TRUSTWORTHY AND SECURE CYBER-PLEXUS FOR DIGITAL COMMUNITIES

Technology and connectivity have become integral to daily lives and have fundamentally reshaped how individuals work, communicate, and access data. This hyperconnectivity, while presenting several advantages, also raises concerns about the fragility of interconnected cyber-plexus systems, calling for scrutiny of the cyber infrastructure and the resolution of fundamental research challenges to develop practical, trustworthy, and secure system designs and operations.

The first phase of the program, TSCP, covered fundamental research along with practical design and operation of systems that are trustworthy and secure. Researchers developed the basic principles and studied the foundations of the cyber infrastructure that holds these platforms (cyber-plexus) together. The extension to include digital communities, TSCP-DC, underpins a deeper approach to cybersecurity. Leveraging the technology and networks TSCP developed in the first phase, the initial five years, TSCP-DC, relates to a more extensive view and extends its focus on digital communities—cybersecurity in a community of interdependent and interacting physical systems. Additionally, TSCP-DC addresses security challenges in critical infrastructures such as power systems and associated building infrastructures and systems.

Under the TSCP-DC program, researchers investigate four thrusts designed to meet the trust and security goals supporting Singapore’s Smart Nation initiative.

The program is led by Illinois ARCS’ Director of Research, Prof. David Nicol, the Herman M. Dieckamp Endowed Chair in Engineering and Director of the Information Trust Institute, University of Illinois Urbana-Champaign.

CYBER-PLEXUS
PROTECTION

THRUST 1: CYBER-PLEXUS
PROTECTION


Defense of Cyber-Plexus Against Attacks and Upsets

Developing methodologies, emerging technologies such as AI, and authentication technologies for cyber-security and defending the systems against sophisticated, nation-state attacks. Researchers in this thrust focus on anomaly detection, impact assessment and mitigation, and real-time data analytics.

TRUST ASSURANCE

THRUST 2: TRUST ASSURANCE


Foundational Basis for Correctness, Safety, Security

Designing system architecture to be trustworthy and secure for the cybersecurity components and their interactions as the foundational basis for correctness, safety, and security. Researchers in this thrust design and implement policies for assuring network service properties by automating policy generation that can adapt beyond individual industrial control systems to encompass large-scale and diverse digital infrastructures.

CYBER-PLEXUS
SYSTEM ANALYSIS

THRUST 3: CYBER-PLEXUS
SYSTEM ANALYSIS


Modeling and Understand Cyber-Plexus Behavior

In this thrust, researchers develop techniques and models to understand the digital cyber-plexus behavior to predict the specific behavior in response to triggering events and to  predict cyber-plexus response and evolution. One method in this area is using digital twins and network simulators to improve and simulate technologies at scale.

EVALUATION

THRUST 4: EVALUATION


Risk Assessment and Experimental Testing

This thrust involves developing robust evaluation methods for new technologies for risk assessment, usability, integration, and resiliency in realistic settings of digital communities. These steps enable commercial translation and support methodological, practical engineering.