A Resilience-Based Security Assessment Approach for CBTC Systems

With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabi...

Full description

Saved in:
Bibliographic Details
Main Authors: Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang
Format: Article
Language:English
Published: Wiley 2021-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2021/2175780
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832561538885484544
author Ruiming Lu
Huiyu Dong
Hongwei Wang
Dongliang Cui
Li Zhu
Xi Wang
author_facet Ruiming Lu
Huiyu Dong
Hongwei Wang
Dongliang Cui
Li Zhu
Xi Wang
author_sort Ruiming Lu
collection DOAJ
description With the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. The communication-based train control (CBTC) system is the most important subsystem of urban rail transit. The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. The proposed method can demonstrate the robustness and recovery ability of CBTC systems under different security attacks. Based on the structural information entropy, the fusion of different indicators is achieved. Two typical attacking scenarios are analyzed, and the simulation results illustrate the effectiveness of the proposed assessment approach.
format Article
id doaj-art-f63a2fdaba184d4a81ba73e96966dc44
institution Kabale University
issn 1076-2787
1099-0526
language English
publishDate 2021-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-f63a2fdaba184d4a81ba73e96966dc442025-02-03T01:24:48ZengWileyComplexity1076-27871099-05262021-01-01202110.1155/2021/21757802175780A Resilience-Based Security Assessment Approach for CBTC SystemsRuiming Lu0Huiyu Dong1Hongwei Wang2Dongliang Cui3Li Zhu4Xi Wang5National Research Center of Railway Safety Assessment, Beijing Jiaotong University, Beijing, ChinaNational Research Center of Railway Safety Assessment, Beijing Jiaotong University, Beijing, ChinaState Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, ChinaState Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, ChinaState Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, ChinaState Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, ChinaWith the rapid development of urban rail transit systems, large amounts of information technologies are applied to increase efficiency of train control systems, such as general computers, communication protocols, and operation systems. With the continuous exposure of information technology vulnerabilities, security risks are increasing, and information is easy to use by malicious attackers, which can bring huge property and economic losses. The communication-based train control (CBTC) system is the most important subsystem of urban rail transit. The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. The proposed method can demonstrate the robustness and recovery ability of CBTC systems under different security attacks. Based on the structural information entropy, the fusion of different indicators is achieved. Two typical attacking scenarios are analyzed, and the simulation results illustrate the effectiveness of the proposed assessment approach.http://dx.doi.org/10.1155/2021/2175780
spellingShingle Ruiming Lu
Huiyu Dong
Hongwei Wang
Dongliang Cui
Li Zhu
Xi Wang
A Resilience-Based Security Assessment Approach for CBTC Systems
Complexity
title A Resilience-Based Security Assessment Approach for CBTC Systems
title_full A Resilience-Based Security Assessment Approach for CBTC Systems
title_fullStr A Resilience-Based Security Assessment Approach for CBTC Systems
title_full_unstemmed A Resilience-Based Security Assessment Approach for CBTC Systems
title_short A Resilience-Based Security Assessment Approach for CBTC Systems
title_sort resilience based security assessment approach for cbtc systems
url http://dx.doi.org/10.1155/2021/2175780
work_keys_str_mv AT ruiminglu aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT huiyudong aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT hongweiwang aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT dongliangcui aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT lizhu aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT xiwang aresiliencebasedsecurityassessmentapproachforcbtcsystems
AT ruiminglu resiliencebasedsecurityassessmentapproachforcbtcsystems
AT huiyudong resiliencebasedsecurityassessmentapproachforcbtcsystems
AT hongweiwang resiliencebasedsecurityassessmentapproachforcbtcsystems
AT dongliangcui resiliencebasedsecurityassessmentapproachforcbtcsystems
AT lizhu resiliencebasedsecurityassessmentapproachforcbtcsystems
AT xiwang resiliencebasedsecurityassessmentapproachforcbtcsystems