338 research outputs found

    State of the art of cyber-physical systems security: An automatic control perspective

    Get PDF
    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia

    Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility

    Get PDF
    Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and detecting cyber jamming and spoofing attacks. Then, the developed framework analyzes the conditional dependencies based on the Pearson’s correlation coefficient among the control messages for finding the cause of potential attacks based on the outcome of the AI algorithm. This work considers the UAM attitude control scenario for determining jam and spoofing attacks as a use case to validate the proposed framework with a state-of-the-art UAV attack dataset. The experiment results show the efficacy of the proposed framework in terms of around 99.9% role= presentation style= box-sizing: border-box; max-height: none; display: inline; line-height: normal; font-size: 13.2px; overflow-wrap: normal; white-space: nowrap; float: none; direction: ltr; max-width: none; min-width: 0px; min-height: 0px; border: 0px; padding: 0px; margin: 0px; color: rgb(34, 34, 34); font-family: Arial, Arial, Helvetica, sans-serif; position: relative; \u3e99.9% accuracy for jamming and spoofing detection with a decision tree, random forests, and KNN while efficiently finding the root cause of the attack
    • …
    corecore