Security‐ and safety‐critical cyber‐physical systems (Editorial)

Atif Mashkoor, Johannes Sametinger, Miklós Biró, Alexander Egyed

Research output: Contribution to journalEditorial

Abstract

Cyber‐physical systems (CPSs) are physical embedded systems with enhanced operations for monitoring, coordination, control, and integration by a computing and communication core. Examples of CPSs include transportations systems, medical systems, and manufacturing systems. A CPS can be security‐critical, safety‐critical, or both. A CPS communicating with the outside world and thus opening an attack vector through the communication channel is considered to be a security‐critical CPS. On the other hand, a CPS is considered to be safety‐critical if it can harm its environment, eg, a malfunctioning autonomous vehicle might harm its passengers. A CPS dealing with both security and safety concerns is considered to be a security‐ and safety‐critical CPS. Contemporary systems and software engineering methods often prove inadequate for the trustworthy and reliable design and engineering of CPSs. Traditional engineering deals with security and safety issues as separate problems. However, given the coordination and communication features of CPSs, such a “separation‐of‐concerns” approach is no longer adequate. We need integrated methods to deal with security and safety concerns within CPSs.
Original languageEnglish
Article numbere2239
Number of pages10
JournalJournal of Software: Evolution and Process
DOIs
Publication statusPublished - 2020

Fields of science

  • 202005 Computer architecture
  • 202017 Embedded systems
  • 102 Computer Sciences
  • 102002 Augmented reality
  • 102006 Computer supported cooperative work (CSCW)
  • 102015 Information systems
  • 102020 Medical informatics
  • 102022 Software development
  • 102034 Cyber-physical systems
  • 201132 Computational engineering
  • 201305 Traffic engineering
  • 207409 Navigation systems
  • 502032 Quality management
  • 502050 Business informatics

JKU Focus areas

  • Digital Transformation

Cite this