{"title":"Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems","authors":"Yifa Liu;Long Cheng;Dan Ye","doi":"10.1109/TICPS.2024.3446469","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3446469","url":null,"abstract":"This article proposes an alternating false data injection attack strategy, which can bypass the summation detector in cyber-physical systems. This attack strategy offsets the impact on historical residuals by constantly changing the attack direction, and therefore invalidates the summation detector integrating historical information to detect the well-designed stealthy attacks. In the simulation, the proposed attack strategy reduces the increment of cumulative summation of residuals by 70% compared to the classical stealthy attack strategy, and bypasses both the \u0000<inline-formula><tex-math>$chi ^{2}$</tex-math></inline-formula>\u0000 detector and the summation detector. Furthermore, from a more general perspective, by proposing an almost completely stealthy attack strategy to make the residual information almost unchanged, this article proves that residual based detection methods regardless of single-step residual based ones nor historical residual based ones cannot fully detect false data injection attacks.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"391-403"},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Switching-Type Adaptive Event-Triggered-Based Non-Recursive Control for Interconnected Cyber-Physical Systems Against Multiple Cyber Attacks","authors":"Haibin Sun;Yahui Cui;Linlin Hou;Ticao Jiao","doi":"10.1109/TICPS.2024.3446769","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3446769","url":null,"abstract":"This study addresses a decentralized switching-type adaptive event-triggered-based non-recursive security controller design for interconnected cyber-physical systems under multiple cyber attacks. First, an acknowledgment character technique is introduced in the measurement channel to detect whether DoS attacks occur. In the control channel, system signals are subject to hybrid cyber attacks, which consist of DoS and deception attacks obeying independent Bernoulli distributions. Second, a switching-type adaptive event-triggered mechanism is constructed in the sensor-to-controller channel to improve bandwidth resource utilization and compensate for the impact of DoS attacks. A decentralized linear observer is built to estimate the unmeasured states, and an output feedback controller is developed using a non-recursive method, which ensures that all signals in the closed-loop system are uniformly ultimately bounded. Finally, an inverted pendulum system is provided to illustrate the effectiveness of the proposed scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"350-361"},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance/Reliability Tradeoffs When Watermarking Cyber-Physical Systems","authors":"C.M. Krishna","doi":"10.1109/TICPS.2024.3443772","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3443772","url":null,"abstract":"Watermarking is an important security technique in cyber-physical systems. It is a process by which the user injects unexpected actuator inputs and then checks if the reported sensor inputs respond as they should to such inputs. Such an approach can detect the falsification, by an attacker, of sensor reports. Significant control-theoretic research has been reported on watermark performance and strategy. Missing in all this work, however, has been the impact of watermarking on the cyber platform of the CPS. This is the focus of the present paper. Watermarking creates pressure to reduce the control update period, which increases thermal stress on the cyber platform. This can dramatically increase the processor aging rate and significantly reduce mean processor lifetimes. The problem is especially acute when the controlled plant is close to the edge of its Safe State Space. One approach to mitigating cyber platform stress is to proactively skip control update calculations. At the price of some degradation in the plant Quality of Control, such proactive skips can meaningfully improve thermal stress and reduce processor aging.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"606-614"},"PeriodicalIF":0.0,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142579227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly Detection Using Bi-Directional Long Short-Term Memory Networks for Cyber-Physical Electric Vehicle Charging Stations","authors":"Arif Hussain;Ankit Yadav;Gelli Ravikumar","doi":"10.1109/TICPS.2024.3437349","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3437349","url":null,"abstract":"With the increasing integration of electric vehicles (EVs) into the distributed energy resources (DER) system, the security of EV charging stations (EVCS) from cyber-attacks is paramount. Utilizing deep learning and recurrent neural networks (RNNs) presents promising advantages in anomaly detection within power systems. Bi-directional long-short-term memory (Bi-LSTM) emerges as a viable choice for anomaly detection, offering distinct advantages that learn from both the forward and backward sequences of the data compared to conventional deep neural networks, RNNs, and basic LSTMs. This study proposes data-driven anomaly detection (DDAD) techniques using a Bi-LSTM network. Seven statistical features are extracted from the passive parameters (voltage, current, frequency, and SoC). Then, the wrapper feature selection method is used to identify the most relevant features, enhancing the accuracy of the proposed DDAD model. We generate a dataset of normal events such as line faults, load switching, capacitor switching, and cyberattack events, including denial-of-service (DoS), spoofing, replay, and data manipulation attacks, using an extended API integrated with RT-LAB to automate the process. We demonstrated the DDAD model on a DER-integrated EVCS microgrid model on a Hardware-in-Loop (HIL)-based intelligent Cyber Physical System (iCPS) testbed environment. Comprehensive experiments are conducted to evaluate the performance of our proposed DDAD model's accuracy, precision, recall, and F1 score with the testing dataset. We compared our results against LSTM, multi-layer perception (MLP), support vector machine (SVM), and linear regression (LR) techniques. This study emphasizes the development of an efficient approach for detecting anomalies on EVCS, and our results underscore the effectiveness of our proposed methodology, achieving an average testing accuracy of 99.42%, thereby reinforcing the cyber-physical security of EVCS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"508-518"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GraphCCI: Critical Components Identification for Enhancing Security of Cyber-Physical Power Systems","authors":"Yigu Liu;Alexandru Ştefanov;Ioannis Semertzis;Peter Palensky","doi":"10.1109/TICPS.2024.3436647","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3436647","url":null,"abstract":"Cyber security risks are emerging in Cyber-Physical power Systems (CPS) due to the increasing integration of cyber and physical infrastructures. Critical component identification is a crucial task for the mitigation and prevention of catastrophic blackouts. In this paper, we propose a novel method using graph data mining for critical CPS components identification named GraphCCI. First, it defines two categories of component correlations to reveal the cascading features of CPS. GraphCCI maps cascading failure datasets under time-varying operational states into weighted cascading graphs and constructs a graph database for graph data mining. By adopting graph data mining techniques, frequent subgraphs are identified to construct the Cascading Characteristics Graph (CC-Graph). Finally, the Node Criticality Index (NC-Index) is proposed to quantify the criticality of each CPS component. The experimental results on the IEEE 39-bus system verify the effectiveness of the proposed method and present an in-depth analysis of the CPS cascading features.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"340-349"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Lagrangian Network Learning and Control of Robotic Exoskeleton Based on Multi-Sensor-Cyber Information Fusion","authors":"Qing Guo;Haoran Zhan;Jiyu Zhang","doi":"10.1109/TICPS.2024.3437347","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3437347","url":null,"abstract":"The overall performance improvement of model-based controller depends on the accurate plant model. However, many complicated plants exist unmodeled uncertainties caused by irregular structure, motion frictions, and external disturbances, which are difficult to obtain the mathematical model with high accuracy. In this work, a multi-sensor-cyber is constructed to sample the physics information about human-exoskeleton interaction and exoskeleton joint motion. Meanwhile, a model identification method based on Deep Lagrangian Network (DeLaN) is presented in robotic exoskeleton to realize multi-sensor information fusion and obtain the reasonable parameters of Lagrangian model. Then a human-exoskeleton cooperative motion control based on nonlinear extended state observer is proposed to guarantee that the exoskeleton tracks two joint demands in the case of tolerable human-exoskeleton interaction. Finally, the effectiveness of the proposed model identification and control scheme is verified by the experimental results in two-DOF exoskeleton platform.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"331-339"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141965371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaishun Xiahou;Xingye Xu;Deyang Huang;Wei Du;Mengshi Li
{"title":"Sliding-Mode Perturbation Observer-Based Delay-Independent Active Mitigation for AGC Systems Against False Data Injection and Random Time-Delay Attacks","authors":"Kaishun Xiahou;Xingye Xu;Deyang Huang;Wei Du;Mengshi Li","doi":"10.1109/TICPS.2024.3436188","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3436188","url":null,"abstract":"This article presents a sliding-mode perturbation observer (SMPO) based delay-independent active mitigation (DIAM) scheme for automatic generation control (AGC) systems of multi-area interconnected power grid. It is designed to defend against malicious cyber attacks such as false data injection attack (FDIA), random time-delay attack (RTDA), and coordinated cyber attack (CCA) in the measurement channel and control channel. In the DIAM scheme, perturbation terms are introduced to describe the comprehensive effects of injected false signals and random delay components caused by cyber attacks. SMPO is designed for each control area of AGC systems to reconstruct the perturbations in the measurement channel and control channel based on the equivalent output injection method. The cyber attacks are mitigated by compensating the perturbation terms based on the accurate perturbation estimations provided by SMPO. The proposed DIAM is a delay-independent scheme which does not require any time-delay knowledge, and it is able to deal with the coordinated attacks of FDIA and RTDA at the same time. Simulation studies and experimental tests are undertaken on a three-area AGC systems to demonstrate the performance of the proposed DIAM scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"446-458"},"PeriodicalIF":0.0,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danyal Namakshenas;Abbas Yazdinejad;Ali Dehghantanha;Reza M. Parizi;Gautam Srivastava
{"title":"IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems","authors":"Danyal Namakshenas;Abbas Yazdinejad;Ali Dehghantanha;Reza M. Parizi;Gautam Srivastava","doi":"10.1109/TICPS.2024.3435178","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3435178","url":null,"abstract":"The expansion of Industrial Cyber-Physical Systems (ICPS) has introduced new challenges in security and privacy, highlighting a research gap in effective anomaly detection while preserving data confidentiality. In the ICPS landscape, where vast amounts of sensitive industrial data are exchanged, ensuring privacy is not just a regulatory compliance issue but a critical shield against industrial espionage and cyber threats. Existing solutions often compromise data privacy for enhanced security, leaving a significant void in protecting sensitive information within ICPS networks. Addressing this, our research presents the \u0000<italic>IP2FL</i>\u0000 model, an Interpretation-based Privacy-Preserving Federated Learning approach tailored for ICPS. This model combines Additive Homomorphic Encryption (AHE) for privacy with advanced feature selection methods and Shapley Values (SV) for enhanced explainability. The proposed solution mitigates privacy concerns in federated learning, where traditional methods fall short due to computational constraints and lack of interpretability. By integrating AHE, the \u0000<italic>IP2FL</i>\u0000 model minimizes computational overhead and ensures data privacy. Our dual feature selection approach optimizes system performance while incorporating SV to provide critical insights into model decisions, advancing the field towards more transparent and understandable AI systems in ICPS. The validation of our model using ICPS-specific datasets demonstrates its effectiveness and potential for practical applications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"321-330"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141965064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Distributed Fusion Estimation Under Double Layer Defense Architecture","authors":"Pindi Weng;Tongxiang Li;Mingnan Hu;Jing Zhou;Bo Chen","doi":"10.1109/TICPS.2024.3435648","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3435648","url":null,"abstract":"This paper is concerned with the problem of secure fusion estimation for cyber-physical systems under false data injection (FDI) attacks and eavesdropping attacks. In this work, the active and passive defense mechanisms are respectively designed to preserve the privacy of local estimation information from eavesdroppers and to obtain satisfactory fusion estimation performance against FDI attacks. Specificly, encryption and decryption schemes are designed for the transmitted local estimates, which prevents the eavesdropper from obtaining the correct estimates while the monitoring center is not affected. Then, a secure fusion method is proposed consisting of encryption-based attack detection and prediction based compensation fusion, which can effectively reduce the impact of FDI attack signals. Finally, an illustrative example is employed to show the effectiveness and advantages of the proposed methods.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"362-369"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Minority Cluster-Informed Semi-Supervised Random Vector Functional Link Network for Multi-Mode Intermittent Fault Diagnosis","authors":"Wei Li;Pengyu Han;Zeyi Liu;Xiao He;Limin Wang;Tao Zhang","doi":"10.1109/TICPS.2024.3434788","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3434788","url":null,"abstract":"Industrial intermittent fault diagnosis is crucial for maintaining efficient and safe production processes. However, existing methodologies often fail to account for practical sample imbalance constraints encountered in multi-mode scenarios. In this paper, an online minority cluster-informed semi-supervised random vector functional link network, termed OMIS-RVFL, is proposed to tackle these challenges. It incorporates a minority-cluster informed strategy, employing dimensionality reduction and minority prioritization to enhance linear separability of samples in transitional conditions and improve identification of minority instances. Multiple experiments are conducted using the multi-mode Tennessee Eastman process datasets. Experimental results verified that the effectiveness of the proposed OMIS-RVFL.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"404-411"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142143601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}