A survey of physics-based attack detection in cyber-physical systems
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …
research. In its basic form, a security monitor creates time-series models of sensor readings …
Limiting the impact of stealthy attacks on industrial control systems
While attacks on information systems have for most practical purposes binary outcomes
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Coding schemes for securing cyber-physical systems against stealthy data injection attacks
This paper considers a method of coding the sensor outputs in order to detect stealthy false
data injection attacks. An intelligent attacker can design a sequence of data injection to …
data injection attacks. An intelligent attacker can design a sequence of data injection to …
Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions
Power electronics systems have become increasingly vulnerable to cyber-physical threats
due to their growing penetration in the Internet-of-Things (IoT)-enabled applications …
due to their growing penetration in the Internet-of-Things (IoT)-enabled applications …
A moving target defense for securing cyber-physical systems
This article considers the design and analysis of multiple moving target defenses for
recognizing and isolating attacks on cyber-physical systems. We consider attackers who …
recognizing and isolating attacks on cyber-physical systems. We consider attackers who …
Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective
Data injection attacks have emerged as a significant threat on the smart power grid. By
launching data injection attacks, an adversary can manipulate the real-time locational …
launching data injection attacks, an adversary can manipulate the real-time locational …
Cyberphysical security of grid battery energy storage systems
This paper presents a literature review on current practices and trends on cyberphysical
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical …
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical …
Security metrics and synthesis of secure control systems
The term stealthy has come to encompass a variety of techniques that attackers can employ
to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant …
to avoid being detected. In this manuscript, for a class of perturbed linear time-invariant …
Cusum and chi-squared attack detection of compromised sensors
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for
identifying falsified sensor measurements. To fulfill a desired detection performance, given …
identifying falsified sensor measurements. To fulfill a desired detection performance, given …