Analysis and Design of Complex Embedded Systems

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 March 2024) | Viewed by 2228

Special Issue Editors

De Vinci Research Center (DVRC), Leonardo da Vinci Engineering School, 92916 Paris, France
Interests: security and safety of connected and embedded systems; integration of model-based systems engineering and safety analysis; static analysis software verification

E-Mail Website
Guest Editor
ETIS Lab UMR8051, Computer Science Department, CY Cergy Paris University, 95000 Cergy, France
Interests: IoV; C-ITS; trust; distributed systems; distributed intelligence; multi-agent systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Modern embedded systems are becoming increasingly complex because of their use of various integrated components, technologies, and functionalities. The complexity of these hardware and software systems requires new appropriate processes, tools, and methodologies for analysis, design, and validation purposes. Maintaining the overall competitiveness of the design process with regard to cost and time-to-market constraints remains, of course, a key concern.

The failures of embedded systems used in industries such as aeronautics, automotive, railway, nuclear, or medical devices could lead to serious safety issues and catastrophic consequences. The design of these safety-critical systems is a complex process that calls for the integration of systems engineering methods and safety analysis to fulfill functional and non-functional requirements. Narrowing the gap between system design and safety assessment will help to improve consistency and reduce development time and late errors.  In addition, these increasingly connected and complex systems also must face cyberattacks, which often cause serious dysfunctions and undermine the security of such systems. The relationships between security and safety are thus at the heart of the current concerns of specialists in the field of complex embedded systems. One can no longer consider designing safe systems without ensuring that they are secure. For instance, a vulnerability may compromise the functional safety of an autonomous car; however, on the other hand, a safety constraint such as the introduction of redundant components or diagnostic ports can increase the attack surface of the system. The complexity of software and hardware components used in embedded systems has thus motivated the adoption of new approaches to anticipate security and safety problems. In particular, system designers have been advised to adopt an early modeling and validation approach against potential threats during the design phase to reduce the costs of error’s detected late and correction time.

Dr. Nga Nguyen
Dr. Lylia Alouache
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • complex embedded systems
  • safety
  • security
  • trust
  • model-based analysis

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 401 KiB  
Article
Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment
by Théo Serru, Nga Nguyen, Michel Batteux and Antoine Rauzy
Electronics 2023, 12(1), 77; https://doi.org/10.3390/electronics12010077 - 25 Dec 2022
Cited by 4 | Viewed by 1792
Abstract
In this article, we present an experiment we conducted with discrete event simulations to analyze the effects of multi-step cyberattacks on the safety of cyber-physical systems. We show how to represent systems, their components (either software and/or hardware), communication links, security measures, and [...] Read more.
In this article, we present an experiment we conducted with discrete event simulations to analyze the effects of multi-step cyberattacks on the safety of cyber-physical systems. We show how to represent systems, their components (either software and/or hardware), communication links, security measures, and attacks from a malicious intruder. The latter are typically taken from the MITRE ATT&CK knowledge base. The discrete event simulation method makes it possible to represent any event affecting the system. We illustrate our approach by means of an illustrative example involving cyberattacks against the navigation system of an autonomous ship. We show how the formal modeling language AltaRica, primarily dedicated to safety analyses, can assess this illustrative example by representing the system and automatically extracting sequences of attacks, leading to a safety-critical situation, namely the deviation of the ship by the attacker. This article aims to discuss this approach and to outline the lessons learned from our experience. Full article
(This article belongs to the Special Issue Analysis and Design of Complex Embedded Systems)
Show Figures

Figure 1

Back to TopTop