Auflistung nach Autor:in "Tellabi, Asmaa"
1 - 4 von 4
Treffer pro Seite
Sortieroptionen
- TextdokumentAligning with cybersecurity framework by modelling OT security(INFORMATIK 2020, 2021) Parekh, Mithil; Waedt, Karl; Tellabi, AsmaaBefore the last decade, production units and its related systems were considered nearly as island systems and were managed as an air-gaped in their daily operations. Information and network security was not an issue because their plant's safety and continues operations have the highest priority. In the recent years, many initiatives like smart factories, adopting Industry 4.0, complex mesh of connected devices and data privacy have shifted paradigm of value chain and trust model in the production environment. By this means, state-of-the-art manufacturing environment demands for the comprehensive framework and holistic approach to address cybersecurity that affects reliability of plant operations. Therefore, few standards are gradually evolving and are extended in to this field. The ISA/IEC 62443 is one of the standard series addresses the Security of Industrial Automation and Control Systems (IACS) throughout their lifecycle. On the other hand, NIST Special Publication 800–82 is a Guide to Industrial Control Systems Security and follows NIST CSF to address OT security. As with Operational Technology (OT) requirements in general, also considering to security-related requirements as per ISA/IEC 62443, ask for more effort to deal with it later. Accordingly, bearing in mind, the need for security from the beginning of the system engineering processes reduces the overall effort and complexity during the lifecycle of OT systems. The corresponding paradigm is called Security by Design. This paper proposes on how high level foundational security requirements from ISA/IEC 62443 can be modelled using AutomationML (AML) tool and consequently explains on how easy is to integrate seamlessly that model during the design phase of engineering process.
- TextdokumentGossip protocol approach for a decentralized energy market with OPC UA client-server communication(INFORMATIK 2020, 2021) Schindler, Josef; Tellabi, Asmaa; Waedt, KarlGossiping is a well-researched protocol that enables decentralized information sharing. Being comparable to viruses spreading in a biological population, such concepts of data sharing are also called epidemic protocol. Without wanting to be impious with respect to recent pandemics, we propose its usage to facilitate a peer-to-peer (P2P) market for sharing energy between flexible loads or generation units, respectively. Gossip algorithms have been proposed several times in the context of power sharing in transmission grids. Our main contribution is the integration of such scenario with OPC UA. Comprising security by design, good interoperability attributes, several, well-maintained stack implementations and a widespread usage in automation, it reveals to be an outstanding framework for the proposed use case that will be explained in the first sections. After describing underlying physical models and the setup scenario, we will compare the results of the scenario that was conducted on non-OPC UA modules and an OPC UA implementation. Mostly, the performance is questioned at the comparison, still some beneficial concepts of OPC UA can be highlighted in the conclusion: Security controls can be added to the system at the Application Layer where Attribute Based Access Control (ABAC) can be performed, which allows a fine granularity of privileges expressed for subjects (agents in the gossiping algorithms) and objects (energy related assets) via semi-formal security policies. Additionally, UA Discovery service allows for plug and play availability. Concluding, a framework for a very efficient large-area algorithm is presented here to be researched in further work.
- TextdokumentInteroperability and Security Challenges of Industry 4.0(INFORMATIK 2017, 2017) Watson, Venesa; Tellabi, Asmaa; Sassmannahausen, Jochen; Lou, XinxinIndustrie 4.0 (I4.0) is the fourth industrial revolution, which will see the digital transformation of manufacturing, through the integration on Industrial Internet of Things (IIoT), Data and Services, and the convergence of Information Technology (IT) and Operational Technology (OT). With any such transformation, there exists challenges that must first be addressed for a successful outcome. For I4.0, these are interoperability and security, which respectively arise from the interconnection of devices from different manufacturers and/or with different communication protocols; and the interconnection of networks with competing critical and non-critical traffic, and the increased access to initially isolated networks. This paper presents an overview of standards, such as IEC 62443, the ISO 27000 series, IEC 62541 Open Connectivity Unified Architecture (OPC UA) and Time Sensitive Networks (TSN) (IEEE 1722-2016), which addresses these challenges.
- TextdokumentSecurity aspects of FPGA and virtualization case studies(INFORMATIK 2021, 2021) Tellabi, Asmaa; Sabri, Abdelbast; Ruland, Christoph; Waedt, KarlVirtualization technology is a technology that has been integrated a lot lately, thanks to its interoperability and enhanced performances. An essential element in virtualization is the hypervisor that is responsible of managing virtual machines; it allows various guest operating systems (OS) to run on one hardware entity simultaneously. Many researchers recognized the challenge of allowing multiple critical applications to share one hardware platform without interfering, and ensuring security of transactions a major safety and security challenge in virtualization. Usually, security by design is also comprises the protection of intellectual property (IP), possible safety related damages and extend financial losses. By the extension of the usage of programmable logic outside commercial markets to avionics and military applications, security by design integrates extra aspects to ensure safety and cybersecurity. Solutions for protecting application data during transmission and storage exist, but solutions for protecting Field Programmable Gate Array (FPGA) configuration data are not well-known. In the context of Industry 4.0, the FPGA hardware solutions provide the needed level of flexibility and performance. The flexibility, portability and even, to a wide extent, technology independence are due to the software based definition of the hardware via Hardware Description Languages (HDL). In this paper, threats and vulnerabilities surrounding FPGAs will be addressed. An example of a type 1 hypervisor called XtratuM will be ported on top of a Xilinx Soc 7000 zc706 will be integrated, as well as a prototype of embedded system using PetaLinux will be provided.