied Computing, Vol. 13-17-Apri, No. v, pp. 1433-1440, (2015). https://doi.org/ 10.1145/2695664.2695795
- Vargas, I. G., Gottardi, T., Teresinha, R., Braga, V.: Approaches for integration in system of systems: A systematic review. In: Pro- ceedings -4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, pp. 32-38, (2016). https:// doi.org/10.1145/2897829.2897835
- Daneva, M., Lazarov, B.: Requirements for smart cities: results from a systematic review of literature. In: 2018 12th Interna- tional Conference on Research Challenges in Information Science (RCIS), in International Conference on Research Challenges in Information Science, Vol. 2018-May. IEEE, May 2018, pp. 1-6. https://doi.org/10.1109/RCIS.2018.8406655
- Olivero, M.A., Bertolino, A., Dominguez-Mayo, F.J., Matteucci, I., Escalona, M.J.: A delphi study to recognize and assess systems of systems vulnerabilities. Inf. Softw. Technol. 68, 74 (2022). https://doi.org/10.1016/j.infsof.2022.106874
- Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. ACM Int. Conf. Proc. Ser. (2014). https://doi.org/10.1145/2601248.2601268
- Johannesson, P., Perjons, E.: An Introduction to Design Sci- ence.
- Springer, Cham (2014). https://doi.org/10.1007/978-3-319- 10632-8
- DoD: Chapter 4-Systems Engineering. In: DoD Defense Aqui- sition Guidebook, (2004)
- Dahmann, J. S., Baldwin, K. J.: Understanding the current state of US defense systems of systems and the implications for systems engineering. In: 2008 IEEE International Systems Conference Proceedings, SysCon 2008, pp. 99-105 (2008). https://doi.org/ 10.1109/SYSTEMS.2008.4518994
- Shull, F., Singer, J., Sjoberg, D. I. K.: Guide to Advanced Empiri- cal Software Engineering, (2008). https://doi.org/10.1007/978-1- 84800-044-5
- Zhou, X., Jin, Y., Zhang, H., Li, S., Huang, X.: A map of threats to validity of systematic literature reviews in software engineering. In: Proceedings of the Asia-Pacific Software Engineering Confer- ence, APSEC, (2016). https://doi.org/10.1109/APSEC.2016.031
- He, F., Agwuegbo, C., Rao, N. S. V., Ma, C. Y. T.: A sequen- tial game of defense and attack on an interdependent system of systems. In: 2018 21st International Conference on Information Fusion, FUSION 2018, pp. 2535-2541 (2018). https://doi.org/10. 23919/ICIF.2018.8455314
- Pieters, W.: Defining 'the weakest link': comparative security in complex systems of systems. In: 2013 IEEE 5th Interna- tional Conference on Cloud Computing Technology and Science (CLOUDCOM), Vol 2. International Conference on Cloud Com- puting Technology and Science, pp. 39-44 (2013). https://doi.org/ 10.1109/CloudCom.2013.101
- Rubin, S.H., Bouabana-Tebibel, T.: Nncs: Randomization and informed search for novel naval cyber strategies. Stud. Comput. Intell. 621, 193-223 (2015). https://doi.org/10.1007/978-3-319- 26450-9_8
- Montanari, M., Campbell, R. H., Sampigethaya, K., Li, M. : A security policy framework for eEnabled fleets and airports. In: 2011 Aerospace Conference, pp. 1-11 (2011). https://doi.org/10. 1109/AERO.2011.5747379
- Causevic, A.: A risk and threat assessment approaches overview in autonomous systems of systems. In: 2017 XXVI International conference on Information, Communication and Automation Technologies (ICAT), Institute of Electrical and Electronics Engi- neers Inc., pp. 1-6 (2017). https://doi.org/10.1109/ICAT.2017.81 71624
- Turnley, J., et al.: Modeling human-technology interaction as a sociotechnical system of systems. In: 2017 12th System of Sys- tems Engineering Conference (SOSE), (2017)
- Silva, E., Batista, T., Oquendo, F.: A mission-oriented approach for designing system-of-systems. In: 015 10th System of Sys- tems Engineering Conference (SoSE), IEEE, pp. 346-351 (2015). https://doi.org/10.1109/SYSOSE.2015.7151951
- Maksuti, S., et al.: Automated and secure onboarding for system of systems. IEEE Access 9, 111095-111113 (2021). https://doi. org/10.1109/ACCESS.2021.3102280
- Malik, A. A., Mahboob, A., Khan, A., Zubairi, J.: Application of cyber security in emerging C4ISR systems, (2011). https://doi. org/10.4018/978-1-60960-851-4.ch012
- Nichols, C., Dove, R.: Architectural patterns for self-organizing systems-of-systems. In: 21st Annual International Symposium of the International Council on Systems Engineering, INCOSE 2011, pp. 851-862 (2011). https://doi.org/10.1002/j.2334-5837.2011.tb 01246.x
- Olivero, M.A., Bertolino, A., Domínguez-Mayo, F.J., Escalona, M.J., Matteucci, I.: Digital persona portrayal: Identifying pluri- dentity vulnerabilities in digital life. J. Inf. Secur. Appl. 52, 102492 (2020). https://doi.org/10.1016/j.jisa.2020.102492
- Finke, M., de Waard, P., Recchilongo, P., Lahaije, R., Baumann, U.: Validating a European ATM security system architecture. In: 2018 IEEE/AIAA 37th Digital Avionics Systems Confer- ence (DASC). IEEE-AIAA Digital Avionics Systems Conference. IEEE, pp. 27-35 (2018). https://doi.org/10.1109/DASC.2018.85 69498
- Lisova, E., El Hachem, J., Causevic, A.: Investigating attack prop- agation in a SoS via a service decomposition. In: G. M. O. K. R.-M. S. S. Y. W. S. W. Z. Chang C.K., Chen P. (Ed.), 2019 IEEE World Congress on Services (SERVICES), Institute of Electrical and Electronics Engineers Inc., pp. 9-14 (2019). https://doi.org/ 10.1109/SERVICES.2019.00017
- Hachem, J.E.L., et al.: Modeling, analyzing and predicting secu- rity cascading attacks in smart buildings systems-of-systems. J. Syst. Softw. 162, 110484 (2020). https://doi.org/10.1016/j.jss. 2019.110484
- Allian, A. P., Paulo, S., Allian, A. P.: Promoting trust in inter- operability of systems-of-systems. In: Proceedings of the 13th European Conference on Software Architecture-ECSA '19 - volume 2, vol. 2, pp. 67-70, (2019). https://doi.org/10.1145/33 44948.3344953
- Nicklas, J., Mamrot, M., Winzer, P., Lichte, D., Marchlewitz, S., Wolf, K.: Use case based approach for an integrated consideration of safety and security aspects for smart home applications. In: 2016 11th System of Systems Engineering Conference (SoSE), pp. 1-6 (2016). https://doi.org/10.1109/SYSOSE.2016.7542908
- Corallo, A., Lazoi, M., Lezzi, M., Luperto, A.: Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. In: Computers in Industry, vol. 137.
- Elsevier B.V., (2022). https://doi.org/10.1016/j.compind.2022.10 3614
- Chen, D., Meinke, K., Ostberg, K., Asplund, F., Baumann, C.: A knowledge-in-the-loop approach to integrated safety and security for cooperative system-of-systems. In: 2015 IEEE 7th Inter- national Conference on Intelligent Computing and Information Systems (ICICIS), pp. 13-20 (2015).
- Mexis, N., Anagnostopoulos, N. A., Chen, S., Bambach, J., Arul, T., Katzenbeisser, S.: A lightweight architecture for hardware- based security in the emerging era of systems of systems. In: ACM J Emerg Technol Comput Syst, vol. 17, no. 3, (2021). https://doi. org/10.1145/3458824
- Mohamed, N., Al-Jaroodi, J.: A middleware framework to address security issues in integrated multisystem applications. In: SysCon 2019-13th Annual IEEE International Systems Conference, Proceedings, (2019). https://doi.org/10.1109/SYSCON.2019.88 36792
- Hachem, J. E., Khalil, T. A., Chiprianov, V., Babar, A., Aniorte, P.: A model driven method to design and analyze secure archi- tectures of systems-of-systems. In; Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, Institute of Electrical and Electronics Engi- neers Inc., pp. 166-169 (2017). https://doi.org/10.1109/ICECCS. 2017.31
- Adetoye, A., Creese, S., Goldsmith, M., Hopkins, P.: A modelling approach for interdependency in digital systems-of-systems secu- rity-extended abstract. In: Xenakis, C., Wolthusen, S. (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinfor- matics). Lecture Notes in Computer Science, vol. 6712 LNCS. Heidelberger platz 3, D-14197. Springer, Berlin, pp. 153-156 (2011). https://doi.org/10.1007/978-3-642-21694-7_13
- Javed, Y., Felemban, M., Shawly, T., Kobes, J., Ghafoor, A.: A partition-driven integrated security architecture for cyberphysi- cal systems. Computer (Long Beach Calif) 53(3), 47-56 (2020). https://doi.org/10.1109/MC.2019.2914906
- Hatzivasilis, G., Papaefstathiou, I., Manifavas, C., Papadakis, N.: A reasoning system for composition verification and security validation. In: 2014 6th International Conference on New Tech- nologies, Mobility and Security (NTMS), pp. 1-4 (2014). https:// doi.org/10.1109/NTMS.2014.6814001
- Ruiz, J. F., Rudolph, C., Mana, A., Arjona, M.: A security engi- neering process for systems of systems using security patterns. In: 2014 8th Annual IEEE Systems Conference (SYSCON). Annual IEEE Systems Conference, pp. 8-11 (2014)
- Trivellato, D., Zannone, N., Etalle, S.: A security framework for systems of systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, pp. 182-183 (2011). https://doi.org/10.1109/POLICY.2011.16
- D. el D. I. Abou-Tair, Alouneh, S., Khalifeh, A., Obermaisser, R.: A security framework for systems-of-systems. In: Park, J.J., Loia, V., Yi, G., Sung, Y. (Eds.), Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol. 474, pp. 427-432 (2018). https://doi.org/10.1007/978-981- 10-7605-3_70
- Feng, N., Wang, H.J., Li, M.: A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256, 57-73 (2014). https://doi.org/10.1016/j.ins.2013.02.036
- Aigner, A., Khelil, A.: A security scoring framework to quantify security in cyber-physical systems. In: Proceedings of the 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2021, Institute of Electrical and Electronics Engi- neers Inc., pp. 199-206 (2021). https://doi.org/10.1109/ICPS49 255.2021.9468168
- Carturan, S. B. O. G., Goya, D. H.: A systems-of-systems secu- rity framework for requirements definition in cloud environment. In: Proceedings of the 13th European Conference on Software Architecture -Volume 2, ECSA '19. New York, NY, USA: ACM, pp. 235-240 (2019). https://doi.org/10.1145/3344948.3344977
- Petratos, P., Faccia, A.: Accounting information systems and system of systems: assessing security with attack surface method- ology. In: Proceedings of 2019 3rd International Conference On Cloud And Big Data Computing (ICCBDC 2019). ICCBDC 2019. New York, USA: ACM, pp. 100-105 (2019). https://doi.org/10. 1145/3358505.3358513
- Olivero, M. A., Bertolino, A., Dominguez-Mayo, F. J., Escalona, M. J., Matteucci, I.: Addressing security properties in sys- tems of systems: challenges and ideas. In: Calinescu, R., Di Giandomenico, F., (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Sci- ence, vol. 11732.Springer, Cham, pp. 138-146 (2019). doi: https:// doi.org/10.1007/978-3-030-30856-8_10.
- Dahmann, J., Rebovich, G., Turner, G.: An actionable framework for system of systems and mission area security engineering. In: 2014 8th Annual IEEE Systems Conference (SYSCON), Annual IEEE Systems Conference, pp. 12-17 (2014). https://doi.org/10. 1109/SysCon.2014.6819229
- Canzani, E., Kaufmann, H., Lechner, U.: An operator-driven approach for modeling interdependencies in critical infrastruc- tures based on critical services and sectors. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artifi- cial Intelligence and Lecture Notes in Bioinformatics), vol. 10242 LNCS, pp. 308-320, (2017). https://doi.org/10.1007/978-3-319- 71368-7_27
- Lakshminarayanan, S., Souvannarnarth, M.: Applying model based systems engineering approach to smart grid software systems security requirements. In: 22nd Annual International Symposium of the International Council on Systems Engineer- ing, INCOSE 2012 and the 8th Biennial European Systems Engineering Conference 2012, EuSEC 2012, Rome, pp. 13-20 (2012). [Online]. Available: https://www.scopus.com/inward/re cord.uri?eid=2-s2.0-84883526951&partnerID=40&md5=d969 4907fae25abf87b6ecf6aefec6a3
- Khashooei, B. A., Vasenev, A., Kocademir, H. A., Mathijssen, R.: Architecting system of systems solutions with security and data-protection principles. In: 2021 16th International System of Systems Engineering Conference, SoSE 2021, Institute of Elec- trical and Electronics Engineers Inc., pp. 43-48 (2021). https:// doi.org/10.1109/SOSE52739.2021.9497461
- Ki-Aries, D.: Assessing security risk and requirements for sys- tems of systems. In: 2018 IEEE 26th International Requirements Engineering Conference (RE), pp. 454-459 (2018). https://doi. org/10.1109/RE.2018.00061
- Ki-Aries, D., Faily, S., Dogan, H., Williams, C.: Assessing sys- tem of systems security risk and requirements with OASoSIS. In: B. K. L. S.-W. Faily S., Mead N. (Eds.), 2018 IEEE 5th Inter- national Workshop on Evolving Security Privacy Requirements Engineering (ESPRE). Institute of Electrical and Electronics Engineers Inc., pp. 14-20 (2018). https://doi.org/10.1109/ESPRE. 2018.00009
- Burton, I., Straub, J.: Autonomous distributed electronic warfare system of systems. In: 2019 14th Annual Conference System of Systems Engineering (SOSE), pp. 96-101 (2019)
- Pelliccione, P., et al.: Beyond connected cars: a systems of systems perspective. Sci. Comput. Program. 191, 102414 (2020). https:// doi.org/10.1016/j.scico.2020.102414
- Lisova, E., Čaušević, A., Uhlemann, E., Björkman, M.: Clock synchronization considerations in security informed safety assur- ance of autonomous systems of systems. In: IECON 2017 -43rd Annual Conference of the IEEE Industrial Electronics Society, pp. 8385-8390 (2017). https://doi.org/10.1109/IECON.2017.82 17473
- Wan, K., Alagar, V.: Context-aware security solutions for cyber physical systems. In: Vinh, P.C., Hung, N.M., Tung, N.T., Suzuki, J. (Eds.), Context-Aware Systems and Applications, (ICCASA 2012). Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, vol. 109, pp. 18-29 (2013)
- Ashiku, L., Dagli, C.: Cybersecurity as a centralized directed system of systems using SoS explorer as a tool. In: 2019 14th Annual Conference System of Systems Engineering, SoSE 2019, pp. 140-145 (2019). https://doi.org/10.1109/SYSOSE.2019.87 53872
- Axelrod, C. W.: Cybersecurity challenges of systems-of-systems for fully-autonomous road vehicles. In: 2017 13th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT), pp. 1-6 (2017). https://doi.org/10.1109/CEWIT. 2017.8263141
- Straub, J., et al.: CyberSecurity considerations for an intercon- nected self-driving car system of systems. In: 2017 12th System of Systems Engineering Conference (SOSE), (2017)
- Fitzgerald, J., Riddle, S., Casoto, P., Kristensen, K.: Dependable system of systems engineering: the COMPASS project. ERCIM NEWS 97, 26-27 (2014)
- Hofer, F.: Enhancing security and reliability for smart-systems' architectures. In: 2018 IEEE International Symposium on Soft- ware Reliability Engineering Workshops (ISSREW), pp. 150-153 (2018). https://doi.org/10.1109/ISSREW.2018.000-8
- El Hachem, J., et al.: Extending a multi-agent systems simulation architecture for systems-of-systems security analysis to cite this version: HAL Id: hal-01908398 Extending a Multi-Agent Sys- tems Simulation Architecture for Systems-of-Systems Security Analysis, (2018)
- Cioroaica, E., Purohit, A., Buhnova, B., Schneider, D.: Goals within trust-based digital ecosystems. In: Proceedings -2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems, SESoS/WDES 2021, Institute of Electrical and Electronics Engineers Inc., pp. 1-7 (2021). https://doi.org/10. 1109/SESoS-WDES52566.2021.00006
- Fuchs, A., Rieke, R.: Identification of security requirements in systems of systems by functional security analysis. In: Casimiro, A., DeLemos, R., Gacek, C. (Eds.), Architecting Dependable Systems VII. Lecture Notes in Computer Science, vol. 6420. Hei- delberger platz 3, D-14197. Springer, Berlin, pp. 74-96 (2010). https://doi.org/10.1007/978-3-642-17245-8
- Surkovic, A., et al.: Incorporating attacks modeling into safety process. In: Gallina, B., kavhaug, A., Schoitsch, E., Bitsch, F. (Eds.), Computer Safety, Reliability, and Security, SAFECOMP 2018. Lecture Notes in Computer Science, vol. 11094. Gewerbe- strasse 11, Cham, CH-6330, Switzerland: Springer international publishing AG, pp. 31-41 (2018). https://doi.org/10.1007/978-3- 319-99229-7_4
- Biffl, S., Eckhart, M., Lüder, A., Weippl, E.L Introduction to secu- rity and quality improvement in complex cyber-physical systems engineering. In: Security and Quality in Cyber-Physical Systems Engineering. Springer, Cham, pp. 1-29 (2019). https://doi.org/10. 1007/978-3-030-25312-7_1
- Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., Rahman, M. A.: IoTSAT: A formal framework for security analysis of the internet of things (IoT). In: 2016 IEEE Conference on Commu- nications and Network Security, CNS 2016, IEEE Conference on Communications and Network Security. Institute of Electrical and Electronics Engineers Inc., pp. 180-188 (2017). https://doi. org/10.1109/CNS.2016.7860484
- Waller, A., Craddock, R.: Managing runtime re-engineering of a System-of-Systems for cyber security. In: 2011 6th International Conference on System of Systems Engineering, Albuquerque, NM, pp. 13-18 (2011). https://doi.org/10.1109/SYSOSE.2011.59 66566
- El Hachem, J., et al.: Model driven software security architecture of systems-of-systems. In: R. S. D. J. Potanin A., Murphy G.C. (Eds.), Proceedings -Asia-Pacific Software Engineering Confer- ence, APSEC, IEEE Computer Society, pp. 89-96 (2016). https:// doi.org/10.1109/APSEC.2016.023
- Eichmann, O. C., Melzer, S., God, R.: Model-based develop- ment of a system of systems using unified architecture framework (UAF): a case study. In: 2019 IEEE International Systems Confer- ence (SysCon), Institute of Electrical and Electronics Engineers Inc., pp. 1-8 (2019). https://doi.org/10.1109/SYSCON.2019.88 36749
- Rao, N. S. V., Ma, C. Y. T., He, F.: On defense strategies for recur- sive system of systems using aggregated correlations. In: 2018 21st International Conference on Information Fusion (FUSION), pp. 507-514 (2018)
- Lucia, S., Kögel, M., Zometa, P., Quevedo, D.E.E., Findeisen, R.: Predictive control in the era of networked control and commu- nication-a perspective. IFAC-PapersOnLine 48(23), 322-331 (2015). https://doi.org/10.1016/j.ifacol.2015.11.302
- Schoitsch, E.: Safety versus security-related trade-offs and emergent behaviours in cyber-physical systems. In: IDIMT 2013-Information Technology Human Values, Innovation and Economy, 21st Interdisciplinary Information Management Talks, Prague, 2013, pp. 181-196. [Online]. Available: https://www. scopus.com/inward/record.uri?eid=2-s2.0-84896816527&partne rID=40&md5=f86758a419963b0d4d3b535a4f142382
- El Hachem, J., Lisova, E., Cauševic, A.: Securing system-of- systems through a game theory approach. In: Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, pp. 1443-1446 (2021). https://doi.org/10. 1145/3412841.3442125
- Maksuti, S., Zsilak, M., Tauber, M., Delsing, J.: Security and auto- nomic management in system of systems. Infocommun. J. 13(3), 66-75 (2021). https://doi.org/10.36244/ICJ.2021.3.7
- Olivero, M. A., et al.: Security assessment of systems of sys- tems. In: Proceedings of the 2019 IEEE/ACM 7th International Workshop on Software Engineering for Systems-of-Systems and 13th Workshop on Distributed Software Development, Soft- ware Ecosystems and Systems-of-Systems, SESoS-WDES 2019, pp. 62-65, (2019). https://doi.org/10.1109/SESoS/WDES.2019. 00017
- Bicaku, A., Zsilak, M., Theiler, P., Tauber, M., Delsing, J.: Secu- rity standard compliance verification in system of systems. IEEE Syst. J. (2021). https://doi.org/10.1109/JSYST.2021.3064196
- Ferraz, F. S., Guimaraes Ferraz, C. A.: Smart City Security Issues: Depicting information security issues in the role of a urban envi- ronment. In: 2014 IEEE/ACM 7th International Conference on Utility And Cloud Computing (UCC), International Conference on Utility and Cloud Computing, pp. 842-847 (2014)
- Ormrod, D., Scott, K.: Strategic foresight and resilience through cyber-wargaming. In: European Conference on Information Warfare and Security, ECCWS, pp. 319-327 (2019). [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2. 0-85070015147&partnerID=40&md5=e27d26e902877268806c 0a6ce2e2a103
- Ki-Aries, D., Faily, S., Dogan, H., Williams, C.: System of systems characterisation assisting security risk assessment. In: 2018 13th Annual Conference On System of Systems Engineering (SOSE), pp. 485-492 (2018)
- Derhamy, H., Eliasson, J., Delsing, J.: System of system compo- sition based on decentralized service-oriented architecture. IEEE Syst. J. 13(4), 3675-3686 (2019). https://doi.org/10.1109/JSYST. 2019.2894649
- Bukowski, L.: System of systems dependability-theoretical models and applications examples. Reliab. Eng. Syst. Saf. 151, 76-92 (2016). https://doi.org/10.1016/j.ress.2015.10.014
- Madan, B. B.: System of systems security. In: Rainey, L.B., Tolk, A (Eds.), Modeling and Simulation Support for System of Systems Engineering Applications, pp. 565-580 (2015). https://doi.org/10. 1002/9781118501757.ch21
- Zafar, N., Arnautovic, E., Diabat, A., Svetinovic, D.: System secu- rity requirements analysis: a smart grid case study. Syst. Eng. 17(1), 77-88 (2014). https://doi.org/10.1002/sys.21252
- Ceccarelli, A., et al.: Threat analysis in systems-of-systems: an emergence-oriented approach. ACM Trans. Cyber-Phys. Syst. 3(2), 18:1-18:24 (2018). https://doi.org/10.1145/3234513
- Surkovic, A., et al.: Towards attack models in autonomous sys- tems of systems. In: 2018 13th System of Systems Engineering Conference, SoSE 2018, Institute of Electrical and Electronics Engineers Inc., pp. 583-585 (2018). https://doi.org/10.1109/SY SOSE.2018.8428701
- El Hachem, J., Chiprianov, V., Babar, A., Aniorte, P.: Towards methodological support for secure architectures of software- intensive systems-of-systems. In: Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, SiSoS@ECSA '16. New York, NY, USA: ACM, pp. 9:1--9:6 (2016). https://doi. org/10.1145/3175731.3176178
- El Hachem, J.: Towards model driven architecture and analysis of system of systems access control. In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, pp. 867-870 (2015). https://doi.org/10.1109/ICSE.2015.280
- Chiprianov, V., Falkner, K., Gallon, L., Munier, M.: Towards modelling and analysing non-functional properties of systems of systems. In: CooK, S., Ireland, V., Gorod, A., Ferris, T., Do, Q. (Eds.), Proceedings of the 9th International Conference on System of Systems Engineering: The Socio-Technical Perspec- tive, SoSE 2014, pp. 289-294 (2014). https://doi.org/10.1109/SY SOSE.2014.6892503
- Chiprianov, V., Gallon, L., Salameh, K., Munier, M., El Hachem, J., El Hachem, J.: Towards security software engineering the smart grid as a system of systems. In: 2015 10th System of Systems Engineering Conference (SOSE), IEEE, pp. 77-82 (2015). https:// doi.org/10.1109/SYSOSE.2015.7151950
- Rein, A., Rieke, R., Jaeger, M., Kuntze, N., Coppolino, L.: Trust establishment in cooperating cyber-physical systems. In: Becue, A., CuppensBoulahia, N., Cuppens, F., Katsikas, S., Lambri- noudakis, C (Eds.), Security of Industrial Control Systems and Cyber Physical Systems. Lecture Notes in Computer Science, vol.
- Gewerbestrasse 11, Cham, Ch-6330, Switzerland: Springer International Publishing AG, pp. 31-47 (2016). https://doi.org/ 10.1007/978-3-319-40385-4_3
- El Hachem, J., Sedaghatbaf, A., Lisova, E., Causevic, A.: Using Bayesian networks for a cyberattacks propagation anal- ysis in systems-of-systems. In: 2019 26th Asia-Pacific Soft- ware Engineering Conference (APSEC), in Asia-Pacific Software Engineering Conference, vol. 2019-Decem. IEEE, Dec. 2019, pp. 363-370. https://doi.org/10.1109/APSEC48747.2019.00056
- Belloir, N., Chiprianov, V., Ahmad, M., Munier, M., Gallon, L., Bruel, J.-M. M.: Using relax operators into an MDE secu- rity requirement elicitation process for systems of systems. In: Proceedings of the 2014 European Conference on Software Archi- tecture Workshops, in ECSAW '14. New York, NY, USA: ACM, pp. 32:1-32:4 (2014). https://doi.org/10.1145/2642803.2642835
- Aigner, A., Khelil, A.: A scoring system to efficiently measure security in cyber-physical systems. In: 2020 IEEE 19th Interna- tional Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp. 1141-1145 (2020). https://doi.org/10.1109/TrustCom50675.2020.00151
- Chiprianov, V., Gallon, L., Munier, M., Aniorte, P., Lalanne, V.: Challenges in security engineering of systems-of-systems. In: Troisiéme Conférence en Ingénierie du Logiciel, no. June, pp. 137-151, (2014). Available: http://munier.perso.univ-pau.fr/ research/papers/2014/2014-CIEL/CIEL_2014_VC_LG_MM_ PAn_VL_actes.pdf
- Guariniello, C., DeLaurentis, D.: Communications, information, and cyber security in systems-of-systems: assessing the impact of attacks through interdependency analysis. Procedia Comput. Sci. 28(Cser), 720-727 (2014). https://doi.org/10.1016/j.procs.2014. 03.086
- Merabti, M., Kennedy, M., Hurst, W.: Critical infrastructure protection: A 21st century challenge. In: 2011 International Con- ference on Communications and Information Technology, ICCIT 2011, pp. 1-6 (2011). https://doi.org/10.1109/ICCITECHNOL. 2011.5762681
- Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security-a survey. IEEE Internet Things J. (2017). https://doi. org/10.1109/JIOT.2017.2703172
- Messe, N., Belloir, N., Chiprianov, V., Cherfa, I., Fleurquin, R., Sadou, S.: Development of secure system of systems needing a rapid deployment. In: 2019 14th Annual Conference System of Systems Engineering (SOSE), 345 E 47th St, New York, NY 10017 USA: IEEE, pp. 152-157 (2019)
- Shone, N., Shi, Q., Merabti, M., Kifayat, K.: Misbehaviour moni- toring on system-of-systems components. In: Crispo, B., Sandhu, R., CuppensBoulahia, N., Conti, M., Lanet, J.L., (eds.), 2013 International Conference on Risks and Security of Internet and Systems (CRISIS), in International Conference on Risks and Security of Internet and Systems (2013)
- Shone, N., Shi, Q., Merabti, M., Kifayat, K.: Securing complex system-of-systems compositions. In: European Conference on Information Warfare and Security, ECCWS, pp. 370-379 (2013). [Online]. Available: https://www.scopus.com/inward/record.uri? eid=2-s2.0-84893433123&partnerID=40&md5=dc00401df5ee 53497d159e63a6632059
- Dahmann, J., Rebovich, G., McEvilley, M., Turner, G.: Security engineering in a system of systems environment. In: 2013 7th annual IEEE international systems conference (SYSCON 2013), in Annual IEEE Systems Conference, pp. 364-369 (2013). https:// doi.org/10.1109/SysCon.2013.6549907
- Lauritsen, R. W.: Systems of systems with security, p. 30,34, (2013)