{"title":"Byzantine-Resilient Distributed Bandit Online Optimization in Dynamic Environments","authors":"Mengli Wei;Wenwu Yu;Hongzhe Liu;Duxin Chen","doi":"10.1109/TICPS.2024.3410846","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3410846","url":null,"abstract":"We consider the constrained multi-agent online optimization problem in dynamic environments that are vulnerable to Byzantine attacks, where some infiltrated agents may deviate from the prescribed update rule and send arbitrary messages. The objective functions are exposed in a bandit form, i.e., only the function value is revealed to each agent at the sampling instance, and held privately by each agent. The agents only exchange information with their neighbors to update decisions, and the collective goal is to minimize the sum of the unattacked agents' objective functions in dynamic environments, where the same function can only be sampled once. To handle this problem, a Byzantine-Resilient Distributed Bandit Online Convex Optimization (BR-DBOCO) algorithm that can tolerate up to \u0000<inline-formula><tex-math>$mathcal {B}$</tex-math></inline-formula>\u0000 Byzantine agents is developed. Specifically, the BR-DBOCO employs the one-point bandit feedback (OPBF) mechanism and state filter to cope with the objective function, which cannot be explicitly expressed in dynamic environments and the arbitrary deviation states caused by Byzantine attacks, respectively. We show that sublinear expected regret is achieved if the accumulative deviation of the comparator sequence also grows sublinearly with a proper exploration parameter. Finally, experimental results are presented to illustrate the effectiveness of the proposed algorithm.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"154-165"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Risk Management for Demand Response in Multi-Utility Smart Grids","authors":"Fisayo Sangoleye;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/TICPS.2024.3392872","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3392872","url":null,"abstract":"This research work is motivated by the need for effective demand response management (DRM) in smart grid systems. DRM is critical in optimizing the energy load by adjusting the energy prices and shifting high electricity demand to off-peak periods. This paper introduces a novel DRM model in a multi-user multi-utility company environment, considering the risk and uncertainty stemming from potential excessive energy demands, where each utility company is treated as a Common Pool of Resources (CPR). The risk-aware behavior of the consumers is captured using the Prospect Theory principles. Specifically, to model the interactions, we formulate a multi-leader multi-follower Stackelberg game involving the utility companies as leaders and the consumers as followers. The goal is to determine the optimal energy prices for the utility companies and the optimal amount of energy that each consumer purchases from these companies, considering their distributed decision-making process and exploring the non-cooperative Game Theory. The proposed DRM framework is assessed through numerical results, demonstrating its operational and performance efficiency. The results highlight the key benefits and tradeoffs of our model in comparison to alternative DRM strategies, emphasizing the significance of the presented approach in managing demand response effectively.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"98-107"},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eliseu Pereira;João Reis;Rosaldo J. F. Rossetti;Gil Gonçalves
{"title":"A Zero-Shot Learning Approach for Task Allocation Optimization in Cyber-Physical Systems","authors":"Eliseu Pereira;João Reis;Rosaldo J. F. Rossetti;Gil Gonçalves","doi":"10.1109/TICPS.2024.3392151","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3392151","url":null,"abstract":"The design and reorganization of Cyber-Physical Systems (CPSs) faces challenges due to the growing number of interconnected devices. To effectively handle disruptions and improve performance, rapid CPS design and development is crucial. The Task Resources Estimator and Allocation Optimizer (TREAO) addresses these challenges, by simulating and optimizing the tasks assignment to the CPS machines, recommending suitable software layouts for the CPS characteristics. It employs Zero-Shot Learning (ZSL) to predict task requirements in heterogeneous devices, enabling the characterization of software pipeline execution in distributed systems. The Genetic Algorithm (GA) component then optimizes the task assignment across available machines. Through experiments, the tool is evaluated for task characterization, CPS modeling and optimization performance. TREAO, when compared with similar tools, allows the simulation of more resource usage metrics (CPU, RAM, processing time and network delay) and increases flexibility in heterogeneous CPSs by predicting the task execution behavior and optimizing the task assignment.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"90-97"},"PeriodicalIF":0.0,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140826070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinating Systematic Grid-Forming Control of Hybrid Photovoltaic Plants in Weak Grids","authors":"Shiwen Yu;Lina He","doi":"10.1109/TICPS.2024.3384332","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3384332","url":null,"abstract":"With the anticipated integration of numerous hybrid photovoltaic (PV) plants into subtransmission and distribution grids, managing a mix of inverter-based energy resources such as PV systems and battery energy storage systems (BESS) becomes crucial. These resources are required to effectively coordinate for primary frequency (f) and voltage (V) control and participate in power sharing, particularly in weaker grids. Currently, inverter-based energy resources are predominantly coordinated by droop-based control, which proves inadequate for hybrid PV plants in more resistive subtransmission and distribution grids due to the tightly coupled active power (P) and reactive power (Q). To overcome this challenge, this paper proposes an innovative coordinating systematic primary control strategy for grid-forming inverters in hybrid PV plants based on the multiple-input and multiple-output (MIMO) decoupling control. This method adaptively decouples the connected subtransmission or distribution grids during operation, with the aim of achieving effective, coordinated, and independent primary f and V regulation and accurate power sharing. For verification, comparative case studies are conducted in Simulink between the proposed control strategy and a conventional droop control scheme. The findings indicate that our proposed control method facilitates autonomous and independent primary f and V control, along with precise power sharing without relying on communication links. This results in markedly enhanced steady-state and dynamic performance. The decentralized primary controller offers simplicity, robustness, and cost-effectiveness, contributing to the stability and resilience of utility grids.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"81-89"},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140820362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng
{"title":"Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems","authors":"Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng","doi":"10.1109/TICPS.2024.3406505","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3406505","url":null,"abstract":"Industrial control systems (ICSs) are becoming increasingly interconnected as the rapid convergence of information technology (IT) and operation technology (OT) networks, and meanwhile massive attack surfaces have been exposed. However, traditional intrusion detection systems (IDSs) are difficult to be directly deployed in ICSs due to the hard real-time requirement and rare patching chance. Besides, the design of effective and practical IDSs is hampered by the lack of benchmarking ICS cybersecurity datasets. To bridge the gaps, this paper makes the first attempt by open-sourcing the developed ICS cybersecurity datasets and proposing a decision fusion based real-time IDS. Firstly, we design a customized cybersecurity dataset in a full-hardware and high-fidelity platform, including 7 types of cyber threats tailored for ICSs. The collected dataset includes network traffic, sensor readings, actuator status, and system parameters, providing the state-of-the-art benchmark dataset for ICSs consisting of cross-layer characteristics. Furthermore, we design an online decision fusion-based IDS by strategically integrating 4 widely-used machine learning models. The proposed IDS is deployed on a real-time running ethanol distillation, surpassing the performance of single detection models in terms of precision and F1-score, which substantially enhances intrusion detection accuracy and cybersecurity of ICS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"143-153"},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games","authors":"Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü","doi":"10.1109/TICPS.2024.3381083","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3381083","url":null,"abstract":"In this article, the robust decision-making problem is investigated for collaborative manufacturing in industrial cyber-physical systems (ICPSs) that involve multiple manufacturing line agents (MLAs) and multiple industrial terminal agents (ITAs). The disturbing factor is modeled as a rational player who aims to optimally deteriorate other players' performance, then the robust decision-making problem is addressed from a game-theoretic perspective by achieving a Nash-Stackelberg-Nash-Saddle (NSNS) equilibrium where all players' information is acquired through a dynamic feedback form. Furthermore, the existence of the NSNS equilibrium is analyzed, and the input-to-state stability of the closed-loop system is proven. Finally, simulations from a numerical example are presented to demonstrate the effectiveness of the proposed approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"71-80"},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”","authors":"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen","doi":"10.1109/TICPS.2024.3376304","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3376304","url":null,"abstract":"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"69-70"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines","authors":"Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani","doi":"10.1109/TICPS.2024.3401615","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3401615","url":null,"abstract":"Cyber-Physical Systems (CPSs) utilize Networked Control Systems (NCS), where the supervised controller is connected to the network through communication links. It facilitates the network with online accessibility that reduces maintenance costs and enhances reliability. However, open access often raises the risk of cyber-attacks. Besides, a communication channel delay due to limited bandwidth is often possible, which may lead to instability problems. This paper introduces a new observer-based resilient control framework to deal with cyber-attacks and communication delays. As such, deception and Denial pf Service (DoS) actuator attacks are considered by defining appropriate unified functions. Following that, an augmented state-space model is proposed for the CPS with time delay in the communication links. Next, states are estimated by a sliding mode observer from the corrupted measurements. Then, a residual generation is appropriated to identify cyber-attacks in the augmented system and to assess the cyber-attack detection approach. The Lyapunov stability theory guarantees the convergence of the estimation. Experimental data on an industrial gas turbine is utilized to validate the system model. Test results indicate that the sliding mode observer enjoys a secure framework for network communications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"130-142"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Industrial Cyber-Physical Systems Publication Information","authors":"","doi":"10.1109/TICPS.2023.3342665","DOIUrl":"https://doi.org/10.1109/TICPS.2023.3342665","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10463156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140067539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks","authors":"Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing","doi":"10.1109/TICPS.2024.3373715","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3373715","url":null,"abstract":"In this study, we employ two data-driven approaches to address the secure control problem for cyber-physical systems when facing false data injection attacks. Firstly, guided by zero-sum game theory and the principle of optimality, we derive the optimal control gain, which hinges on the solution of a corresponding algebraic Riccati equation. Secondly, we present sufficient conditions to guarantee the existence of a solution to the algebraic Riccati equation, which constitutes the first major contributions of this paper. Subsequently, we introduce two data-driven Q-learning algorithms, facilitating model-free control design. The second algorithm represents the second major contribution of this paper, as it not only operates without the need for a system model but also eliminates the requirement for state vectors, making it quite practical. Lastly, the efficacy of the proposed control schemes is confirmed through a case study involving an F-16 aircraft.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"60-68"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140181562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}