首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
A Systematic Review of Sensor Vulnerabilities and Cyber-Physical Threats in Industrial Robotic Systems 工业机器人系统中传感器漏洞和网络物理威胁的系统综述
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-29 DOI: 10.1049/cps2.70023
Abdul Kareem Shaik, Alireza Mohammadi, Hafiz Malik

Industrial robotic systems in the era of Industry 4.0 play a pivotal role in modern manufacturing. These systems, which belong to the larger class of cyber-physical systems (CPSs), rely heavily on advanced sensing capabilities to execute complex and delicate tasks with high precision and efficiency. It is of no surprise that the integration of sensors with Industry 4.0 robotic systems exposes them to potential cyber-physical risks/threats. This paper addresses a critical gap in the literature of industrial robotics cybersecurity by presenting a comprehensive analysis of vulnerabilities in the sensing systems of industrial robots. In particular, we systematically explore how sensor performance limits, faults and biases can be exploited by attackers who can then turn these inherent weaknesses into security threats. Our investigation relies on a detailed literature review of a multitude of commonly used sensors in industrial robotic systems through the lens of their physics-based operating principles, classifications, performance limits, potential faults and associated vulnerabilities against disturbances such as temperature fluctuations, electromagnetic and acoustic interference, and ambient light variations. The result of this systematic investigation is a ring chart illustrating the overlaps and entanglements of sensor faults and performance limits, which can be exploited by cyber-physical adversaries. Additionally, we investigate the cascading effects of compromised sensor data on the operation of industrial robotic systems through a cause-and-effect analysis, where the sensor vulnerabilities can cause malfunction and lead to cyber-physical damage. The result of this analysis is a sensor cyber-physical threat cause-and-effect diagram, which can be employed for design of robust and effective cyber-physical defence measures. By providing insights into sensor-related cyber-risks, our cyber-physical threat analysis paves the path for enhanced industrial robotics security.

工业4.0时代的工业机器人系统在现代制造业中发挥着举足轻重的作用。这些系统属于更大类别的网络物理系统(cps),严重依赖于先进的传感能力,以高精度和高效率执行复杂和微妙的任务。毫无疑问,传感器与工业4.0机器人系统的集成使它们面临潜在的网络物理风险/威胁。本文通过对工业机器人传感系统中的漏洞进行全面分析,解决了工业机器人网络安全文献中的一个关键空白。特别是,我们系统地探讨了传感器性能限制、故障和偏差如何被攻击者利用,攻击者可以将这些固有的弱点转化为安全威胁。我们的研究依赖于对工业机器人系统中大量常用传感器的详细文献综述,通过其基于物理的工作原理、分类、性能限制、潜在故障和相关漏洞来应对诸如温度波动、电磁和声学干扰以及环境光变化等干扰。这个系统调查的结果是一个环形图,说明了传感器故障和性能限制的重叠和纠缠,这可以被网络物理对手利用。此外,我们通过因果分析研究了受损传感器数据对工业机器人系统运行的级联效应,其中传感器漏洞可能导致故障并导致网络物理损害。分析结果得到了传感器网络物理威胁的因果关系图,可用于设计稳健有效的网络物理防御措施。通过洞察传感器相关的网络风险,我们的网络物理威胁分析为增强工业机器人的安全性铺平了道路。
{"title":"A Systematic Review of Sensor Vulnerabilities and Cyber-Physical Threats in Industrial Robotic Systems","authors":"Abdul Kareem Shaik,&nbsp;Alireza Mohammadi,&nbsp;Hafiz Malik","doi":"10.1049/cps2.70023","DOIUrl":"10.1049/cps2.70023","url":null,"abstract":"<p>Industrial robotic systems in the era of Industry 4.0 play a pivotal role in modern manufacturing. These systems, which belong to the larger class of cyber-physical systems (CPSs), rely heavily on advanced sensing capabilities to execute complex and delicate tasks with high precision and efficiency. It is of no surprise that the integration of sensors with Industry 4.0 robotic systems exposes them to potential cyber-physical risks/threats. This paper addresses a critical gap in the literature of industrial robotics cybersecurity by presenting a comprehensive analysis of vulnerabilities in the sensing systems of industrial robots. In particular, we systematically explore how sensor performance limits, faults and biases can be exploited by attackers who can then turn these inherent weaknesses into security threats. Our investigation relies on a detailed literature review of a multitude of commonly used sensors in industrial robotic systems through the lens of their physics-based operating principles, classifications, performance limits, potential faults and associated vulnerabilities against disturbances such as temperature fluctuations, electromagnetic and acoustic interference, and ambient light variations. The result of this systematic investigation is a ring chart illustrating the overlaps and entanglements of sensor faults and performance limits, which can be exploited by cyber-physical adversaries. Additionally, we investigate the cascading effects of compromised sensor data on the operation of industrial robotic systems through a cause-and-effect analysis, where the sensor vulnerabilities can cause malfunction and lead to cyber-physical damage. The result of this analysis is a sensor cyber-physical threat cause-and-effect diagram, which can be employed for design of robust and effective cyber-physical defence measures. By providing insights into sensor-related cyber-risks, our cyber-physical threat analysis paves the path for enhanced industrial robotics security.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144171813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Investigation of the Resilience of EV Charging Infrastructure Under Cyber-Physical Threats Based on a Real-Time Co-Simulation Testbed 基于实时联合仿真试验台的网络物理威胁下电动汽车充电基础设施弹性创新研究
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-15 DOI: 10.1049/cps2.70021
Feras Alasali, Salah Abu Ghalyon, Naser El-Naily, Mohammed I. Abuashour, Anas AlMajali, Awni Itradat, William Holderbaum

The rapid expansion of electric vehicle (EV) charging infrastructure has introduced significant vulnerabilities to cyber-physical threats, raising concerns about the resilience of both charging and smart power grid systems. This paper presents an innovative investigation into the resilience of EV charging infrastructure using a real-time co-simulation testbed, integrating both power network models and communication protocols such as IEC 61850. The study addresses gaps in existing research by implementing a realistic smart grid environment that incorporates EVs, charging stations and communication networks to simulate cyber-physical interactions. Key cyber-attacks, such as remote charging station status and configuration manipulations and their impact on it, are analysed in real-time simulations. Results show that even a relatively small attack utilising an IEEE 9-bus system with two EV charging stations can severely disrupt grid stability. The paper also explores various attacks targeting EV infrastructure, including charging stations, communication protocols, and management systems. The combined effects of cyber-attacks on power consumption and current variation highlight the critical importance of ensuring that charging infrastructure can adapt to sudden changes in demand while maintaining operational integrity.

电动汽车(EV)充电基础设施的快速扩张带来了网络物理威胁的重大漏洞,引发了人们对充电和智能电网系统弹性的担忧。本文采用实时联合仿真测试平台,结合电网模型和IEC 61850等通信协议,对电动汽车充电基础设施的弹性进行了创新研究。该研究通过实现一个现实的智能电网环境,将电动汽车、充电站和通信网络结合起来,模拟网络-物理交互,解决了现有研究中的空白。在实时仿真中分析了远程充电站状态和配置操纵等关键网络攻击及其影响。结果表明,即使是利用IEEE 9总线系统和两个电动汽车充电站的相对较小的攻击也会严重破坏电网的稳定性。本文还探讨了针对电动汽车基础设施的各种攻击,包括充电站、通信协议和管理系统。网络攻击对电力消耗和电流变化的综合影响凸显了确保充电基础设施能够适应需求的突然变化,同时保持运营完整性的重要性。
{"title":"Innovative Investigation of the Resilience of EV Charging Infrastructure Under Cyber-Physical Threats Based on a Real-Time Co-Simulation Testbed","authors":"Feras Alasali,&nbsp;Salah Abu Ghalyon,&nbsp;Naser El-Naily,&nbsp;Mohammed I. Abuashour,&nbsp;Anas AlMajali,&nbsp;Awni Itradat,&nbsp;William Holderbaum","doi":"10.1049/cps2.70021","DOIUrl":"10.1049/cps2.70021","url":null,"abstract":"<p>The rapid expansion of electric vehicle (EV) charging infrastructure has introduced significant vulnerabilities to cyber-physical threats, raising concerns about the resilience of both charging and smart power grid systems. This paper presents an innovative investigation into the resilience of EV charging infrastructure using a real-time co-simulation testbed, integrating both power network models and communication protocols such as IEC 61850. The study addresses gaps in existing research by implementing a realistic smart grid environment that incorporates EVs, charging stations and communication networks to simulate cyber-physical interactions. Key cyber-attacks, such as remote charging station status and configuration manipulations and their impact on it, are analysed in real-time simulations. Results show that even a relatively small attack utilising an IEEE 9-bus system with two EV charging stations can severely disrupt grid stability. The paper also explores various attacks targeting EV infrastructure, including charging stations, communication protocols, and management systems. The combined effects of cyber-attacks on power consumption and current variation highlight the critical importance of ensuring that charging infrastructure can adapt to sudden changes in demand while maintaining operational integrity.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CompDSE: A Methodology for Design Space Exploration of Computing Subsystems Within Complex Cyber-Physical Systems compse:复杂网络物理系统中计算子系统的设计空间探索方法
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-15 DOI: 10.1049/cps2.70019
Faezeh Sadat Saadatmand, Todor Stefanov, Ignacio González Alonso, Andy D. Pimentel, Benny Akesson

Designing the next-generation complex distributed cyber-physical systems (dCPS) poses significant challenges for manufacturing companies, necessitating efficient design space exploration (DSE) techniques to evaluate potential design decisions and their impact on nonfunctional aspects of the systems, such as performance, reliability and energy consumption. This paper introduces CompDSE, a methodology designed to facilitate the DSE of complex dCPS, specifically focusing on the cyber components, that is, the computing subsystems within dCPS. CompDSE defines and utilises abstract models of the application workload, computing hardware platform and workload-to-platform mapping of dCPS, automatically derived from runtime trace data, and integrates them into a discrete event simulation environment to explore various design points. We demonstrate the effectiveness of our methodology through a case study on the ASML TWINSCAN lithography machine, a complex industrial dCPS. The results showcase potential performance enhancements achieved by optimising computing subsystems while considering physical constraints. Evaluating each design point takes under a minute, highlighting the CompDSE efficiency and scalability in tackling complex dCPS with large design spaces.

设计下一代复杂分布式网络物理系统(dCPS)对制造公司提出了重大挑战,需要高效的设计空间探索(DSE)技术来评估潜在的设计决策及其对系统非功能方面的影响,如性能、可靠性和能耗。本文介绍了CompDSE,这是一种旨在促进复杂dCPS的DSE的方法,特别关注网络组件,即dCPS中的计算子系统。CompDSE定义并利用应用程序工作负载、计算硬件平台和dps的工作负载到平台映射的抽象模型,这些模型自动地从运行时跟踪数据中派生出来,并将它们集成到一个离散事件仿真环境中,以探索各种设计点。我们通过对ASML TWINSCAN光刻机(一种复杂的工业dCPS)的案例研究证明了我们方法的有效性。结果显示了在考虑物理约束的情况下通过优化计算子系统实现的潜在性能增强。评估每个设计点只需不到一分钟,突出了compse在处理具有大型设计空间的复杂dCPS方面的效率和可扩展性。
{"title":"CompDSE: A Methodology for Design Space Exploration of Computing Subsystems Within Complex Cyber-Physical Systems","authors":"Faezeh Sadat Saadatmand,&nbsp;Todor Stefanov,&nbsp;Ignacio González Alonso,&nbsp;Andy D. Pimentel,&nbsp;Benny Akesson","doi":"10.1049/cps2.70019","DOIUrl":"10.1049/cps2.70019","url":null,"abstract":"<p>Designing the next-generation complex distributed cyber-physical systems (dCPS) poses significant challenges for manufacturing companies, necessitating efficient design space exploration (DSE) techniques to evaluate potential design decisions and their impact on nonfunctional aspects of the systems, such as performance, reliability and energy consumption. This paper introduces CompDSE, a methodology designed to facilitate the DSE of complex dCPS, specifically focusing on the cyber components, that is, the computing subsystems within dCPS. CompDSE defines and utilises abstract models of the application workload, computing hardware platform and workload-to-platform mapping of dCPS, automatically derived from runtime trace data, and integrates them into a discrete event simulation environment to explore various design points. We demonstrate the effectiveness of our methodology through a case study on the ASML TWINSCAN lithography machine, a complex industrial dCPS. The results showcase potential performance enhancements achieved by optimising computing subsystems while considering physical constraints. Evaluating each design point takes under a minute, highlighting the CompDSE efficiency and scalability in tackling complex dCPS with large design spaces.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Federated Learning for Energy Disaggregation of Smart Homes 智能家居能源分解的隐私保护联邦学习
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-04 DOI: 10.1049/cps2.70013
Mazhar Ali, Ajit Kumar, Bong Jun Choi

Smart advanced metering infrastructure and edge devices show promising solutions in digitalising distributed energy systems. Energy disaggregation of household load consumption provides a better understanding of consumers’ appliance-level usage patterns. Machine learning approaches enhance the power system's efficiency but this is contingent upon sufficient training samples for efficient and accurate prediction tasks. In a centralised setup, transferring such a substantially high volume of information to the cloud server has a communication bottleneck. Although high-computing edge devices seek to address such problems, the data scarcity and heterogeneity among clients remain challenges to be addressed. Federated learning offers a compelling solution in such a scenario by leveraging the ML model training at edge devices and aggregating the client's updates at a cloud server. However, FL still faces significant security issues, including the potential eavesdropping by a malicious actor with the intention of stealing clients' information while communicating with an honest-but-curious server. The study aims to secure the sensitive information of energy users participating in the nonintrusive load monitoring (NILM) program by integrating differential privacy with a personalised federated learning approach. The Fisher information method was adapted to extract the global model information based on common features, while personalised updates will not be shared with the server for client-specific features. Similarly, the authors employed an adaptive differential privacy only on the shared local updates (DP-PFL) while communicating with the server. Experimental results on the Pecan Street and REFIT datasets depict that DP-PFL exhibits more favourable performance on both the energy prediction and status classification tasks compared to other state-of-the-art DP approaches in federated NILM.

智能先进计量基础设施和边缘设备在数字化分布式能源系统中显示出有前途的解决方案。家庭负荷消费的能源分类可以更好地了解消费者的电器级使用模式。机器学习方法提高了电力系统的效率,但这取决于足够的训练样本来进行有效和准确的预测任务。在集中式设置中,将如此大量的信息传输到云服务器存在通信瓶颈。尽管高计算边缘设备试图解决这些问题,但客户端之间的数据稀缺性和异质性仍然是需要解决的挑战。联邦学习通过在边缘设备上利用ML模型训练并在云服务器上聚合客户端的更新,在这种情况下提供了一个引人注目的解决方案。然而,FL仍然面临着重大的安全问题,包括恶意行为者在与诚实但好奇的服务器通信时窃取客户端信息的潜在窃听。该研究旨在通过将差分隐私与个性化联邦学习方法相结合,保护参与非侵入式负荷监测(NILM)计划的能源用户的敏感信息。采用Fisher信息方法提取基于共同特征的全局模型信息,而对于客户端特定的特征,则不会与服务器共享个性化更新。同样,作者在与服务器通信时仅在共享本地更新(DP-PFL)上采用自适应差异隐私。在Pecan Street和REFIT数据集上的实验结果表明,与联邦NILM中其他最先进的DP方法相比,DP- pfl在能量预测和状态分类任务上都表现出更好的性能。
{"title":"Privacy Preserving Federated Learning for Energy Disaggregation of Smart Homes","authors":"Mazhar Ali,&nbsp;Ajit Kumar,&nbsp;Bong Jun Choi","doi":"10.1049/cps2.70013","DOIUrl":"10.1049/cps2.70013","url":null,"abstract":"<p>Smart advanced metering infrastructure and edge devices show promising solutions in digitalising distributed energy systems. Energy disaggregation of household load consumption provides a better understanding of consumers’ appliance-level usage patterns. Machine learning approaches enhance the power system's efficiency but this is contingent upon sufficient training samples for efficient and accurate prediction tasks. In a centralised setup, transferring such a substantially high volume of information to the cloud server has a communication bottleneck. Although high-computing edge devices seek to address such problems, the data scarcity and heterogeneity among clients remain challenges to be addressed. Federated learning offers a compelling solution in such a scenario by leveraging the ML model training at edge devices and aggregating the client's updates at a cloud server. However, FL still faces significant security issues, including the potential eavesdropping by a malicious actor with the intention of stealing clients' information while communicating with an honest-but-curious server. The study aims to secure the sensitive information of energy users participating in the nonintrusive load monitoring (NILM) program by integrating differential privacy with a personalised federated learning approach. The Fisher information method was adapted to extract the global model information based on common features, while personalised updates will not be shared with the server for client-specific features. Similarly, the authors employed an adaptive differential privacy only on the shared local updates (DP-PFL) while communicating with the server. Experimental results on the Pecan Street and REFIT datasets depict that DP-PFL exhibits more favourable performance on both the energy prediction and status classification tasks compared to other state-of-the-art DP approaches in federated NILM.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143905207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socio-Technical Security Modelling and Simulations in Cyber-Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers 社会技术安全建模和模拟在网络物理系统:展望知识,观念,实践,使能者和障碍
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-30 DOI: 10.1049/cps2.70017
Uchenna Daniel Ani, Mohammed Al-Mhiqani, Nilufer Tuptuk, Stephen Hailes, Jeremy Daniel McKendrick Watson

Socio-Technical Security Modelling and Simulation (STSec-M&S) is a technique used for reasoning and representing security viewpoints that include both the social and technical aspects of a system. It has shown great potential for improving the cybersecurity and resilience of Critical Infrastructure (CI). This study involved a multi-methods approach, consisting of a scoping literature review and a focus group workshop, conducted with stakeholder engagement from critical infrastructure stakeholders to explore their perceptions and practices regarding the use of socio-technical security modelling and simulation. The findings suggest that the current state of knowledge regarding the use and effectiveness of STSec-M&Ss approaches is limited in CI domains. Consequently, there is little application of it in existing CI systems, regardless of its recognised benefits of enabling a better understanding of CI functionalities, security goals, early and more holistic risk identifications and selection of appropriate countermeasures. The benefits of the STSec-M&S approach can be better realised by effective cross-sector communications and collaborations, team partnerships, system and approach sophistication, and better security awareness amongst others. The potential barriers that can impede such benefits include high expense for implementing the technique, low data availability and quality, regulatory compliance, and competency gaps etc. Helpful recommendations include exploring and using realistic data, validating system security models, and exploring new ways of reskilling and upskilling CI stakeholders in socio-technical security-thinking and M&S approaches to enhance cybersecurity and resilience of CIs.

社会技术安全建模和仿真(STSec-M&;S)是一种用于推理和表示安全观点的技术,包括系统的社会和技术方面。它在提高关键基础设施(CI)的网络安全和弹性方面显示出巨大的潜力。本研究采用了多种方法,包括范围界定文献综述和焦点小组研讨会,在关键基础设施利益相关者的参与下进行,探讨他们对使用社会技术安全建模和模拟的看法和实践。研究结果表明,目前关于STSec-M&; s方法的使用和有效性的知识状况在CI领域是有限的。因此,它在现有CI系统中的应用很少,尽管它可以更好地理解CI功能、安全目标、早期和更全面的风险识别以及选择适当的对策。透过有效的跨界别沟通和合作、团队伙伴关系、完善的系统和方法,以及更强的保安意识,可以更有效地发挥STSec-M&;S方法的好处。可能阻碍这些好处的潜在障碍包括实现技术的高费用、低数据可用性和质量、法规遵从性和能力差距等。有用的建议包括探索和使用现实数据,验证系统安全模型,以及探索在社会技术安全思维和M&;S方法方面重新培训和提高CI利益相关者的技能的新方法,以增强CI的网络安全和弹性。
{"title":"Socio-Technical Security Modelling and Simulations in Cyber-Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers","authors":"Uchenna Daniel Ani,&nbsp;Mohammed Al-Mhiqani,&nbsp;Nilufer Tuptuk,&nbsp;Stephen Hailes,&nbsp;Jeremy Daniel McKendrick Watson","doi":"10.1049/cps2.70017","DOIUrl":"10.1049/cps2.70017","url":null,"abstract":"<p>Socio-Technical Security Modelling and Simulation (STSec-M&amp;S) is a technique used for reasoning and representing security viewpoints that include both the social and technical aspects of a system. It has shown great potential for improving the cybersecurity and resilience of Critical Infrastructure (CI). This study involved a multi-methods approach, consisting of a scoping literature review and a focus group workshop, conducted with stakeholder engagement from critical infrastructure stakeholders to explore their perceptions and practices regarding the use of socio-technical security modelling and simulation. The findings suggest that the current state of knowledge regarding the use and effectiveness of STSec-M&amp;Ss approaches is limited in CI domains. Consequently, there is little application of it in existing CI systems, regardless of its recognised benefits of enabling a better understanding of CI functionalities, security goals, early and more holistic risk identifications and selection of appropriate countermeasures. The benefits of the STSec-M&amp;S approach can be better realised by effective cross-sector communications and collaborations, team partnerships, system and approach sophistication, and better security awareness amongst others. The potential barriers that can impede such benefits include high expense for implementing the technique, low data availability and quality, regulatory compliance, and competency gaps etc. Helpful recommendations include exploring and using realistic data, validating system security models, and exploring new ways of reskilling and upskilling CI stakeholders in socio-technical security-thinking and M&amp;S approaches to enhance cybersecurity and resilience of CIs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Storage System Configuration for Supporting the Scheduling and Frequency Regulation of Offshore Microgrids 支持近海微电网调度调频的储能系统配置
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1049/cps2.70010
Longfei Liu, Jing Liu, Xiandong Xu, Xiaodan Yu, Wei Wei, Hongjie Jia

Offshore microgrids such as oil and gas platforms are embracing wind power to reduce onsite gas consumption and carbon emission. Meanwhile, the intermittency of wind power threats the operational security of offshore microgrids which are mainly islanded cyber-physical system. Although energy storage system (ESS) could smooth the wind power, it also changes the operational strategy of the microgrids. Yet, it is still not clear on how to determine the ESS configuration, particularly for MW-level offshore microgrid with limited rooms for ESS installment. In this paper, an optimal ESS configuration method is proposed to support operational scheduling and frequency regulation of the microgrids at different time scales. A source-storage-load coordinated frequency response model is proposed to exploit the advantages of different types of ESS. The model is converted to convex quadratic forms and incorporated into the ESS configuration model to guarantee the frequency stability of offshore microgrids. The proposed ESS configuration method is validated using the data of a real offshore oil and gas platform. Compared with existing methods, the full life cycle economic efficiency, wind power utilisation, and operational security are all significantly improved.

石油和天然气平台等海上微电网正在采用风力发电,以减少现场的天然气消耗和碳排放。同时,风力发电的间歇性也威胁着以孤岛网络物理系统为主的海上微电网的运行安全。储能系统(ESS)虽然可以平滑风力发电,但也改变了微电网的运行策略。然而,目前尚不清楚如何确定ESS配置,特别是兆瓦级海上微电网的ESS安装空间有限。本文提出了一种支持不同时间尺度微电网运行调度和频率调节的ESS优化配置方法。为了充分利用不同类型ESS的优点,提出了一种源-存储-负载协调频率响应模型。将该模型转化为凸二次型,并纳入ESS组态模型,以保证近海微电网的频率稳定。利用实际海上油气平台的数据对所提出的ESS配置方法进行了验证。与现有方法相比,全生命周期经济效率、风电利用率、运行安全性均有显著提高。
{"title":"Energy Storage System Configuration for Supporting the Scheduling and Frequency Regulation of Offshore Microgrids","authors":"Longfei Liu,&nbsp;Jing Liu,&nbsp;Xiandong Xu,&nbsp;Xiaodan Yu,&nbsp;Wei Wei,&nbsp;Hongjie Jia","doi":"10.1049/cps2.70010","DOIUrl":"10.1049/cps2.70010","url":null,"abstract":"<p>Offshore microgrids such as oil and gas platforms are embracing wind power to reduce onsite gas consumption and carbon emission. Meanwhile, the intermittency of wind power threats the operational security of offshore microgrids which are mainly islanded cyber-physical system. Although energy storage system (ESS) could smooth the wind power, it also changes the operational strategy of the microgrids. Yet, it is still not clear on how to determine the ESS configuration, particularly for MW-level offshore microgrid with limited rooms for ESS installment. In this paper, an optimal ESS configuration method is proposed to support operational scheduling and frequency regulation of the microgrids at different time scales. A source-storage-load coordinated frequency response model is proposed to exploit the advantages of different types of ESS. The model is converted to convex quadratic forms and incorporated into the ESS configuration model to guarantee the frequency stability of offshore microgrids. The proposed ESS configuration method is validated using the data of a real offshore oil and gas platform. Compared with existing methods, the full life cycle economic efficiency, wind power utilisation, and operational security are all significantly improved.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems 电力系统中同步相量网络安全评估的可扩展网络物理测试平台
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1049/cps2.12106
Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn

This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.

本文提出了一种基于同步相量的实时网络物理电力系统测试平台,该平台采用了一种新颖的安全评估工具pySynphasor,可以在相量测量单元(PMU)上模拟不同的真实攻击场景。该试验台着重于使用不同组件进行实时网络安全仿真,包括实时数字模拟器、虚拟机(VM)、通信网络模拟器和数据包处理工具。基于脚本的虚拟机部署和软件定义网络仿真,提供了一个高度可扩展的网络物理测试平台,可以模拟真实电力系统在不同攻击场景下的情况,如地址解析协议(ARP)投毒攻击、中间人攻击(MITM)攻击、虚假数据注入攻击(FDIA)攻击和窃听攻击。已经实现了一个开源pySynphasor模块来分析IEEE C37.118.2协议的安全漏洞。本文还提出了一个交互式框架,用于利用pySynphasor模块将虚假数据注入到现实系统中,该框架可以解剖和重构C37.118.2数据包。因此,它扩展了测试和开发基于pmu的系统并分析其安全漏洞的潜力,使电力工业和学术界受益。以FDIA攻击PMU测量和不良数据检测技术为例,展示了该试验台的性能。
{"title":"Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems","authors":"Shuvangkar Chandra Das,&nbsp;Tuyen Vu,&nbsp;Herbert Ginn","doi":"10.1049/cps2.12106","DOIUrl":"10.1049/cps2.12106","url":null,"abstract":"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIDER: Cyber-Security in Industrial IoT Using Deep Learning and Ring Learning with Errors CIDER:使用深度学习和带错误的环学习的工业物联网网络安全
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-17 DOI: 10.1049/cps2.70015
Siu Ting Tsoi, Anish Jindal

Traditional security measures such as access control and authentication need to be more effective against ever-evolving threats. Moreover, security concerns increase as more industries shift towards adopting the industrial Internet of things (IIoT). Therefore, this paper proposes secure measures using deep machine learning-based intrusion detection and advanced encryption schemes based on lattice-based cryptography on three-layered cloud-edge-fog IIoT architecture. The novelty of the paper is an integrated security framework for IIoT that combines deep learning-based intrusion detection system (IDS) with lightweight cryptographic protocols. For deep learning, multi-layer perception (MLP), convolutional neural network (CNN), and TabNet were implemented for intruder detection systems from edge to cloud layer, and ring learning with error (RLWE) was proposed for homomorphic encryption to communicate data between fog and edge layer. The evaluation experiments were performed on the Ton_IoT dataset and the results show that the deep learning models have a very good accuracy of around 92% for multiclass attack classification. Moreover, RLWE results show improved encryption time and reduced ciphertext size against standard Learning With Error encryption.

传统的安全措施(如访问控制和身份验证)需要更有效地应对不断变化的威胁。此外,随着越来越多的行业转向采用工业物联网(IIoT),安全问题也越来越严重。因此,本文提出了基于深度机器学习的入侵检测和基于栅格加密的高级加密方案的安全措施,该方案基于三层云边缘雾IIoT架构。本文的新颖之处在于为工业物联网提供了一个集成的安全框架,该框架将基于深度学习的入侵检测系统(IDS)与轻量级加密协议相结合。在深度学习方面,采用多层感知(MLP)、卷积神经网络(CNN)和TabNet技术实现了从边缘到云层的入侵检测系统,采用带误差环学习(RLWE)技术实现了同态加密,实现了雾层和边缘层之间的数据通信。在Ton_IoT数据集上进行了评估实验,结果表明,深度学习模型对多类攻击的分类准确率达到了92%左右。此外,RLWE结果表明,与标准的错误学习加密相比,加密时间更长,密文大小更小。
{"title":"CIDER: Cyber-Security in Industrial IoT Using Deep Learning and Ring Learning with Errors","authors":"Siu Ting Tsoi,&nbsp;Anish Jindal","doi":"10.1049/cps2.70015","DOIUrl":"10.1049/cps2.70015","url":null,"abstract":"<p>Traditional security measures such as access control and authentication need to be more effective against ever-evolving threats. Moreover, security concerns increase as more industries shift towards adopting the industrial Internet of things (IIoT). Therefore, this paper proposes secure measures using deep machine learning-based intrusion detection and advanced encryption schemes based on lattice-based cryptography on three-layered cloud-edge-fog IIoT architecture. The novelty of the paper is an integrated security framework for IIoT that combines deep learning-based intrusion detection system (IDS) with lightweight cryptographic protocols. For deep learning, multi-layer perception (MLP), convolutional neural network (CNN), and TabNet were implemented for intruder detection systems from edge to cloud layer, and ring learning with error (RLWE) was proposed for homomorphic encryption to communicate data between fog and edge layer. The evaluation experiments were performed on the Ton_IoT dataset and the results show that the deep learning models have a very good accuracy of around 92% for multiclass attack classification. Moreover, RLWE results show improved encryption time and reduced ciphertext size against standard Learning With Error encryption.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Risk Identification and Classification-Based Load Forecasting Tool for Pandemic Situations 大流行情况下的网络风险识别和基于分类的负荷预测工具
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-14 DOI: 10.1049/cps2.70014
Kuldeep Singh Shivran, Kyle Swire-Thompson, Neetesh Saxena, Sarasij Das

Smart grid operators use load forecasting algorithms to predict energy load for the reliable and economical operation of the electricity grid. COVID-19 pandemic-like situations (PLS) can significantly impact energy load demand due to uncertainties in factors such as regulatory orders, pandemic severity and human behavioural patterns. Additionally, in a smart grid, cyberattacks can manipulate forecasted load data, leading to suboptimal decisions, economic losses and potential blackouts. Forecasting load during these situations is challenging for traditional load forecasting tools, as they struggle to identify cyberattacks amidst uncertain load demand, where cyberattacks may mimic pandemic-like load patterns. Traditional forecasting methods do not incorporate factors related to pandemics and cyberattacks. Recent studies have focused on forecasting by considering factors such as COVID-19 cases, social distancing, weather, and temperature but fail to account for the impact of regulatory orders and pandemic severity. They also lack the ability to differentiate between normal and anomalous forecasts and classify the type of attack in anomalous data. This paper presents a tool for short-term load forecasting, anomaly detection and cyberattack classification for pandemic-like situations (PLS). The proposed short-term load forecasting algorithm uses a weighted moving average and an adjustment factor incorporating regulatory orders and pandemic severity, making it computationally efficient and deterministic. Additionally, the proposed anomaly detection and cyberattack classification algorithm provides robust options for detecting anomalies and classifying various types of cyberattacks. The proposed tool has been evaluated using K-Fold cross-validation to improve generalisability and reduce overfitting. The mean squared error (MSE) was used to measure prediction accuracy and detect discrepancies. It has been analysed and tested on real-load data from the State Load Dispatch Centre (SLDC), Delhi, of the Indian National Grid.

智能电网运营商使用负荷预测算法来预测能源负荷,以确保电网的可靠和经济运行。由于监管命令、大流行病严重程度和人类行为模式等因素存在不确定性,COVID-19 类大流行病(PLS)会对能源负荷需求产生重大影响。此外,在智能电网中,网络攻击可能会操纵预测的负荷数据,从而导致次优决策、经济损失和潜在停电。在这些情况下预测负荷对传统负荷预测工具来说具有挑战性,因为它们很难在不确定的负荷需求中识别网络攻击,而网络攻击可能会模仿类似大流行病的负荷模式。传统的预测方法没有考虑到与大流行病和网络攻击相关的因素。最近的研究侧重于通过考虑 COVID-19 案例、社会距离、天气和温度等因素进行预测,但没有考虑监管命令和大流行病严重程度的影响。这些研究还缺乏区分正常预测和异常预测以及对异常数据中的攻击类型进行分类的能力。本文提出了一种针对类似大流行情况的短期负荷预测、异常检测和网络攻击分类工具(PLS)。所提出的短期负荷预测算法采用加权移动平均法,并结合了监管命令和大流行病严重程度的调整因子,因此计算效率高且具有确定性。此外,拟议的异常检测和网络攻击分类算法为检测异常和分类各种类型的网络攻击提供了稳健的选择。为了提高通用性和减少过度拟合,我们使用 K-Fold 交叉验证对所提出的工具进行了评估。平均平方误差 (MSE) 用于衡量预测准确性和检测差异。对印度国家电网德里国家负荷调度中心(SLDC)的实际负荷数据进行了分析和测试。
{"title":"Cyber Risk Identification and Classification-Based Load Forecasting Tool for Pandemic Situations","authors":"Kuldeep Singh Shivran,&nbsp;Kyle Swire-Thompson,&nbsp;Neetesh Saxena,&nbsp;Sarasij Das","doi":"10.1049/cps2.70014","DOIUrl":"10.1049/cps2.70014","url":null,"abstract":"<p>Smart grid operators use load forecasting algorithms to predict energy load for the reliable and economical operation of the electricity grid. COVID-19 pandemic-like situations (PLS) can significantly impact energy load demand due to uncertainties in factors such as regulatory orders, pandemic severity and human behavioural patterns. Additionally, in a smart grid, cyberattacks can manipulate forecasted load data, leading to suboptimal decisions, economic losses and potential blackouts. Forecasting load during these situations is challenging for traditional load forecasting tools, as they struggle to identify cyberattacks amidst uncertain load demand, where cyberattacks may mimic pandemic-like load patterns. Traditional forecasting methods do not incorporate factors related to pandemics and cyberattacks. Recent studies have focused on forecasting by considering factors such as COVID-19 cases, social distancing, weather, and temperature but fail to account for the impact of regulatory orders and pandemic severity. They also lack the ability to differentiate between normal and anomalous forecasts and classify the type of attack in anomalous data. This paper presents a tool for short-term load forecasting, anomaly detection and cyberattack classification for pandemic-like situations (PLS). The proposed short-term load forecasting algorithm uses a weighted moving average and an adjustment factor incorporating regulatory orders and pandemic severity, making it computationally efficient and deterministic. Additionally, the proposed anomaly detection and cyberattack classification algorithm provides robust options for detecting anomalies and classifying various types of cyberattacks. The proposed tool has been evaluated using K-Fold cross-validation to improve generalisability and reduce overfitting. The mean squared error (MSE) was used to measure prediction accuracy and detect discrepancies. It has been analysed and tested on real-load data from the State Load Dispatch Centre (SLDC), Delhi, of the Indian National Grid.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience PI controller design for mitigating weak denial-of-service attacks in cyber-physical systems 弹性PI控制器设计用于减轻网络物理系统中的弱拒绝服务攻击
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-02 DOI: 10.1049/cps2.70002
Hamid Reza Chavoshi, Ali Khoshlahjeh Sedgh, Hamid Khaloozadeh

Modern control systems integrate with information technologies through Networked Control Systems and Cyber-Physical Systems (CPS). Although these systems are beneficial, they raise security concerns for critical infrastructure. Cyberattacks on CPS communication channels, such as denial-of-service (DoS) attacks, can cause significant time delays and data loss, leading to poor system performance and instability. This article assumes weak DoS attack influences as an unknown delay. Then, system maximum resistance time against DoS attacks will be calculated according to the Lyapunov–Krasovskii theorem, and a conservative upper bound delay is included in the system model, which maintains system stability. With this assumption, Kharitonov's theorem-based robust Proportional-Integral (PI) controller is developed to mitigate DoS attacks. In addition, another Ziegler–Nichols tuned PI controller is presented to demonstrate that the proposed robust PI controller effectively reduces DoS attack impacts on CPSs. Finally, in a liquid-level networked control system, the efficacy of two PI controllers was evaluated. Results show that Kharitonov's theorem-based controller surpasses the Ziegler–Nichols method PI controller in mitigating the impact of DoS attacks on system behaviour, including maintaining system stability and keeping both transient response characteristics and setpoint tracking at desired values. Also, the proposed design strategy for reducing DoS attack effects is simple and less conservative than other robust control methods.

现代控制系统通过网络控制系统和网络物理系统(CPS)与信息技术相结合。尽管这些系统是有益的,但它们引起了对关键基础设施的安全担忧。针对CPS通信通道的网络攻击,如DoS (denial-of-service)攻击,会造成严重的时间延迟和数据丢失,导致系统性能下降和不稳定。本文假设弱DoS攻击影响为未知延迟。然后,根据Lyapunov-Krasovskii定理计算系统对DoS攻击的最大抵抗时间,并在系统模型中加入保守的上界延迟,保持系统的稳定性。基于此假设,开发了基于Kharitonov定理的鲁棒比例积分(PI)控制器来减轻DoS攻击。此外,提出了另一个Ziegler-Nichols调谐PI控制器,以证明所提出的鲁棒PI控制器有效地减少了DoS攻击对cps的影响。最后,在一个液位网络控制系统中,对两种PI控制器的有效性进行了评价。结果表明,Kharitonov基于定理的控制器在减轻DoS攻击对系统行为的影响方面优于Ziegler-Nichols方法PI控制器,包括保持系统稳定性和保持瞬态响应特性和设定值跟踪在期望值。此外,与其他鲁棒控制方法相比,所提出的减少DoS攻击效果的设计策略简单且保守性较低。
{"title":"Resilience PI controller design for mitigating weak denial-of-service attacks in cyber-physical systems","authors":"Hamid Reza Chavoshi,&nbsp;Ali Khoshlahjeh Sedgh,&nbsp;Hamid Khaloozadeh","doi":"10.1049/cps2.70002","DOIUrl":"10.1049/cps2.70002","url":null,"abstract":"<p>Modern control systems integrate with information technologies through Networked Control Systems and Cyber-Physical Systems (CPS). Although these systems are beneficial, they raise security concerns for critical infrastructure. Cyberattacks on CPS communication channels, such as denial-of-service (DoS) attacks, can cause significant time delays and data loss, leading to poor system performance and instability. This article assumes weak DoS attack influences as an unknown delay. Then, system maximum resistance time against DoS attacks will be calculated according to the Lyapunov–Krasovskii theorem, and a conservative upper bound delay is included in the system model, which maintains system stability. With this assumption, Kharitonov's theorem-based robust Proportional-Integral (PI) controller is developed to mitigate DoS attacks. In addition, another Ziegler–Nichols tuned PI controller is presented to demonstrate that the proposed robust PI controller effectively reduces DoS attack impacts on CPSs. Finally, in a liquid-level networked control system, the efficacy of two PI controllers was evaluated. Results show that Kharitonov's theorem-based controller surpasses the Ziegler–Nichols method PI controller in mitigating the impact of DoS attacks on system behaviour, including maintaining system stability and keeping both transient response characteristics and setpoint tracking at desired values. Also, the proposed design strategy for reducing DoS attack effects is simple and less conservative than other robust control methods.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143761836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1