RS1: Can we secure the AS “Usage” environment? Lead: N. Suri
To establish the fundamental AS “usage” framework for providing and assessing multi-layered, multi- dimensional adaptive AS security in dynamic mixed mode environments.
- Theme A: Dynamic and Compositional AS Security (Lead: N. Suri, Participants: A. Tsourdos, G. Inalhan).
- Theme B: Explainable and Verifiable Decision Making for AS Security (Lead: P. Angelov, Participants: N. Suri, W. Guo, G. Inalhan, Z. Yu)
RS2: Can we secure the AS “Operations” environment? Lead: W. Guo
To ascertain exposure (and their consequent mitigation) of AS “operations” to cyber-physical attacks by characterizing the attack surfaces (i.e., entry points and likelihoods) across the mission, control and information surfaces in a technology and mission-invariant manner.
- Theme A: Security in the Mission and Operational Surface (Leads: P. Angelov, Participants: A. Tsourdos, Z. Yu)
- Theme B: Securing the Control Surface (Lead: G. Inalhan, Participants: P. Angelov, A. Tsourdos, B. Yuksek)
- Theme C: Securing the Cross-Layer Networking Surface (Communication, Sensors) (Lead: W. Guo, Participants: D. Hutchison, V. Giotsas, P. Ciholas)
RS3: Can we secure the AS “User” environment? Lead: C. May-Chahal
To ascertain the overall AS threats across multiple attacks, or approach tackles three interdependent AS surfaces (mission, control and communication) while the security foundations of RS1 and the human behaviour from RS3 are used to create holistic mitigation strategies.
- Theme A: Behaviour Adaptation as a Basis of Security by Design (Lead: L. Dorn, Participant: J. Deville)
- Theme B: Organisational Socio-Technical Mitigation (Lead: J. Deville, Participants: L. Dorn, C. May-Chahal, L. Moffatt, S. Palmer).
- Theme C: Ethics and Governance of AS Security (Lead: C. Easton, Participants: L. Dorn, L. Moffatt, S. Palmer)