Systems Safety and Security—Challenges and Trends

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: closed (1 June 2023) | Viewed by 6900

Special Issue Editors


E-Mail Website
Guest Editor
Automatic Control, Computers & Electronic Department, Petroleum-Gas University of Ploiești, Ploiești, Romania
Interests: cyber security; industrial control system security; sensor networks; system resilience; system safety; smart technologies
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Automation and Industrial Informatics, Faculty of Automatic Control and Computers, University “Politehnica” of Bucharest, 313 Splaiul Independentei, 060042 Bucharest, Romania
Interests: networked-embedded sensing; information processing; control engineering; building automation; smart city; data analytics; computational intelligence; industry and energy applications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Computer Science and Software Engineering Department, Laval University, Quebec City, QC G1V 0A6, Canada
Interests: cryptographic protocols; anomaly and intrusion detection; machine learning; deep learning; cyber security; pen testing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue will present high-quality papers on system safety and security—two topics of growing importance in the global political, military and economic context. We invite all the researchers to submit their contribution on increasing the security and safety of the systems that are key components of critical infrastructures, such as energy production and distribution, water and wastewater management, defense, healthcare providers, transportation systems and communications.

This Special Issue will comprise mainly extended versions of selected papers that were presented at the International Workshop on Systems Safety and Security—IWSSS (https://iwsss.org), but other valuable and relevant contributions in this field could also be submitted.

The International Workshop on Systems Safety and Security was initiated in 2013 by an enthusiastic research team. Each year, the workshop has been a venue for presenting high-quality scientific contributions and has attracted an increasing network of international authors. The previous editions of our workshop have brought together renowned professors and researchers, practitioners, and implementers from industry, young scientists and specialists from all over the world, making IWSSS a real bridge between academia and industry. The presented contributions were published in the ECAI—Electronics, Computers and Artificial Intelligence International Conference Proceedings and were indexed by Clarivate Analytics—Web of Science CPCI. Selected contributions from IWSSS 2019 and IWSSS 2020 were published in the “Advanced Topics in Systems Safety and Security” Special Issue of Information (https://0-www-mdpi-com.brum.beds.ac.uk/journal/information/special_issues/IWSSS_2019).

We warmly invite researchers to submit their contributions to this Special Issue. Potential topics include but are not limited to:

  • System security and safety;
  • Industrial control system resilience;
  • Formal methods for security;
  • Data security and privacy in critical systems;
  • Physical and logical access control;
  • Biometric identification of persons;
  • Malware detection, modeling, and analysis methods;
  • Security assessment, pen testing, vulnerability evaluation;
  • Wireless sensor networks security;
  • Artificial intelligence used in the field of safety and security;
  • Industrial control system security;
  • Asset tracking, monitoring, and surveillance solutions;
  • Advanced encryption techniques.

Authors of invited papers should be aware that the final submitted manuscript must provide a minimum of 50% new content.

Dr. Emil Pricop
Dr. Grigore Stamatescu
Dr. Jaouhar Fattahi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

 

Keywords

  • System security
  • System safety
  • Industrial control system resilience
  • Cybersecurity
  • Information security.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 854 KiB  
Article
A Layered and Parallelized Method of Eventual Model Checking
by Yati Phyo, Moe Nandi Aung, Canh Minh Do and Kazuhiro Ogata
Information 2023, 14(7), 384; https://0-doi-org.brum.beds.ac.uk/10.3390/info14070384 - 06 Jul 2023
Viewed by 863
Abstract
Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce the state space explosion in model [...] Read more.
Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce the state space explosion in model checking. The idea of the technique is to split an original model checking problem for eventual properties into multiple smaller model checking problems and handle each smaller one. Due to the nature of the divide-and-conquer approach, each smaller model checking problem can essentially be tackled independently. Hence, this paper proposes a parallel technique/tool based on a master–worker pattern for the divide-and-conquer approach to model checking eventual properties. We carry out some experiments to show the effectiveness of our parallel technique/tool, which can somewhat enhance the running performance to a certain extent when conducting model checking for eventual properties. Full article
(This article belongs to the Special Issue Systems Safety and Security—Challenges and Trends)
Show Figures

Figure 1

32 pages, 7410 KiB  
Article
Evaluation of a Resilience-Driven Operational Concept to Manage Drone Intrusions in Airports
by Domenico Pascarella, Gabriella Gigante, Angela Vozella, Maurizio Sodano, Marco Ippolito, Pierre Bieber, Thomas Dubot and Edgar Martinavarro
Information 2023, 14(4), 239; https://0-doi-org.brum.beds.ac.uk/10.3390/info14040239 - 13 Apr 2023
Cited by 1 | Viewed by 1194
Abstract
The drone market’s growth poses a serious threat to the negligent, illicit, or non-cooperative use of drones, especially in airports and their surroundings. Effective protection of an airport against drone intrusions should guarantee mandatory safety levels but should also rely on a resilience-driven [...] Read more.
The drone market’s growth poses a serious threat to the negligent, illicit, or non-cooperative use of drones, especially in airports and their surroundings. Effective protection of an airport against drone intrusions should guarantee mandatory safety levels but should also rely on a resilience-driven operational concept aimed at managing the intrusions without necessarily implying the closure of the airport. The concept faces both safety-related and security-related threats and is based on the definitions of: (i) new roles and responsibilities; (ii) a set of operational phases, accomplished by means of specific technological building blocks; (iii) a new operational procedure blending smoothly with existing aerodrome procedures in place. The paper investigates the evaluation of such a resilience-driven operational concept tailored to drone-intrusion features, airport features, and current operations. The proposed concept was evaluated by applying it to a concrete case study related to Milan Malpensa Airport. The evaluation was carried out by real-time simulations and event tree analysis, exploiting the implementation of specific simulation tools and the assessment of resilience-oriented metrics. The achieved results show the effectiveness of the proposed operational concept and elicit further requirements for future counter-drone systems in airports. Full article
(This article belongs to the Special Issue Systems Safety and Security—Challenges and Trends)
Show Figures

Figure 1

27 pages, 6391 KiB  
Article
Digital Assistant for Arrival Scheduling with Conflict Prevention Capabilities
by Francesco Nebula, Roberto Palumbo, Gabriella Gigante and Angela Vozella
Information 2023, 14(4), 216; https://0-doi-org.brum.beds.ac.uk/10.3390/info14040216 - 01 Apr 2023
Viewed by 1330
Abstract
Nowadays, in view of the growing traffic volume, an appropriate aircraft sequencing in the arrival sector is needed to maintain safety levels and improve the performance of the runway system and flight times. This paper presents a digital assistant supporting the air traffic [...] Read more.
Nowadays, in view of the growing traffic volume, an appropriate aircraft sequencing in the arrival sector is needed to maintain safety levels and improve the performance of the runway system and flight times. This paper presents a digital assistant supporting the air traffic controller in aircraft sequencing by providing suggestions for next waypoints, speed adjustments and altitude holdings. On the one hand, the suggested paths are such to preserve safety by ensuring the prescribed minimum separation, while also promoting environmental benefits through continuous descent operations (CDO). On the other hand, the suggestions aim to reduce landing times, improving the runway throughput. The proposed tool exploits multipath planning, for which a global optimization technique is used in conjunction with the dynamic time warping distance metric and a reinforcement learning approach to resolve conflicts through speed modulation and/or altitude holding. The performances of the assistant are assessed by means of a multi-agent simulator tailoring its reasoning on the procedures of Olbia airport (Italy). The analysis of a stream of many random aircraft has revealed its effectiveness in terms of arrival time reduction against a standard first-come-first-served strategy, usually adopted by controllers, and strong conflict reduction while considering a CDO-like adherence. Additionally, the man/machine interaction is investigated through an analysis of the overall latency from the suggestions provided by the digital assistant up to the actual aircraft maneuvers. Full article
(This article belongs to the Special Issue Systems Safety and Security—Challenges and Trends)
Show Figures

Figure 1

15 pages, 3837 KiB  
Article
Attack Graph Utilization for Wastewater Treatment Plant
by Mariam Ibrahim and Abdallah Al-Wadi
Information 2022, 13(10), 494; https://0-doi-org.brum.beds.ac.uk/10.3390/info13100494 - 12 Oct 2022
Viewed by 1978
Abstract
In general, automation involves less human intervention, which leads to dependence on preprogrammed machines and processes that operate continually and carry out numerous tasks. This leads to predictable repeating behavior that can be used to advantage. Due to the incorporation of the Internet [...] Read more.
In general, automation involves less human intervention, which leads to dependence on preprogrammed machines and processes that operate continually and carry out numerous tasks. This leads to predictable repeating behavior that can be used to advantage. Due to the incorporation of the Internet of Things into such automated processes, these cyber–physical systems are now vulnerable to cyberattacks, the patterns of which can be difficult to identify and understand. Wastewater treatment plants (WTPs) can be challenging to run, but the treatment process is essential since drinking water and water that can be recycled are extremely important to obtain. The increasing susceptibility of WTPs to cyberattacks brought on by exploitation of their weaknesses poses a further challenge. Understanding system weaknesses and potential exploits is necessary for securing such cyber–physical systems. An attack graph utilization and visualization approach for WTPs is presented in this paper. A formal modeling and encoding of the system were carried out using a structural framework (AADL). The system model was then continuously checked by a model-checker called JKind against security requirements to create attack routes, which were then merged into an attack graph using a tool called GraphViz. Full article
(This article belongs to the Special Issue Systems Safety and Security—Challenges and Trends)
Show Figures

Figure 1

Back to TopTop