Smart City Infrastructure Threat Modelling Methodologies: History
Please note this is an old version of this entry, which may differ significantly from the current revision.

Smart city infrastructure and the related theme of critical national infrastructure have attracted growing interest in recent years in academic literature, notably how cyber-security can be effectively applied within the environment, which involves using cyber-physical systems. These operate cross-domain and have massively improved functionality and complexity, especially in threat modelling cyber-security analysis—the disparity between current cyber-security proficiency and the requirements for an effective cyber-security systems implementation.

  • smart city infrastructure
  • critical national infrastructure
  • cyber-physical systems

1. Introduction

The digital revolution has led to many scientific advancements, which have increased the effectiveness and capabilities of standard technology, with one such form being smart city infrastructure (SCI). In addition, smart cities have pushed the boundaries of classical city Infrastructure, introducing cyber-physical system (CPS)s with the ability to improve overall long-term sustainability, performance, and dev elopment. Adapting both old and new systems towards technological modernization, where the introduction of CPSs can highlight a growing need in the analysis regarding attack surfaces of such devices [1]. The key issue with introducing cyber-dimensions is that it opens the entity up to a much larger attack surface, leading to vulnerabilities on cyber-aspects of CPSs leading to physical impact [2]. Cyber-security has become an important factor because these systems are highly important with many systems expansively complex in their design, leading to the need for a whole new set of threat modelling methodologies [3] using different research methods to provide a solution towards SCI CPSs.
This research analyses and critically reviews the key aspects of the different Bayesian threat modelling approaches. Bayesian networks (BN) methodologies were chosen as the focal point of the systematic literature review (SLR), where it has been shown to provide an effective fundamental process for analysing critical and smart infrastructures [4,5,6]. To the best of our knowledge, there are few smart city infrastructures SLRs specifically targeting the application of all Bayesian approaches for SCI. The inclusion of alternative methodologies is to look into additional techniques and methods to reinforce threat modelling approaches, which are useful to determine how best to apply the threat modelling. One of the biggest issues regarding cyber-security analysis, especially with much larger target of evaluation (ToE)s, is incomplete information, especially when discussing cyber-attacks that have a st+ochastic nature. BNs provides a solution for this as the process can combine different sources of knowledge with the capability to break down and process incomplete datasets within the model. There are three key objectives that underpin this SLR, and form of the scope of the literature.
1.
To analyse current smart city modelling and simulation literature towards understanding the key issues and challenges faced where threat modelling can be used for a solution;
2.
To critically review and evaluate the current research surrounding Bayesian-based smart city infrastructure alongside unique alternative modelling and simulation methodologies to provide the best possible solution performing cyber-security analysis within the smart city environment.
The first objective is to analyse both literature and information regarding the status of SCI. Understanding the wide array of issues within the context of SCI systems and differing perspectives towards solutions can help develop and refine current proposals expanding upon their effectiveness. Hence, having these issues and challenges be a focal point for threat modelling methodologies and verifying that their application within the context of SCI is effective towards providing a pragmatic solution. Next, a critical review of the different methodologies with the primary focus on Bayesian-based approaches across both single [4] and hybrid approaches [7]. Because of this comprehensive account regarding BN threat modelling, the many different deviations should all be reviewed to see the best possible path forward for SCI threat modelling. Finally, Chockalingam et al. [8] discusses BN modelling application within cyber security, keeping other extended variants of Bayesian outside its scope. In contrast, this study will incorporate all BNs variants within the systematic literature review in order to provide coverage of all possible solutions for the problems.
The final objective is combining the information acquired by performing both previous objectives, in order to provide comparative analysis regarding the threat modelling methodologies for their effectiveness within SCI environments. Another review is Hossain et al. [9], which looks into Bayesian-based approaches towards analysing resilience in the smart grid identifying themes and context with targeted domains. This research expands upon using individually unique alternative threat modelling methodology also applied to SCI environments, reviewing the characteristics of these methodologies to overall improve the knowledge of these systems and how to go about understanding them. The reasoning behind targeting these methods towards SCI is to widen the array of different techniques, which increases the potential solutions towards being an effective methodology. Other literature reviews surrounding this topic have covered other similar scopes, which cover only typical BN threat modelling [8] or the application of cyber situational awareness for modelling [10]. To elaborate on discussions that previous reviews made with regard to the SCI challenges, issues [11], and systems [12] that comprise of the overall architecture, though these need to be considered throughout threat modelling methodologies. Furthermore, it would highlight the requirement for multiple perspectives to analyse the different metrics regarding the system of systems (SoS)s.
The alternative methodologies that are reviewed assist in developing additional knowledge, techniques, and metrics for future research. Largely different methodologies, compared to BN, which will greatly improve future methodologies, take a multi-layered and method approach. Applying Bayesian-based approaches to provide effective analysis requires enough precision for accurate inferencing [13], through tweakings of designated metric weightings. The purpose behind exploring both Bayesian and various alternative non-Bayesian approaches is to compare the advantages and disadvantages within a much wider context for threat modelling methodologies, through the reviewing of these unique perspectives of applicable techniques and metrics for understanding the SCI underlying core cyber-security aspects of resilience, interdependency, and cyber-physical. The final objective is to provide an overview and collective synthesis of all discussed findings across all reviewed literature. They are comprised of identifying the correct best possible approach towards threat modelling vulnerability within SCI, with how this system of systems handle complex undesired events. Future avenues will be discussed in how the knowledge from this literature review can be applied to prospective SCI-based methodologies.

2. Critical National Infrastructure

CNI makes up the backbone of a nation. The UK Joint Committee, which reviews their national cyber-strategy, discusses their currently designated critical sectors: chemicals, civil nuclear, communications, defence, emergency services, energy, finance, food, government, health, space, transport, and water [44]. These point out that the government must now consider the interdependence complexities. Additionally, each nation has different designations and justifications for their CNIs, leading to them having identified other sectors and sub-sectors within their frameworks [45]. However, they all share similarities across the sectors and sub-sectors, meaning that analysis can be applied across different national-framework structures. These systems are comprised of CPSs, which operate across both physical and cyber domains. These systems have additional capabilities through introduction industrial internet of things (IIoT), giving net capabilities the ability to monitor and control. One of the core principles when conducting cyber-security within CNI architecture is its capable resilience against adverse events. The systems must handle negative events through either system failure or negative events, as the loss of these systems causes a major threat to human life and other long-lasting impacts if disabled.

3. Smart City Infrastructure

Smart cities encompass critical systems in city infrastructure being implemented with improvements to interactivity, networking, and monitoring technologies across all aspects of daily life. Some of the technologies, such as internet of things (IoT), allow for integrating networking capabilities across a wide array of devices, with the adoption of sensors to help facilitate data collection for a multitude of purposes. Many governments are beginning to pursue the adoption of SCI. For example, the UK discusses the advantages offered and current progression into smart cities [46]. New and previous aspects will develop telecommunication capabilities, allowing for the transfer of data and individual interactivity between these systems. Cyber-security aspects of SCI, within the much wider field of CNI and critical infrastrucure interdependency (CII) research, are developing the best possible solutions through analytical frameworks through identified metrics to counteract malicious activities. Smart grids are a current development within these systems where their core goal is the inclusion of both utility and customer system interactions. Improvements across a wide array of different areas regarding environmental, reliability, and energy capabilities [47]. However, these enhancements to energy sectors highlight new attack surfaces that further complicate cyber-security implementations and magnify the intensity of preceding vulnerability.

4. Critical Infrastructure Interdependency

A core aspect of both smart city systems and critical national infrastructure is their inherited interdependence, split across four different dominions physical, cyber, geographical, and logical [48,49]. Being both complex and intertwined, this system of systems can lead to the major issue of cascading failures, where the failure can lead to a rippling effect throughout the national level. First, individual failure can cause other entities to lose functionality and influence, while others, such as cyber-attacks, affect a certain device to control the overall system’s effectiveness. Secondly, the failure of specific SCI or CNI leads to the failure or impacted effectiveness of other CNI sectors within a larger context, causing cascading failure down these relationship webs. Understanding the relationships between the different sectors and sub-sectors is necessary to understand how individual and sector-wide impacts identify the key contributing influences. The application of weighted metrics towards these influences can help provide a comparative perspective across them, allowing a much further in-depth analysis regarding identified CII [50], where threat actors can exploit these newly developed systems and cause these cascading effects throughout their targeted system and affect other key critical infrastructures.

5. Threat Modelling Cyber-Physical Systems

Cyber-security analysis is an important component in developing truly effective defensive mechanisms. There are an array of different threats that target SCI critical sectors, which can be highlighted in cyber-attacks targeting the smart grid. Many traditional threat actors can affect these systems similarly to typical computer systems. However, the impacts that they can make through technologies, such as CPSs, has much higher importance and cause for concern [26]. Modelling both the SCI and its interdependencies is one of the newer research areas, and most proposed methodologies provide a theoretical framework for understanding these complex systems and how threats can propagate and influence the entire ToE. Many different directions of threat modelling can achieve across systems to identify the objects determining their corresponding risk and vulnerabilities, which is used to provide informed decision-making on how best to implement cyber-security. CPS has caused previous typical models to be ineffective against these new systems [51], which has led to the further development of them or the creation of new methodologies through different technologies able to test for casual relationships and multi-layered system architectures. Similar to risk assessment methodologies, the objective depends on the methodology reviewed, where risk regarded to the system is calculated through values associated with resilience and other associated metrics. For example, vulnerability analysis focused methods look toward the success of a malicious cyber-attack against the modelled node. In contrast, risk-based approaches highlight the threat actors’ actions that could affect the system through variables of probability, damage, and likelihood [27]. Both focuses are key to understanding the complex nature regarding SCI, which attributes can be heavily dissected to understand ToEd systems fully.

6. Bayesian Networks

BN is a probabilistic graphical modelling methodology which is a directed acyclic graph (DAG) [25] that has an array of purposes. First, it can be used to model the complexities of CPSs and has been at the forefront of proposed research methodologies [8]. Second, Bayesian models use nodes representing their conditional probability table (CPT) and their individual directed links between them, which can be used to calculate uncertainty. Third, CPTs are generated through interfacing from either expert opinion or data-based approaches [13]. Finally, these models can be structured through an array of different node types, dynamic complexities, and interactions between each other [52]. These benefits highlight Bayesian approaches as an effective method to understanding the complex intricacies regarding SCI, with the capabilities to MaS the interdependencies [25] regarding CPSs and understanding the relationships between both individual systems and sub-sectors to predict the cascading effects throughout the overall infrastructure.
There are many different alternate variations of BNs, such as dynamic Bayesian networks (DBN)s, which incorporate the concept of time, taking the form of temporal nodes within the model. This methodology can be more extensive in breaking down the targeted system into discrete or continuous temporal variables tracking changes throughout a time series analysis [22]. Its main purpose is to provide probability calculations regarding individual entities and events for distinguishing the probability of effects, such as cyber-attack propagation, impact, and cascading failures [2]. These characteristics highlight Bayesian-based approaches’ potential for providing a pragmatic solution. Developing and synthesising BN threat modelling methodologies have tailored individual characteristics that direct the conclusion provided through the analysis.

This entry is adapted from the peer-reviewed paper 10.3390/su141610368

This entry is offline, you can click here to edit this entry!
Video Production Service