509 Hits in 8.1 sec

Coding sensor outputs for injection attacks detection

Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas
2014 53rd IEEE Conference on Decision and Control  
An intelligent attacker can design a sequence of data injection to sensors that pass the state estimator and statistical fault detector, based on knowledge of the system parameters.  ...  This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks.  ...  Novel attack-detection algorithms besides existing information protection methods in cyber security area can be designed, by understanding how attacks affect state estimation and control of the system.  ... 
doi:10.1109/cdc.2014.7040293 dblp:conf/cdc/MiaoZPP14 fatcat:m3cshe5hrfd6zifn3aqjnw2tze

Secure Control: Towards Survivable Cyber-Physical Systems

Alvaro A. Cardenas, Saurabh Amin, Shankar Sastry
2008 2008 The 28th International Conference on Distributed Computing Systems Workshops  
to improve the survivability of cyber-physical systems.  ...  In this position paper we investigate the security of cyberphysical systems.  ...  The FDD unit estimates the system state and fault parameters based on measurement and control data.  ... 
doi:10.1109/icdcs.workshops.2008.40 dblp:conf/icdcsw/CardenasAS08 fatcat:m2ian6ev4ndcfmmtby24pbxnem

Distributed Estimation Techniques for Cyber-Physical Systems: A Systematic Review

Carmelina Ierardi, Luis Orihuela, Isabel Jurado
2019 Sensors  
This paper undertakes a systematic review (SR) on distributed estimation techniques applied to cyber-physical systems (CPS).  ...  As a result, this review compares the different techniques found in the literature in terms of: The proposed estimator (Kalman filter, Luenberger observer, Bayesian filter, etc.), the particular application  ...  Attack detection and secure estimation [53] 2018 Luenberger observer with Attack detection and secure estimation secure pre-selector [37] 2010 Kalman filter Fault detection and isolation [39  ... 
doi:10.3390/s19214720 pmid:31671691 pmcid:PMC6864544 fatcat:nstz5ihcdbbzto7p6fqyob7w3e

A Deviation-based Detection Method against False Data Injection Attacks in Smart Grid

Chao Pei, Yang Xiao, Wei Liang, Xiaojia Han
2021 IEEE Access  
INDEX TERMS State estimation, false data injection attacks, smart grid, cyber security, Kalman filter, cyber physical system.  ...  Meanwhile, based on the exponential weighting function, estimated measurements in the Kalman filter can be adaptively suppressed for different attack strengths of FDIAs, and then the difference of the  ...  INTRODUCTION Smart grid is a typical Cyber-Physical Systems (CPS) which combines the physical world and the cyber world via seamless integration of sensing, communication, computation, and control.  ... 
doi:10.1109/access.2021.3051155 fatcat:aklirnzj4vctfkgvswswonatfi

A survey on the security of cyber-physical systems

Guangyu Wu, Jian Sun, Jie Chen
2016 Control Theory and Technology  
This paper surveys recent results in this area and mainly focusses on three important categories: attack detection, attack design and secure estimation and control.  ...  Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes.  ...  Methods based on system and con-trol theory can help physical systems deal with certain cyber attacks, such as secure estimation, attack detection and resilient control.  ... 
doi:10.1007/s11768-016-5123-9 fatcat:bcdtusqftvgslffnkp57h33oz4

A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop

Lifu Zhang, Heng Zhang
2016 Sensors  
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow  ...  Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients.  ...  We present the latest achievements in CPS security, including security analysis of general Cyber-Physical Systems, security issues in smart grid and power systems, secure algorithms, secure state estimation  ... 
doi:10.3390/s16040443 pmid:27023559 pmcid:PMC4850957 fatcat:ndpgvn3rdjhtvldrl2ih7lsvuu

A combined survey on distribution system state estimation and false data injection in cyber‐physical power distribution networks

Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya, Anurag Sharma
2021 IET Cyber-Physical Systems  
On one hand, the cyber-physical system can play a pivotal role in coordination and control of distribution systems through distribution system state estimation (DSSE).  ...  The modelling aspects, namely DC loads, plug-in-vehicle and distributed generators (DGs) in DSSE and security aspects in cyber-physical distribution systems, are highlighted herein.  ...  On another side, owing to cyber-physical nature of distribution system, cyber security aspects focussing on cyber-attack by FDI is reviewed for security and vulnerability assessment of cyber physical distribution  ... 
doi:10.1049/cps2.12000 fatcat:xa5quumuqvckvkndud3d7eif5e

Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation

Haider al-Khateeb, Gregory Epiphaniou, Adam Reviczky, Petros Karadimas, Hadi Heidari
2018 IEEE Sensors Journal  
Simulations show the applicability of a Bayesian estimation technique, namely Kalman Filter.  ...  measures in the wake of increased cyber-threats against such systems.  ...  Looking specifically at these patterns for a system based profiling as compared to human behaviour profiling of Cyber-Physical Systems is adding value in combination with the estimation techniques discussed  ... 
doi:10.1109/jsen.2017.2782751 fatcat:prepadehivdklnogbwuyobdtby

Anomaly Detection from Cyber Threats via Infrastructure to Automated Vehicle [article]

Chris van der Ploeg, Robin Smit, Alexis Siagkris-Lekkos, Frank Benders, Emilia Silvas
2021 arXiv   pre-print
The analysis is done in a simulation environment, using cyber-attack scenarios from the Secredas Project (Cyber Security for Cross Domain Reliable Dependable Automated Systems) and provides insights into  ...  the limitations the vehicle has when facing I2V cyber attacks of different types and amplitudes and when sensor redundancy is lost.  ...  To address this challenge, in this paper we propose an extended Kalman filter (EKF) to detect object tracking anomalies that result from in-vehicle cyber attacks coming from I2V communication.  ... 
arXiv:2104.11790v1 fatcat:bldfw4rg5nc6pfrm5sb5aa4mzi

On the use of watermark-based schemes to detect cyber-physical attacks

Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro
2017 EURASIP Journal on Information Security  
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems.  ...  Some authors have handled replay and integrity attacks using, for example, physical attestation to validate the cyber process and detect the attacks, or watermark-based detectors which uses also physical  ...  In addition, JRH carried out the numeric simulations and laboratory experiments, and drafted the initial version of the manuscript.  ... 
doi:10.1186/s13635-017-0060-9 fatcat:qpgs4pfvyfb3rldu5gnebzx4wy

Secure Event-Triggered Distributed Kalman Filters for State Estimation over Wireless Sensor Networks [article]

Aquib Mustafa, Majid Mazouchi, Hamidreza Modares
2021 arXiv   pre-print
In this paper, we analyze the adverse effects of cyber-physical attacks as well as mitigate their impacts on the event-triggered distributed Kalman filter (DKF).  ...  An information-theoretic approach is presented next to detect attacks on both sensors and communication channels.  ...  Attack analysis and detection for distributed Kalman filters are discussed in [38] .  ... 
arXiv:1901.06746v4 fatcat:pp5owx2db5f6hnuftru5gxlw6i

Cyber-Physical Security for Ongoing Smart Grid Initiatives: A survey

Chen Peng, Md Musabbir Hossain
2020 IET Cyber-Physical Systems  
In this study, security issues of smart grid, including cyber-physical interdependency, attack varieties, detection methods, requirements, standards, challenges, and future prospects, are taken into consideration  ...  state of component j in the one-time stage.  ...  Acknowledgments This work was supported in part by the National Natural Science  ... 
doi:10.1049/iet-cps.2019.0039 fatcat:buj3j6zirfhuvpdkvok5kddg3q

A systems and control perspective of CPS security

Seyed Mehran Dibaji, Mohammad Pirani, David Bezalel Flamholz, Anuradha M. Annaswamy, Karl Henrik Johansson, Aranya Chakrabortty
2019 Annual Reviews in Control  
Another technique is [162] , where it proposes a decomposition of Kalman filters as a weighted sum of local state estimates under sparse sensor deception attacks (A 2 ) into a more secure estimation framework  ...  In [227] , [228] , worst case deception attacks are analyzed in stochastic systems and the number of sensors to secure the system using a Kalman filter approach is proposed.  ... 
doi:10.1016/j.arcontrol.2019.04.011 fatcat:wvg2nfbz4jexfe6ev26fv7aezm

Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas
2017 IEEE Transactions on Control of Network Systems  
An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters.  ...  This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks.  ...  The limitation of fault detection filter: Besides Kalman filter, observer-based fault detection filters for LTI systems with unknown error have been developed.  ... 
doi:10.1109/tcns.2016.2573039 fatcat:r7a7ctzp55a25k5hqrbsjat3ym

Secure Estimation in V2X Networks with Injection and Packet Drop Attacks

Arpan Chattopadhyay, Urbashi Mitra, Erik G. Strom
2018 2018 15th International Symposium on Wireless Communication Systems (ISWCS)  
In particular, secure remote estimation of a Gauss-Markov process based on measurements done by a set of vehicles is considered.  ...  The efficacy of the proposed filter is demonstrated numerically. Index Terms-Secure remote estimation,V2X, V2V, false data injection, packet drop attack, Kalman filter, stochastic approximation.  ...  Attack detection and secure estimation for linear Gaussian systems was also considered in [16] , but this detection scheme, which uses Kalman innovation sequence based detection, is not resilient against  ... 
doi:10.1109/iswcs.2018.8491221 dblp:conf/iswcs/ChattopadhyayMS18 fatcat:kcdak4xx7rdf7n2flqm5izqk2m
« Previous Showing results 1 — 15 out of 509 results