Browse > Article
http://dx.doi.org/10.9708/jksci.2021.26.01.171

Method for Detecting Modification of Transmitted Message in C/C++ Based Discrete Event System Specification Simulation  

Lee, Hae Young (Major of Digital Security, Cheongju University)
Abstract
In this paper, the author proposes a method for detecting modification of transmitted messages in C/C++ based Discrete Event System Specification (DEVS) simulation. When a message generated by a model instance is delivered to other model instances, it may be modified by some of the recipients. Such modifications may corrupt simulation results, which may lead to wrong decision making. In the proposed method, every model instance stores a copy of every transmitted message. Before the deletion of the transmitted message, the instance compares them. Once a modification has been detected, the method interrupt the current simulation run. The procedure is automatically performed by a simulator instance. Thus, the method does not require programmers to follow secure coding or to add specific codes in their models. The performance of the method is compared with a DEVS simulator.
Keywords
Message Integrity; Secure Modeling & Simulation; Secure Coding; Discrete Event System Specification (DEVS); Simulation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Nutaro, adevs: A Discrete EVent System simulator, https://web.ornl.gov/-nutarojj/adevs/
2 G. Wainer, CD++, http://cell-devs.sce.carleton.ca/
3 H.Y. Lee, J.M. Kim, "Systematic Detection of State Variable Corruptions in Discrete Event System Specification Based Simulation," IEICE Trans. on Infor. & Syst., vol. E103-D, no. 7, pp. 1769-72, July 2020. DOI: 10.1587/transinf.2019EDL8219   DOI
4 H.Y. Lee, "Buffer overflow detection in DEVS simulation using canaries," Proceedings of Winter Simulation Conference (WSC), pp. 4554-4555, Las Vegas, LV, USA, December 2017. DOI: 10.1109/WSC.2017.8248201.   DOI
5 H.Y. Lee, "Potential Vulnerabilities in C/C++ Based Simulation," Proc. of Fall Conference of the Korea Society for Simulation, pp. 24-26, November 2017.
6 R. Seacord, Secure Coding in C and C++ (SEI Series in Software Engineering), 2 nd Ed., Addison-Wesley Professional, 2013.
7 D. Ivanov, "Predicting the impacts of epidemic outbreaks on global supply chains: A simulation-based analysis on the coronavirus outbreak (COVID-19/SARS-CoV-2) case," Transportation Research Part E: Logistics and Transportation Rev., no. 136, April 2020. DOI: 10.1016/j.tre.2020.101922   DOI
8 A. Maria, "Introduction to modeling and simulation," Proc. of Winter Simulation Conference (WSC), pp. 7-13, Atlanta, GA, USA, December 1997. DOI: https://doi.org/10.1145/268437.268440   DOI
9 A.M. Law, Simulation Modeling and Analysis, 5 th Ed., McGraw-Hill Education, 2014.
10 K. Iwata, C. Miyakoshi, "A Simulation on Potential Secondary Spread of Novel Coronavirus in an Exported Country Using a Stochastic Epidemic SEIR Model," J. of Clinical Med., vol. 9, no. 4, March 2020. DOI: 10.3390/jcm9040944   DOI
11 B. P. Zeigler et al., Theory of Modeling and Simulation, 3 rd Ed., Academic Press, 2018.
12 E. Hammad et al., "Implementation and development of an offline co-simulation testbed for studies of power systems cyber security and control verification," Int'l J. of Elec. Power & Energy Syst., no. 104, pp. 817-26, January 2019. DOI: 10.1016/j.ijepes.2018.07.058   DOI
13 P. Aggarwal et al., "HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments," Advances in Intelligent Systems and Computing, vol. 960, pp. 109-12, June 2020. DOI: 10.1007/978-3-030-20488-4_11   DOI
14 M. L. Cronqvist et al., "Development and Initial Validation of a Stochastic Discrete Event Simulation to Assess Disaster Preparedness," Prehospital and Disaster Medicine, vol. 34, May 2019. DOI: 10.1017/S1049023X19002528   DOI
15 D. Mourtzis, "Simulation in the design and operation of manufacturing systems: state of the art and new trends." Int'l J. of Production Research, vol. 58, no. 7, pp. 1927-1949, April 2020. DOI: 10.1080/00207543.2019.1636321   DOI
16 J.S. Carson, "Introduction to modeling and simulation," Proc. of Winter Simulation Conference (WSC), pp. 9-16, Washington, DC, USA, December 2004. DOI: 10.1109/WSC.2004.1371297   DOI
17 B.P. Zeigler, A. Muzy, "From Discrete Event Simulation to Discrete Event Specified Systems (DEVS)," IFAC-PapersOnLine, vol. 50, no. 1, pp. 3039-3044, July 2017. DOI: 10.1016/j.ifacol.2017.08.672   DOI
18 M. Mokaddem et al., "DEVS Server: ambient intelligence and DEVS modelling-based simulation server for epidemic modelling," Int'l J. of Simulation and Process Modelling, vol. 13, no. 6, pp. 557-581, October 2018. DOI: 10.1504/IJSPM.2018.095875   DOI
19 D.H. Lee et al., "A Unity-based Simulator for Tsunami Evacuation with DEVS Agent Model and Cellular Automata," J. of Korea Multimedia Society, vol. 23, no. 6, pp. 772-783, June 2020. DOI: 10.9717/kmms.2020.23.6.772   DOI
20 J. Kim, H.J. Kim, "DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective," KSII Trans. on Internet and Infor. Syst., vol. 14, no. 5, pp. 2186-2203, May 2020. DOI: 10.3837/tiis.2020.05.018   DOI
21 L. Rajaoarisoa, M. Sayed-Mouchaweh, "Adaptive online fault diagnosis of manufacturing systems based on DEVS formalism," IFAC-PapersOnLine, vol. 50, no. 1, pp. 6825-6830, July 2017. DOI: 10.1016/j.ifacol.2017.08.1202   DOI