TRUSTWORTHY AND SECURE CYBER-PLEXUS FOR DIGITAL COMMUNITIES
Technology and connectivity have become integral to daily lives and have fundamentally reshaped how individuals work, communicate, and access data. This hyperconnectivity, while presenting several advantages, also raises concerns about the fragility of interconnected cyber-plexus systems, calling for scrutiny of the cyber infrastructure and the resolution of fundamental research challenges to develop practical, trustworthy, and secure system designs and operations.
The first phase of the program, TSCP, covered fundamental research along with practical design and operation of systems that are trustworthy and secure. Researchers developed the basic principles and studied the foundations of the cyber infrastructure that holds these platforms (cyber-plexus) together. The extension to include digital communities, TSCP-DC, underpins a deeper approach to cybersecurity. Leveraging the technology and networks TSCP developed in the first phase, the initial five years, TSCP-DC, relates to a more extensive view and extends its focus on digital communities—cybersecurity in a community of interdependent and interacting physical systems. Additionally, TSCP-DC addresses security challenges in critical infrastructures such as power systems and associated building infrastructures and systems.
Under the TSCP-DC program, researchers investigate four thrusts designed to meet the trust and security goals supporting Singapore’s Smart Nation initiative.
The program is led by Illinois ARCS’ Director of Research, Prof. David Nicol, the Herman M. Dieckamp Endowed Chair in Engineering and Director of the Information Trust Institute, University of Illinois Urbana-Champaign.
CYBER-PLEXUS PROTECTION
THRUST 1: CYBER-PLEXUS PROTECTION
Defense of Cyber-Plexus Against Attacks and Upsets
Developing methodologies, emerging technologies such as AI, and authentication technologies for cyber-security and defending the systems against sophisticated, nation-state attacks. Researchers in this thrust focus on anomaly detection, impact assessment and mitigation, and real-time data analytics.
TRUST ASSURANCE
THRUST 2: TRUST ASSURANCE
Foundational Basis for Correctness, Safety, Security
Designing system architecture to be trustworthy and secure for the cybersecurity components and their interactions as the foundational basis for correctness, safety, and security. Researchers in this thrust design and implement policies for assuring network service properties by automating policy generation that can adapt beyond individual industrial control systems to encompass large-scale and diverse digital infrastructures.
CYBER-PLEXUS SYSTEM ANALYSIS
THRUST 3: CYBER-PLEXUS SYSTEM ANALYSIS
Modeling and Understand Cyber-Plexus Behavior
In this thrust, researchers develop techniques and models to understand the digital cyber-plexus behavior to predict the specific behavior in response to triggering events and to predict cyber-plexus response and evolution. One method in this area is using digital twins and network simulators to improve and simulate technologies at scale.
EVALUATION
THRUST 4: EVALUATION
Risk Assessment and Experimental Testing
This thrust involves developing robust evaluation methods for new technologies for risk assessment, usability, integration, and resiliency in realistic settings of digital communities. These steps enable commercial translation and support methodological, practical engineering.