A survey of physics-based attack detection in cyber-physical systems

J Giraldo, D Urbina, A Cardenas, J Valente… - ACM Computing …, 2018 - dl.acm.org
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …

Limiting the impact of stealthy attacks on industrial control systems

DI Urbina, JA Giraldo, AA Cardenas… - Proceedings of the …, 2016 - dl.acm.org
While attacks on information systems have for most practical purposes binary outcomes
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …

State of the art of cyber-physical systems security: An automatic control perspective

YZ Lun, A D'Innocenzo, F Smarra, I Malavolta… - Journal of Systems and …, 2019 - Elsevier
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

Coding schemes for securing cyber-physical systems against stealthy data injection attacks

F Miao, Q Zhu, M Pajic… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
This paper considers a method of coding the sensor outputs in order to detect stealthy false
data injection attacks. An intelligent attacker can design a sequence of data injection to …

Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions

J Ye, L Guo, B Yang, F Li, L Du… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
Power electronics systems have become increasingly vulnerable to cyber-physical threats
due to their growing penetration in the Internet-of-Things (IoT)-enabled applications …

A moving target defense for securing cyber-physical systems

P Griffioen, S Weerakkody… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article considers the design and analysis of multiple moving target defenses for
recognizing and isolating attacks on cyber-physical systems. We consider attackers who …

Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective

A Sanjab, W Saad - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
Data injection attacks have emerged as a significant threat on the smart power grid. By
launching data injection attacks, an adversary can manipulate the real-time locational …

Cyberphysical security of grid battery energy storage systems

RD Trevizan, J Obert, V De Angelis, TA Nguyen… - IEEE …, 2022 - ieeexplore.ieee.org
This paper presents a literature review on current practices and trends on cyberphysical
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical …

Security metrics and synthesis of secure control systems

C Murguia, I Shames, J Ruths, D Nešić - Automatica, 2020 - Elsevier
The term stealthy has come to encompass a variety of techniques that attackers can employ
to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant …

Cusum and chi-squared attack detection of compromised sensors

C Murguia, J Ruths - 2016 IEEE Conference on Control …, 2016 - ieeexplore.ieee.org
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for
identifying falsified sensor measurements. To fulfill a desired detection performance, given …