entropy-logo

Journal Browser

Journal Browser

Security Informed Safety Assessment and Assurance of Complex Critical Systems

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Complexity".

Deadline for manuscript submissions: closed (15 December 2023) | Viewed by 4894

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University "Kharkiv Aviation Institute", Kharkiv, Ukraine
Interests: critical and green computing; dependable and secure IoT and clouds; AI systems and services quality; UAV fleets for systems of information monitoring

E-Mail Website
Guest Editor
Mathematics and Engineering Science Sector, Hellenic Army Academy, Vary, Greece
Interests: methods and tools for information and cybersecurity systems analysis; reliability-survivability issues of information warfare systems; error detection and correction codes

Special Issue Information

Dear Colleagues,

Сritical (energy grids, transport, industry, business) systems operate in an open physical and informational environment and must be secure in order to be safe. Safety and security co-engineering is a complex domain requiring perfect development and verification processes, detailed risk analysis minimizing uncertainties, and the need for assurance and justification. Considering the influence of security on the safety of critical systems increases, the security informed safety (SIS) approach is one of the key methodologies to guarantee the required safety and its trustworthy assessment. SIS provides an entropy reduction in the safety evaluation process using specific methods. This Special Issue aims to present and discuss the models, methods, and techniques to implement SIS for different critical domains. The scope of this Special Issue includes, but is not limited to, the following topics:

  • Methodology of security informed safety;
  • Formal models and techniques of SIS analysis;
  • Decreasing entropy and improving the trustworthiness of security and safety assessment;
  • SIS methods for dependability assurance;
  • Information diversity and multi-version technology for critical systems;
  • Measurement and coding in the context of decreasing entropy for critical systems;
  • Self-organization and resilience of complex systems against information intrusions;
  • Assurance case techniques for decreasing uncertainties of security and safety assessment;
  • SIS methods for cloud, IoT, and edge systems development and assessment;
  • AI/ML for SIS analysis and information protection.

Prof. Dr. Vyacheslav Kharchenko
Prof. Dr. Nikolaos Bardis
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security informed safety
  • formal methods
  • decreasing entropy
  • coding and encryption
  • information redundancy and diversity
  • information intrusions
  • AI trustworthy and explainability
  • trustworthy assessment
  • cloud, IoT, edge computing

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 3143 KiB  
Article
Computational-Intelligence-Based Scheduling with Edge Computing in Cyber–Physical Production Systems
by Changqing Xia, Xi Jin, Chi Xu and Peng Zeng
Entropy 2023, 25(12), 1640; https://doi.org/10.3390/e25121640 - 9 Dec 2023
Viewed by 1134
Abstract
Real-time performance and reliability are two critical indicators in cyber–physical production systems (CPPS). To meet strict requirements in terms of these indicators, it is necessary to solve complex job-shop scheduling problems (JSPs) and reserve considerable redundant resources for unexpected jobs before production. However, [...] Read more.
Real-time performance and reliability are two critical indicators in cyber–physical production systems (CPPS). To meet strict requirements in terms of these indicators, it is necessary to solve complex job-shop scheduling problems (JSPs) and reserve considerable redundant resources for unexpected jobs before production. However, traditional job-shop methods are difficult to apply under dynamic conditions due to the uncertain time cost of transmission and computation. Edge computing offers an efficient solution to this issue. By deploying edge servers around the equipment, smart factories can achieve localized decisions based on computational intelligence (CI) methods offloaded from the cloud. Most works on edge computing have studied task offloading and dispatching scheduling based on CI. However, few of the existing methods can be used for behavior-level control due to the corresponding requirements for ultralow latency (10 ms) and ultrahigh reliability (99.9999% in wireless transmission), especially when unexpected computing jobs arise. Therefore, this paper proposes a dynamic resource prediction scheduling (DRPS) method based on CI to achieve real-time localized behavior-level control. The proposed DRPS method primarily focuses on the schedulability of unexpected computing jobs, and its core ideas are (1) to predict job arrival times based on a backpropagation neural network and (2) to perform real-time migration in the form of human–computer interaction based on the results of resource analysis. An experimental comparison with existing schemes shows that our DRPS method improves the acceptance ratio by 25.9% compared to the earliest deadline first scheme. Full article
Show Figures

Figure 1

35 pages, 2753 KiB  
Article
Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection
by Oleg Illiashenko, Vyacheslav Kharchenko, Ievgen Babeshko, Herman Fesenko and Felicita Di Giandomenico
Entropy 2023, 25(8), 1123; https://doi.org/10.3390/e25081123 - 26 Jul 2023
Cited by 14 | Viewed by 2758
Abstract
The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. [...] Read more.
The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. This approach allows for extending and integrating the known techniques FMECA (Failure Modes, Effects, and Criticality Analysis) and IMECA (Intrusion MECA), as well as developing the new SISMECA (SIS-based Intrusion Modes, Effects, and Criticality Analysis) technique. The ontology model and templates for SISMECA implementation are suggested. The methodology of safety assessment is based on (i) the application and enhancement of SISMECA considering the particularities of various ATSs and roles of actors (regulators, developers, operators, customers); (ii) the development of a set of scenarios describing the operation of ATS in conditions of cyberattacks and physical influences; (iii) AI contribution to system protection for the analysed domains; (iv) scenario-based development and analysis of user stories related to different cyber-attacks, as well as ways to protect ATSs from them via AI means/platforms; (v) profiling of AI platform requirements by use of characteristics based on AI quality model, risk-based assessment of cyberattack criticality, and efficiency of countermeasures which actors can implement. Examples of the application of SISMECA assessment are presented and discussed. Full article
Show Figures

Figure 1

Back to TopTop