Skip to main content

Safety and Security Integrated SIL Evaluation Using the NFR Approach

  • Chapter
  • First Online:
Integrating Research and Practice in Software Engineering

Part of the book series: Studies in Computational Intelligence ((SCI,volume 851))

Abstract

The paper addresses the issue of evaluating Safety Integrity Levels (SIL) from the perspective of concerns related jointly to safety and security. We apply the Non-Functional Requirements (NFR) approach, which relies on evaluation of both safety and security at the architectural level. Used in two case studies on industrial automation systems, the results show that the method yields reasonable results, no weaker than other methods of SIL evaluation, such as risk graphs, and can be used for both SIL determination and verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. IEC 61508-4: Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems. International Electrotechnical Commission (2010)

    Google Scholar 

  2. IEC 60050: International Electrotechnical Vocabulary. Online: http://www.electropedia.org/

  3. Torres-Echeverria, A.C.: On the use of LOPA and risk graphs for SIL determination. J. Loss Prev. Process Ind. 41, 333–343 (2016)

    Article  Google Scholar 

  4. Gabriel, A., Ozansoy, C., Shi, J.: Developments in SIL determination and calculation. Reliab. Eng. Syst. Safety 177, 148–161 (2018)

    Article  Google Scholar 

  5. Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Safety 139, 156–178 (2015)

    Article  Google Scholar 

  6. Braband, J.: What’s security level got to do with safety integrity level? Proceedings of the ERTS 2016, 8th European Congress on Embedded Real-Time Software and Systems, Toulouse, France, 27–29 January 2016

    Google Scholar 

  7. Reichenbach, F., et al.: A pragmatic approach on combined safety and security risk analysis. In: Proceedings of the 2012 IEEE 23rd Intern. Symposium on Software Reliability Engineering Workshops, Dallas, Texas, pp. 239–244, 27–30 November 2012

    Google Scholar 

  8. Piesik, E., Śliwiński, M., Barnert, T.: Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects. Reliab. Eng. Syst. Safety 152, 259–272 (2016)

    Article  Google Scholar 

  9. Sliwinski, M., Piesik, E., Piesik, J.: Integrated functional safety and cyber security analysis. IFAC Papers OnLine 51, 1263–1270 (2018)

    Article  Google Scholar 

  10. Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397–409 (2016)

    Article  Google Scholar 

  11. Subramanian, N., Zalewski, J.: Safety and security analysis of control chains in SCADA using the NFR approach. IFAC Papers OnLine 51(6), 214–219 (2018)

    Article  Google Scholar 

  12. Lisova, E., Sljivo, I., Causevic, A.: Safety and security co-analyses: a systematic literature review. IEEE Syst. J., December 2018

    Google Scholar 

  13. Pedroza, G.: Towards safety and security co-engineering: challenging aspects for a consistent intertwining. In: Proceedings of the ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, pp. 3–16, 6–7 September 2018

    Chapter  Google Scholar 

  14. ETSI TS 102 165-1: CYBER Methods and Protocols. Part 1: Method and Pro Forma for Threat, Vulnerability, Risk Analysis (TVRA). Technical Specification. European Telecommunications Standards Institute (2017)

    Google Scholar 

  15. IEC 62443: Network and System Security for Industrial-process Measurement and Control. International Electrotechnical Commission (2015)

    Google Scholar 

  16. ISO/IEC 15408: Information Technology—Security Techniques—Evaluation Criteria for IT Security. International Organization for Standardization (2009)

    Google Scholar 

  17. Chung, L., et al.: Non-functional requirements in software engineering. Kluwer Academic Publishers, Boston (2000)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janusz Zalewski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Subramanian, N., Zalewski, J. (2020). Safety and Security Integrated SIL Evaluation Using the NFR Approach. In: Jarzabek, S., Poniszewska-Marańda, A., Madeyski, L. (eds) Integrating Research and Practice in Software Engineering. Studies in Computational Intelligence, vol 851. Springer, Cham. https://doi.org/10.1007/978-3-030-26574-8_5

Download citation

Publish with us

Policies and ethics