592 research outputs found
Bibliographical review on cyber attacks from a control oriented perspective
This paper presents a bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs). This review tackles the topic from a control-oriented perspective, which is complementary to information or communication ones. After motivating the importance of developing new methods for attack detection and secure control, this review presents security objectives, attack modeling, and a characterization of considered attacks and threats presenting the detection mechanisms and remedial actions. In order to show the properties of each attack, as well as to provide some deeper insight into possible defense mechanisms, examples available in the literature are discussed. Finally, open research issues and paths are presented.Peer ReviewedPostprint (author's final draft
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
The rapid development of information and communications technology has
enabled the use of digital-controlled and software-driven distributed energy
resources (DERs) to improve the flexibility and efficiency of power supply, and
support grid operations. However, this evolution also exposes
geographically-dispersed DERs to cyber threats, including hardware and software
vulnerabilities, communication issues, and personnel errors, etc. Therefore,
enhancing the cyber-resiliency of DER-based smart grid - the ability to survive
successful cyber intrusions - is becoming increasingly vital and has garnered
significant attention from both industry and academia. In this survey, we aim
to provide a systematical and comprehensive review regarding the
cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an
integrated threat modeling method is tailored for the hierarchical DER-based
smart grid with special emphasis on vulnerability identification and impact
analysis. Then, the defense-in-depth strategies encompassing prevention,
detection, mitigation, and recovery are comprehensively surveyed,
systematically classified, and rigorously compared. A CRE framework is
subsequently proposed to incorporate the five key resiliency enablers. Finally,
challenges and future directions are discussed in details. The overall aim of
this survey is to demonstrate the development trend of CRE methods and motivate
further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication
Consideratio
Security Allocation in Networked Control Systems under Stealthy Attacks
This paper considers the problem of security allocation in a networked
control system under stealthy attacks in which the system is comprised of
interconnected subsystems represented by vertices. A malicious adversary
selects a single vertex on which to conduct a stealthy data injection attack to
maximally disrupt the local performance while remaining undetected. On the
other hand, a defender selects several vertices on which to allocate defense
resources against the adversary. First, the objectives of the adversary and the
defender with uncertain targets are formulated in probabilistic ways, resulting
in an expected worst-case impact of stealthy attacks. Next, we provide a
graph-theoretic necessary and sufficient condition under which the cost for the
defender and the expected worst-case impact of stealthy attacks are bounded.
This condition enables the defender to restrict the admissible actions to a
subset of available vertex sets. Then, we cast the problem of security
allocation in a Stackelberg game-theoretic framework. Finally, the contribution
of this paper is highlighted by utilizing the proposed admissible actions of
the defender in the context of large-scale networks. A numerical example of a
50-vertex networked control system is presented to validate the obtained
results.Comment: 11 pages, 3 figures, and 1 table, journal submissio
- …