Filters








6,008 Hits in 5.9 sec

Enhanced cyber‐physical security using attack‐resistant cyber nodes and event‐triggered moving target defence

Martin Higgins, Keith Mayes, Fei Teng
2021 IET Cyber-Physical Systems  
In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement.  ...  A cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined.  ...  The authors would like to thank Chris Torr at MULTOS for his expert support and guidance, and Crisp Telecom Ltd. for access to test and development facilities.  ... 
doi:10.1049/cps2.12002 fatcat:jeinjefjlrfwvjsu7lgabpbfge

Optimal control and learning for cyber‐physical systems

Yan Wan, Tao Yang, Ye Yuan, Frank L. Lewis
2021 International Journal of Robust and Nonlinear Control  
To achieve these performance requirements, it is important to adopt cyber-physical system (CPS) design techniques. A CPS features tightly coupled physical and cyber components.  ...  However, the traditional optimal control theory cannot be directly used because it was developed for systems that do not have the complexity level of modern systems we observe today.  ...  Lagrangian systems under DoS attacks.  ... 
doi:10.1002/rnc.5442 fatcat:2sqn5j3urrgcrbjxfx6vsgvnci

Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence [article]

Martin Higgins, Keith Mayes, Fei Teng
2020 arXiv   pre-print
In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement.  ...  This paper outlines a cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks.  ...  The authors would like to thank Chris Torr at MULTOS for his expert support and guidance, and Crisp Telecom Ltd. for access to test and development facilities.  ... 
arXiv:2010.14173v3 fatcat:eqdpfazsdfhh7citazzhitik5e

Using Self-Organizing Architectures to Mitigate the Impacts of Denial-of-Service Attacks on Voltage Control Schemes

Calum Cameron, Charalampos Patsios, Phil Taylor, Zoya Pourmirza
2018 IEEE Transactions on Smart Grid  
Therefore, an integrated approach is needed for the analysis of cyber-threats against power systems, linking the attack mechanisms in the ICT layer and the physical impacts at the electrical layer.  ...  Present research in cyber-attack events and electrical grid resilience, often treats these in isolation.  ...  [9] explicitly state that a combined cyber-physical analysis is required to establish the impacts of a cyber-attack event on the physical system.  ... 
doi:10.1109/tsg.2018.2817046 fatcat:hq3bot6ddrhc5al3jeu5igvp5i

Guest Editorial Special Issue on New Trends in Energy Internet: Artificial Intelligence-Based Control, Network Security, and Management

Dong Yue, Qing-Long Han
2019 IEEE Transactions on Systems, Man & Cybernetics. Systems  
His current research interests include analysis and synthesis of networked control systems, multiagent systems, optimal control of power systems, and the Internet of Things. Dr.  ...  To achieve fusion state estimation of power systems under denial-of-service attacks, a switched system approach is employed in the paper "Fusion State Estimation for Power Systems Under DoS Attacks: A  ...  First, an event-triggered load frequency control method for multiarea power systems is proposed in the paper "Event-Triggered H ∞ Load Frequency Control for Multiarea Power Systems Under Hybrid Cyber Attacks  ... 
doi:10.1109/tsmc.2019.2923034 fatcat:yqtrdolu7bcq7fo2x2z5mnmpma

Performance Analysis of Event-Triggered Consensus Control for Multi-agent Systems under Cyber-Physical Attacks [article]

Farzaneh Tatari, Aquib Mustafa, Majid Mazouchi, Hamidreza Modares, Christos G. Panayiotou, Marios M. Polycarpou
2022 arXiv   pre-print
This work presents a rigorous analysis of the adverse effects of cyber-physical attacks on the performance of multi-agent consensus with event-triggered control protocols.  ...  It is shown how a strategic malicious attack on sensors and actuators can deceive the triggering condition of both state-based event-triggered mechanism and combinational state-based event-triggered mechanism  ...  Towards this aim, in this paper, the effect of cyber-physical attacks on event-triggered based distributed control methods is rigorously studied.  ... 
arXiv:2201.02997v2 fatcat:yr6wbbwsu5abjmyr6qj7qzimvy

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political

Robin Gandhi, Anup Sharma, William Mahoney, William Sousan, Qiuming Zhu, Phillip Laplante
2011 IEEE technology & society magazine  
We do not attempt to analyze why past SPEC events have triggered cyber-attacks, nor do we propose solutions to reduce or prevent them.  ...  Attack Timing When cyber-attacks are used in protest they are often launched immediately following a triggering event in the physical world.  ... 
doi:10.1109/mts.2011.940293 fatcat:k5uwy46vubg6rmwopeixwnzrni

Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks [chapter]

Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro
2016 Lecture Notes in Computer Science  
Event-triggered watermarking control to handle cyber-physical integrity attacks. Abstract.  ...  The use of control-theoretic solutions to detect attacks against cyber-physical systems is a growing area of research.  ...  The authors acknowledge support from the Cyber CNI Chair of Institut Mines-Télécom.  ... 
doi:10.1007/978-3-319-47560-8_1 fatcat:hkusqafr3nha7etkslra35ut2a

Resilient control in large-scale networked cyber-physical systems: Guest editorial

Giuseppe Franze, Giancarlo Fortino, Xianghui Cao, Giuseppe Maria Luigi Sarne, Zhen Song
2020 IEEE/CAA Journal of Automatica Sinica  
Along these lines, secure/robust and resilient control frameworks for networked control system (NCS) configurations capable to jointly take care of state/input constraints under cyber-attack occurrences  ...  The appellation used by field experts for these paradigms is Cyber-Physical Systems (CPS) because the dynamics among computers, networking media/resources and physical systems interact in a way that multi-disciplinary  ...  control based on a dynamic event-triggering mechanism for multi-agent systems.  ... 
doi:10.1109/jas.2020.1003327 fatcat:rzxybcfnbffszj43tkaueicofa

Adaptive control-theoretic detection of integrity attacks against cyber-physical industrial systems

Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro
2017 Transactions on Emerging Telecommunications Technologies  
ACKNOWLEDGEMENTS The authors acknowledge support from the Cyber CNI Chair of the Institut Mines-Télécom (cf http://chaire-cyber-cni.fr/).  ...  of the states vector in the plant under a parametric attack.  ...  Attacks start at t = 700s. A,B, The dynamics of the states vector estimated in the local and remote controller, respectively, under the same scenarios.  ... 
doi:10.1002/ett.3209 fatcat:hvljly5hfnfvtcz2uwoj55cuw4

A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

Lifu Zhang, Heng Zhang
2016 Sensors  
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow  ...  This paper also discusses several future research directions under these two umbrellas.  ...  [26] discussed the security issues for a variety of industrial distributed computing systems under general cyber attacks.  ... 
doi:10.3390/s16040443 pmid:27023559 pmcid:PMC4850957 fatcat:ndpgvn3rdjhtvldrl2ih7lsvuu

Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems

Peng Cheng, Ling Shi, Bruno Sinopoli
2017 IEEE Transactions on Control of Network Systems  
PENG CHENG, Guest Editor Liu et al. consider dynamic state recovery for CPSs under switching location attacks. Dolk et al. study event-triggered control systems subject 2325-5870 © 2017 IEEE.  ...  His research interests include cyber-physical systems security, networked control systems, sensor scheduling, and event-based state estimation. Dr.  ... 
doi:10.1109/tcns.2017.2667233 fatcat:apiq5imxffeynbqtz27jluiafi

An Event-Driven Resilient Control Strategy for DC Microgrids

Subham Sahoo, Tomislav Dragicevic, Frede Blaabjerg
2020 IEEE transactions on power electronics  
This mechanism not only disengages the attack element from the control system, but also replaces it with an event-triggered estimated value to encompass normal consensus operation during both steady-state  ...  attacks as events and introduces an event-driven cyber attack resilient strategy for DC microgrids, which immediately replaces the attacked signal with a trusted event-driven signal constructed using True  ...  However for an increase in load at t = 3 sec, the proposed controller do not detect any events; which justify its robustness to differentiate between physical disturbances and cyber attacks.  ... 
doi:10.1109/tpel.2020.2995584 fatcat:ghdlwu65irg5pgfl2lpw7llltu

State Estimation and Event-Triggered Control for Cyber-Physical Systems under Malicious Attack

Yongzhen Guo, Baijing Han, Weiping Wang, Manman Yuan
2019 Mathematical Problems in Engineering  
This paper is concerned with the security state estimation and event-triggered control of cyber-physical systems (CPSs) under malicious attack.  ...  Then, according to the state information, the event-triggered controller is designed through the event-triggered communication. It is proved that the system is uniformly and finally bounded.  ...  resource constraints of the system, event-triggered control is introduced into the attacked cyber-physical system.  ... 
doi:10.1155/2019/9518403 fatcat:qmiyc5okarghzmjfja46xipo64

Secure Event-Triggered Distributed Kalman Filters for State Estimation over Wireless Sensor Networks [article]

Aquib Mustafa, Majid Mazouchi, Hamidreza Modares
2021 arXiv   pre-print
In this paper, we analyze the adverse effects of cyber-physical attacks as well as mitigate their impacts on the event-triggered distributed Kalman filter (DKF).  ...  We first show that although event-triggered mechanisms are highly desirable, the attacker can leverage the event-triggered mechanism to cause non-triggering misbehavior which significantly harms the network  ...  Recently, authors in [26] addressed the event-triggered distributed state estimation under DoS attacks by employing the covariance intersection fusion approach.  ... 
arXiv:1901.06746v4 fatcat:pp5owx2db5f6hnuftru5gxlw6i
« Previous Showing results 1 — 15 out of 6,008 results