IEEE Transactions on Industrial Cyber-Physical Systems最新文献

筛选
英文 中文
Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems 基于工业控制系统决策融合的实时入侵检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-28 DOI: 10.1109/TICPS.2024.3406505
Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng
{"title":"Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems","authors":"Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng","doi":"10.1109/TICPS.2024.3406505","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3406505","url":null,"abstract":"Industrial control systems (ICSs) are becoming increasingly interconnected as the rapid convergence of information technology (IT) and operation technology (OT) networks, and meanwhile massive attack surfaces have been exposed. However, traditional intrusion detection systems (IDSs) are difficult to be directly deployed in ICSs due to the hard real-time requirement and rare patching chance. Besides, the design of effective and practical IDSs is hampered by the lack of benchmarking ICS cybersecurity datasets. To bridge the gaps, this paper makes the first attempt by open-sourcing the developed ICS cybersecurity datasets and proposing a decision fusion based real-time IDS. Firstly, we design a customized cybersecurity dataset in a full-hardware and high-fidelity platform, including 7 types of cyber threats tailored for ICSs. The collected dataset includes network traffic, sensor readings, actuator status, and system parameters, providing the state-of-the-art benchmark dataset for ICSs consisting of cross-layer characteristics. Furthermore, we design an online decision fusion-based IDS by strategically integrating 4 widely-used machine learning models. The proposed IDS is deployed on a real-time running ethanol distillation, surpassing the performance of single detection models in terms of precision and F1-score, which substantially enhances intrusion detection accuracy and cybersecurity of ICS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"143-153"},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games 通过分层博弈为集成电路制造系统中的协同制造提供稳健决策
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-25 DOI: 10.1109/TICPS.2024.3381083
Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü
{"title":"Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games","authors":"Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü","doi":"10.1109/TICPS.2024.3381083","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3381083","url":null,"abstract":"In this article, the robust decision-making problem is investigated for collaborative manufacturing in industrial cyber-physical systems (ICPSs) that involve multiple manufacturing line agents (MLAs) and multiple industrial terminal agents (ITAs). The disturbing factor is modeled as a rational player who aims to optimally deteriorate other players' performance, then the robust decision-making problem is addressed from a game-theoretic perspective by achieving a Nash-Stackelberg-Nash-Saddle (NSNS) equilibrium where all players' information is acquired through a dynamic feedback form. Furthermore, the existence of the NSNS equilibrium is analyzed, and the input-to-state stability of the closed-loop system is proven. Finally, simulations from a numerical example are presented to demonstrate the effectiveness of the proposed approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"71-80"},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions” 关于 "V2G-Auth:利用物理上不可克隆的功能实现 V2G 环境的轻量级认证和密钥协议"
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-18 DOI: 10.1109/TICPS.2024.3376304
Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen
{"title":"Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”","authors":"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen","doi":"10.1109/TICPS.2024.3376304","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3376304","url":null,"abstract":"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"69-70"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines 执行器滞后和通信延迟情况下的安全网络攻击和异常检测,应用于工业燃气轮机
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-15 DOI: 10.1109/TICPS.2024.3401615
Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani
{"title":"Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines","authors":"Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani","doi":"10.1109/TICPS.2024.3401615","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3401615","url":null,"abstract":"Cyber-Physical Systems (CPSs) utilize Networked Control Systems (NCS), where the supervised controller is connected to the network through communication links. It facilitates the network with online accessibility that reduces maintenance costs and enhances reliability. However, open access often raises the risk of cyber-attacks. Besides, a communication channel delay due to limited bandwidth is often possible, which may lead to instability problems. This paper introduces a new observer-based resilient control framework to deal with cyber-attacks and communication delays. As such, deception and Denial pf Service (DoS) actuator attacks are considered by defining appropriate unified functions. Following that, an augmented state-space model is proposed for the CPS with time delay in the communication links. Next, states are estimated by a sliding mode observer from the corrupted measurements. Then, a residual generation is appropriated to identify cyber-attacks in the augmented system and to assess the cyber-attack detection approach. The Lyapunov stability theory guarantees the convergence of the estimation. Experimental data on an industrial gas turbine is utilized to validate the system model. Test results indicate that the sliding mode observer enjoys a secure framework for network communications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"130-142"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Industrial Cyber-Physical Systems Publication Information 电气和电子工程师学会《工业网络-物理系统论文集》(IEEE Transactions on Industrial Cyber-Physical Systems)出版信息
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-08 DOI: 10.1109/TICPS.2023.3342665
{"title":"IEEE Transactions on Industrial Cyber-Physical Systems Publication Information","authors":"","doi":"10.1109/TICPS.2023.3342665","DOIUrl":"https://doi.org/10.1109/TICPS.2023.3342665","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10463156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140067539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks 学习虚假数据注入攻击下网络物理系统的安全控制设计
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-08 DOI: 10.1109/TICPS.2024.3373715
Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing
{"title":"Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks","authors":"Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing","doi":"10.1109/TICPS.2024.3373715","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3373715","url":null,"abstract":"In this study, we employ two data-driven approaches to address the secure control problem for cyber-physical systems when facing false data injection attacks. Firstly, guided by zero-sum game theory and the principle of optimality, we derive the optimal control gain, which hinges on the solution of a corresponding algebraic Riccati equation. Secondly, we present sufficient conditions to guarantee the existence of a solution to the algebraic Riccati equation, which constitutes the first major contributions of this paper. Subsequently, we introduce two data-driven Q-learning algorithms, facilitating model-free control design. The second algorithm represents the second major contribution of this paper, as it not only operates without the need for a system model but also eliminates the requirement for state vectors, making it quite practical. Lastly, the efficacy of the proposed control schemes is confirmed through a case study involving an F-16 aircraft.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"60-68"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140181562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stochastic Bayesian Game for Securing Secondary Frequency Control of Microgrids Against Spoofing Attacks With Incomplete Information 针对不完全信息欺骗攻击的微电网二次频率控制安全随机贝叶斯博弈
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-07 DOI: 10.1109/TICPS.2024.3396106
Yang Li;Shichao Liu;Li Zhu
{"title":"A Stochastic Bayesian Game for Securing Secondary Frequency Control of Microgrids Against Spoofing Attacks With Incomplete Information","authors":"Yang Li;Shichao Liu;Li Zhu","doi":"10.1109/TICPS.2024.3396106","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3396106","url":null,"abstract":"While wireless communication has been implemented for the data exchange in the secondary frequency control of microgrids, the wireless links also open doors to spoofing attacks. Most existing game-theoretic approaches on securing control systems of microgrids against wireless spoofing attacks assume complete information. However, the defense scheme under perfect information assumption could lead to severe resource waste and significant detection delay due to the high over-defense rate. In this paper, we design a defense policy generation method for securing microgrids secondary frequency control facing spoofing attacks and incomplete observation. We formulate a multi-stage two-player stochastic Bayesian game (SBG) when the identity of the defender's opponent is uncertain. Furthermore, we propose a posterior identity belief update method, where Bayesian Nash equilibrium (NE) is considered to derive the boundary identity belief. Under the proposed SBG framework, an identity-dependent optimal defense scheme is obtained to simultaneously secure microgrids against potential spoofing attacks and reduce the over-defense rate. Comparison studies show that the proposed SBG-based defense policy can improve defense performance and significantly reduce over-defense rates.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"118-129"},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduced-Order Observer-Based Resilient Control for MASs With Time-Varying Delay Against DoS Attacks 基于降序观测器的时变延迟 MAS 弹性控制,对抗 DoS 攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-05 DOI: 10.1109/TICPS.2024.3372908
Xiaojie Qiu;Wenchao Meng;Jinming Xu;Qinmin Yang
{"title":"Reduced-Order Observer-Based Resilient Control for MASs With Time-Varying Delay Against DoS Attacks","authors":"Xiaojie Qiu;Wenchao Meng;Jinming Xu;Qinmin Yang","doi":"10.1109/TICPS.2024.3372908","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3372908","url":null,"abstract":"This paper concentrates on the resilient control issue in multi-agent systems (MASs) with the time-varying delay subjected to denial of service (DoS) attacks. To eliminate the impact of DoS attacks, a novel resilient control framework is constructed for MASs, where a variable following the Bernoulli distribution process is utilized to denote the behaviors of the attacker. Besides, we design a novel reduced-order (RO) observer with internal time-varying delay to estimate the unknown output of the system and compensate for lost data in the channels. Different from the general observers, the designed observer can ensure both the reduced-order observation errors and the full-order ones can converge to zero. Furthermore, an RO observer-based distributed protocol is devised such that the consensus errors of the closed-loop systems asymptotically converge to zero. Simulation comparisons are provided to validate the efficiency and superiority of our approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"51-59"},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140161149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Information in Industrial Cyber-Physical Systems Using Multilayer Graphs 利用多层图为工业网络物理系统中的信息建模
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-03-01 DOI: 10.1109/TICPS.2024.3396098
Angel Biskupovic;Constanza Schlotterbeck;Felipe Núñez
{"title":"Modeling Information in Industrial Cyber-Physical Systems Using Multilayer Graphs","authors":"Angel Biskupovic;Constanza Schlotterbeck;Felipe Núñez","doi":"10.1109/TICPS.2024.3396098","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3396098","url":null,"abstract":"Industrial Cyber-Physical Systems (ICPSs) are regarded as the enabling technology of the ongoing fourth industrial revolution. Despite their recognized advantages, ICPSs face challenges that need to be addressed to unleash their full potential. Among these challenges is the standardization of information models. Currently, various industry standards are used for modeling information. However, these efforts primarily focus on describing the engineering and logic aspects of industrial processes, without considering all dimensions of an ICPS. As a step towards closing this gap, this work proposes a novel approach based on multilayer graphs to generate a flexible information model that addresses three key aspects of an ICPS: engineering, production flow, and automation. To illustrate the effectiveness of the proposed approach, a specific case study on a mineral processing plant is presented.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"108-117"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output-Based Secure Control Under False Data Injection Attacks 虚假数据注入攻击下基于输出的安全控制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-01-29 DOI: 10.1109/TICPS.2024.3359154
Lezhong Xu;Hongming Zhu;Kang Guo;Yabin Gao;Chengwei Wu
{"title":"Output-Based Secure Control Under False Data Injection Attacks","authors":"Lezhong Xu;Hongming Zhu;Kang Guo;Yabin Gao;Chengwei Wu","doi":"10.1109/TICPS.2024.3359154","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3359154","url":null,"abstract":"This paper investigates the problem of cyber-physical systems in the presence of false data injection attacks. When the communication network connects the controller and the actuator, malicious adversaries can execute false data injection attacks to modify the control commands, deteriorating the performance of the system. A more general attack model is established to describe false data injection attacks including multiplicative and additive attacks. To effectively mitigate such attacks, an output-based secure controller is designed. Sufficient criteria are derived to guarantee that the cyber-physical system under such attacks is stochastically stable. Furthermore, a condition is proposed to design the secure control gain using singular value decomposition, providing a more specific form of the controller. Finally, simulation results are provided to illustrate the effectiveness of the proposed secure control scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"43-50"},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信