IEEE Transactions on Industrial Cyber-Physical Systems最新文献

筛选
英文 中文
Byzantine-Resilient Distributed Bandit Online Optimization in Dynamic Environments 动态环境中的拜占庭弹性分布式匪徒在线优化
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-06-06 DOI: 10.1109/TICPS.2024.3410846
Mengli Wei;Wenwu Yu;Hongzhe Liu;Duxin Chen
{"title":"Byzantine-Resilient Distributed Bandit Online Optimization in Dynamic Environments","authors":"Mengli Wei;Wenwu Yu;Hongzhe Liu;Duxin Chen","doi":"10.1109/TICPS.2024.3410846","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3410846","url":null,"abstract":"We consider the constrained multi-agent online optimization problem in dynamic environments that are vulnerable to Byzantine attacks, where some infiltrated agents may deviate from the prescribed update rule and send arbitrary messages. The objective functions are exposed in a bandit form, i.e., only the function value is revealed to each agent at the sampling instance, and held privately by each agent. The agents only exchange information with their neighbors to update decisions, and the collective goal is to minimize the sum of the unattacked agents' objective functions in dynamic environments, where the same function can only be sampled once. To handle this problem, a Byzantine-Resilient Distributed Bandit Online Convex Optimization (BR-DBOCO) algorithm that can tolerate up to \u0000<inline-formula><tex-math>$mathcal {B}$</tex-math></inline-formula>\u0000 Byzantine agents is developed. Specifically, the BR-DBOCO employs the one-point bandit feedback (OPBF) mechanism and state filter to cope with the objective function, which cannot be explicitly expressed in dynamic environments and the arbitrary deviation states caused by Byzantine attacks, respectively. We show that sublinear expected regret is achieved if the accumulative deviation of the comparator sequence also grows sublinearly with a proper exploration parameter. Finally, experimental results are presented to illustrate the effectiveness of the proposed algorithm.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"154-165"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Risk Management for Demand Response in Multi-Utility Smart Grids 多公用事业智能电网中需求响应的动态风险管理
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-04-24 DOI: 10.1109/TICPS.2024.3392872
Fisayo Sangoleye;Eirini Eleni Tsiropoulou;Symeon Papavassiliou
{"title":"Dynamic Risk Management for Demand Response in Multi-Utility Smart Grids","authors":"Fisayo Sangoleye;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/TICPS.2024.3392872","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3392872","url":null,"abstract":"This research work is motivated by the need for effective demand response management (DRM) in smart grid systems. DRM is critical in optimizing the energy load by adjusting the energy prices and shifting high electricity demand to off-peak periods. This paper introduces a novel DRM model in a multi-user multi-utility company environment, considering the risk and uncertainty stemming from potential excessive energy demands, where each utility company is treated as a Common Pool of Resources (CPR). The risk-aware behavior of the consumers is captured using the Prospect Theory principles. Specifically, to model the interactions, we formulate a multi-leader multi-follower Stackelberg game involving the utility companies as leaders and the consumers as followers. The goal is to determine the optimal energy prices for the utility companies and the optimal amount of energy that each consumer purchases from these companies, considering their distributed decision-making process and exploring the non-cooperative Game Theory. The proposed DRM framework is assessed through numerical results, demonstrating its operational and performance efficiency. The results highlight the key benefits and tradeoffs of our model in comparison to alternative DRM strategies, emphasizing the significance of the presented approach in managing demand response effectively.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"98-107"},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero-Shot Learning Approach for Task Allocation Optimization in Cyber-Physical Systems 网络物理系统任务分配优化的零点学习方法
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-04-22 DOI: 10.1109/TICPS.2024.3392151
Eliseu Pereira;João Reis;Rosaldo J. F. Rossetti;Gil Gonçalves
{"title":"A Zero-Shot Learning Approach for Task Allocation Optimization in Cyber-Physical Systems","authors":"Eliseu Pereira;João Reis;Rosaldo J. F. Rossetti;Gil Gonçalves","doi":"10.1109/TICPS.2024.3392151","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3392151","url":null,"abstract":"The design and reorganization of Cyber-Physical Systems (CPSs) faces challenges due to the growing number of interconnected devices. To effectively handle disruptions and improve performance, rapid CPS design and development is crucial. The Task Resources Estimator and Allocation Optimizer (TREAO) addresses these challenges, by simulating and optimizing the tasks assignment to the CPS machines, recommending suitable software layouts for the CPS characteristics. It employs Zero-Shot Learning (ZSL) to predict task requirements in heterogeneous devices, enabling the characterization of software pipeline execution in distributed systems. The Genetic Algorithm (GA) component then optimizes the task assignment across available machines. Through experiments, the tool is evaluated for task characterization, CPS modeling and optimization performance. TREAO, when compared with similar tools, allows the simulation of more resource usage metrics (CPU, RAM, processing time and network delay) and increases flexibility in heterogeneous CPSs by predicting the task execution behavior and optimizing the task assignment.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"90-97"},"PeriodicalIF":0.0,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140826070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordinating Systematic Grid-Forming Control of Hybrid Photovoltaic Plants in Weak Grids 弱电网中混合光伏发电站的系统并网协调控制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-04-02 DOI: 10.1109/TICPS.2024.3384332
Shiwen Yu;Lina He
{"title":"Coordinating Systematic Grid-Forming Control of Hybrid Photovoltaic Plants in Weak Grids","authors":"Shiwen Yu;Lina He","doi":"10.1109/TICPS.2024.3384332","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3384332","url":null,"abstract":"With the anticipated integration of numerous hybrid photovoltaic (PV) plants into subtransmission and distribution grids, managing a mix of inverter-based energy resources such as PV systems and battery energy storage systems (BESS) becomes crucial. These resources are required to effectively coordinate for primary frequency (f) and voltage (V) control and participate in power sharing, particularly in weaker grids. Currently, inverter-based energy resources are predominantly coordinated by droop-based control, which proves inadequate for hybrid PV plants in more resistive subtransmission and distribution grids due to the tightly coupled active power (P) and reactive power (Q). To overcome this challenge, this paper proposes an innovative coordinating systematic primary control strategy for grid-forming inverters in hybrid PV plants based on the multiple-input and multiple-output (MIMO) decoupling control. This method adaptively decouples the connected subtransmission or distribution grids during operation, with the aim of achieving effective, coordinated, and independent primary f and V regulation and accurate power sharing. For verification, comparative case studies are conducted in Simulink between the proposed control strategy and a conventional droop control scheme. The findings indicate that our proposed control method facilitates autonomous and independent primary f and V control, along with precise power sharing without relying on communication links. This results in markedly enhanced steady-state and dynamic performance. The decentralized primary controller offers simplicity, robustness, and cost-effectiveness, contributing to the stability and resilience of utility grids.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"81-89"},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems 基于工业控制系统决策融合的实时入侵检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-28 DOI: 10.1109/TICPS.2024.3406505
Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng
{"title":"Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems","authors":"Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng","doi":"10.1109/TICPS.2024.3406505","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3406505","url":null,"abstract":"Industrial control systems (ICSs) are becoming increasingly interconnected as the rapid convergence of information technology (IT) and operation technology (OT) networks, and meanwhile massive attack surfaces have been exposed. However, traditional intrusion detection systems (IDSs) are difficult to be directly deployed in ICSs due to the hard real-time requirement and rare patching chance. Besides, the design of effective and practical IDSs is hampered by the lack of benchmarking ICS cybersecurity datasets. To bridge the gaps, this paper makes the first attempt by open-sourcing the developed ICS cybersecurity datasets and proposing a decision fusion based real-time IDS. Firstly, we design a customized cybersecurity dataset in a full-hardware and high-fidelity platform, including 7 types of cyber threats tailored for ICSs. The collected dataset includes network traffic, sensor readings, actuator status, and system parameters, providing the state-of-the-art benchmark dataset for ICSs consisting of cross-layer characteristics. Furthermore, we design an online decision fusion-based IDS by strategically integrating 4 widely-used machine learning models. The proposed IDS is deployed on a real-time running ethanol distillation, surpassing the performance of single detection models in terms of precision and F1-score, which substantially enhances intrusion detection accuracy and cybersecurity of ICS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"143-153"},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games 通过分层博弈为集成电路制造系统中的协同制造提供稳健决策
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-25 DOI: 10.1109/TICPS.2024.3381083
Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü
{"title":"Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games","authors":"Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü","doi":"10.1109/TICPS.2024.3381083","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3381083","url":null,"abstract":"In this article, the robust decision-making problem is investigated for collaborative manufacturing in industrial cyber-physical systems (ICPSs) that involve multiple manufacturing line agents (MLAs) and multiple industrial terminal agents (ITAs). The disturbing factor is modeled as a rational player who aims to optimally deteriorate other players' performance, then the robust decision-making problem is addressed from a game-theoretic perspective by achieving a Nash-Stackelberg-Nash-Saddle (NSNS) equilibrium where all players' information is acquired through a dynamic feedback form. Furthermore, the existence of the NSNS equilibrium is analyzed, and the input-to-state stability of the closed-loop system is proven. Finally, simulations from a numerical example are presented to demonstrate the effectiveness of the proposed approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"71-80"},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions” 关于 "V2G-Auth:利用物理上不可克隆的功能实现 V2G 环境的轻量级认证和密钥协议"
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-18 DOI: 10.1109/TICPS.2024.3376304
Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen
{"title":"Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”","authors":"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen","doi":"10.1109/TICPS.2024.3376304","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3376304","url":null,"abstract":"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"69-70"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines 执行器滞后和通信延迟情况下的安全网络攻击和异常检测,应用于工业燃气轮机
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-15 DOI: 10.1109/TICPS.2024.3401615
Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani
{"title":"Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines","authors":"Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani","doi":"10.1109/TICPS.2024.3401615","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3401615","url":null,"abstract":"Cyber-Physical Systems (CPSs) utilize Networked Control Systems (NCS), where the supervised controller is connected to the network through communication links. It facilitates the network with online accessibility that reduces maintenance costs and enhances reliability. However, open access often raises the risk of cyber-attacks. Besides, a communication channel delay due to limited bandwidth is often possible, which may lead to instability problems. This paper introduces a new observer-based resilient control framework to deal with cyber-attacks and communication delays. As such, deception and Denial pf Service (DoS) actuator attacks are considered by defining appropriate unified functions. Following that, an augmented state-space model is proposed for the CPS with time delay in the communication links. Next, states are estimated by a sliding mode observer from the corrupted measurements. Then, a residual generation is appropriated to identify cyber-attacks in the augmented system and to assess the cyber-attack detection approach. The Lyapunov stability theory guarantees the convergence of the estimation. Experimental data on an industrial gas turbine is utilized to validate the system model. Test results indicate that the sliding mode observer enjoys a secure framework for network communications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"130-142"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Industrial Cyber-Physical Systems Publication Information 电气和电子工程师学会《工业网络-物理系统论文集》(IEEE Transactions on Industrial Cyber-Physical Systems)出版信息
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-08 DOI: 10.1109/TICPS.2023.3342665
{"title":"IEEE Transactions on Industrial Cyber-Physical Systems Publication Information","authors":"","doi":"10.1109/TICPS.2023.3342665","DOIUrl":"https://doi.org/10.1109/TICPS.2023.3342665","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10463156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140067539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks 学习虚假数据注入攻击下网络物理系统的安全控制设计
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-08 DOI: 10.1109/TICPS.2024.3373715
Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing
{"title":"Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks","authors":"Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing","doi":"10.1109/TICPS.2024.3373715","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3373715","url":null,"abstract":"In this study, we employ two data-driven approaches to address the secure control problem for cyber-physical systems when facing false data injection attacks. Firstly, guided by zero-sum game theory and the principle of optimality, we derive the optimal control gain, which hinges on the solution of a corresponding algebraic Riccati equation. Secondly, we present sufficient conditions to guarantee the existence of a solution to the algebraic Riccati equation, which constitutes the first major contributions of this paper. Subsequently, we introduce two data-driven Q-learning algorithms, facilitating model-free control design. The second algorithm represents the second major contribution of this paper, as it not only operates without the need for a system model but also eliminates the requirement for state vectors, making it quite practical. Lastly, the efficacy of the proposed control schemes is confirmed through a case study involving an F-16 aircraft.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"60-68"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140181562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信