Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng
{"title":"Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control Systems","authors":"Yawen Xue;Jie Pan;Yangyang Geng;Zeyu Yang;Mengxiang Liu;Ruilong Deng","doi":"10.1109/TICPS.2024.3406505","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3406505","url":null,"abstract":"Industrial control systems (ICSs) are becoming increasingly interconnected as the rapid convergence of information technology (IT) and operation technology (OT) networks, and meanwhile massive attack surfaces have been exposed. However, traditional intrusion detection systems (IDSs) are difficult to be directly deployed in ICSs due to the hard real-time requirement and rare patching chance. Besides, the design of effective and practical IDSs is hampered by the lack of benchmarking ICS cybersecurity datasets. To bridge the gaps, this paper makes the first attempt by open-sourcing the developed ICS cybersecurity datasets and proposing a decision fusion based real-time IDS. Firstly, we design a customized cybersecurity dataset in a full-hardware and high-fidelity platform, including 7 types of cyber threats tailored for ICSs. The collected dataset includes network traffic, sensor readings, actuator status, and system parameters, providing the state-of-the-art benchmark dataset for ICSs consisting of cross-layer characteristics. Furthermore, we design an online decision fusion-based IDS by strategically integrating 4 widely-used machine learning models. The proposed IDS is deployed on a real-time running ethanol distillation, surpassing the performance of single detection models in terms of precision and F1-score, which substantially enhances intrusion detection accuracy and cybersecurity of ICS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"143-153"},"PeriodicalIF":0.0,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Decision-Making for Collaborative Manufacturing in ICPSs via Hierarchical Games","authors":"Xinjiang Cai;Qing Gao;Wei Wang;Jinhu Lü","doi":"10.1109/TICPS.2024.3381083","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3381083","url":null,"abstract":"In this article, the robust decision-making problem is investigated for collaborative manufacturing in industrial cyber-physical systems (ICPSs) that involve multiple manufacturing line agents (MLAs) and multiple industrial terminal agents (ITAs). The disturbing factor is modeled as a rational player who aims to optimally deteriorate other players' performance, then the robust decision-making problem is addressed from a game-theoretic perspective by achieving a Nash-Stackelberg-Nash-Saddle (NSNS) equilibrium where all players' information is acquired through a dynamic feedback form. Furthermore, the existence of the NSNS equilibrium is analyzed, and the input-to-state stability of the closed-loop system is proven. Finally, simulations from a numerical example are presented to demonstrate the effectiveness of the proposed approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"71-80"},"PeriodicalIF":0.0,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140540959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions”","authors":"Tsu-Yang Wu;Haozhi Wu;Fangfang Kong;Saru Kumari;Muhammad Khurram Khan;Chien-Ming Chen","doi":"10.1109/TICPS.2024.3376304","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3376304","url":null,"abstract":"Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses hash functions and multiple physical unclonable functions. However, we find that Reddy et al.’s protocol cannot resist known session-specific temporary information (KSSTI) attacks. To address these limitations, we discuss an improvement that addresses the above issues.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"69-70"},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140291212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Cyberattack and Anomaly Detections in the Presence of Actuators Lags and Communication Delays With Application to Industrial Gas Turbines","authors":"Nasim Ensansefat;Mojtaba Kordestani;Ali Chaibakhsh;Mehrdad Saif;Khashayar Khorasani","doi":"10.1109/TICPS.2024.3401615","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3401615","url":null,"abstract":"Cyber-Physical Systems (CPSs) utilize Networked Control Systems (NCS), where the supervised controller is connected to the network through communication links. It facilitates the network with online accessibility that reduces maintenance costs and enhances reliability. However, open access often raises the risk of cyber-attacks. Besides, a communication channel delay due to limited bandwidth is often possible, which may lead to instability problems. This paper introduces a new observer-based resilient control framework to deal with cyber-attacks and communication delays. As such, deception and Denial pf Service (DoS) actuator attacks are considered by defining appropriate unified functions. Following that, an augmented state-space model is proposed for the CPS with time delay in the communication links. Next, states are estimated by a sliding mode observer from the corrupted measurements. Then, a residual generation is appropriated to identify cyber-attacks in the augmented system and to assess the cyber-attack detection approach. The Lyapunov stability theory guarantees the convergence of the estimation. Experimental data on an industrial gas turbine is utilized to validate the system model. Test results indicate that the sliding mode observer enjoys a secure framework for network communications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"130-142"},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Transactions on Industrial Cyber-Physical Systems Publication Information","authors":"","doi":"10.1109/TICPS.2023.3342665","DOIUrl":"https://doi.org/10.1109/TICPS.2023.3342665","url":null,"abstract":"","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10463156","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140067539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Secure Control Design for Cyber-Physical Systems Under False Data Injection Attacks","authors":"Cheng Fei;Jun Shen;Hongling Qiu;Zhipeng Zhang;Wei Xing","doi":"10.1109/TICPS.2024.3373715","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3373715","url":null,"abstract":"In this study, we employ two data-driven approaches to address the secure control problem for cyber-physical systems when facing false data injection attacks. Firstly, guided by zero-sum game theory and the principle of optimality, we derive the optimal control gain, which hinges on the solution of a corresponding algebraic Riccati equation. Secondly, we present sufficient conditions to guarantee the existence of a solution to the algebraic Riccati equation, which constitutes the first major contributions of this paper. Subsequently, we introduce two data-driven Q-learning algorithms, facilitating model-free control design. The second algorithm represents the second major contribution of this paper, as it not only operates without the need for a system model but also eliminates the requirement for state vectors, making it quite practical. Lastly, the efficacy of the proposed control schemes is confirmed through a case study involving an F-16 aircraft.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"60-68"},"PeriodicalIF":0.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140181562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Stochastic Bayesian Game for Securing Secondary Frequency Control of Microgrids Against Spoofing Attacks With Incomplete Information","authors":"Yang Li;Shichao Liu;Li Zhu","doi":"10.1109/TICPS.2024.3396106","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3396106","url":null,"abstract":"While wireless communication has been implemented for the data exchange in the secondary frequency control of microgrids, the wireless links also open doors to spoofing attacks. Most existing game-theoretic approaches on securing control systems of microgrids against wireless spoofing attacks assume complete information. However, the defense scheme under perfect information assumption could lead to severe resource waste and significant detection delay due to the high over-defense rate. In this paper, we design a defense policy generation method for securing microgrids secondary frequency control facing spoofing attacks and incomplete observation. We formulate a multi-stage two-player stochastic Bayesian game (SBG) when the identity of the defender's opponent is uncertain. Furthermore, we propose a posterior identity belief update method, where Bayesian Nash equilibrium (NE) is considered to derive the boundary identity belief. Under the proposed SBG framework, an identity-dependent optimal defense scheme is obtained to simultaneously secure microgrids against potential spoofing attacks and reduce the over-defense rate. Comparison studies show that the proposed SBG-based defense policy can improve defense performance and significantly reduce over-defense rates.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"118-129"},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced-Order Observer-Based Resilient Control for MASs With Time-Varying Delay Against DoS Attacks","authors":"Xiaojie Qiu;Wenchao Meng;Jinming Xu;Qinmin Yang","doi":"10.1109/TICPS.2024.3372908","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3372908","url":null,"abstract":"This paper concentrates on the resilient control issue in multi-agent systems (MASs) with the time-varying delay subjected to denial of service (DoS) attacks. To eliminate the impact of DoS attacks, a novel resilient control framework is constructed for MASs, where a variable following the Bernoulli distribution process is utilized to denote the behaviors of the attacker. Besides, we design a novel reduced-order (RO) observer with internal time-varying delay to estimate the unknown output of the system and compensate for lost data in the channels. Different from the general observers, the designed observer can ensure both the reduced-order observation errors and the full-order ones can converge to zero. Furthermore, an RO observer-based distributed protocol is devised such that the consensus errors of the closed-loop systems asymptotically converge to zero. Simulation comparisons are provided to validate the efficiency and superiority of our approach.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"51-59"},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140161149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Information in Industrial Cyber-Physical Systems Using Multilayer Graphs","authors":"Angel Biskupovic;Constanza Schlotterbeck;Felipe Núñez","doi":"10.1109/TICPS.2024.3396098","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3396098","url":null,"abstract":"Industrial Cyber-Physical Systems (ICPSs) are regarded as the enabling technology of the ongoing fourth industrial revolution. Despite their recognized advantages, ICPSs face challenges that need to be addressed to unleash their full potential. Among these challenges is the standardization of information models. Currently, various industry standards are used for modeling information. However, these efforts primarily focus on describing the engineering and logic aspects of industrial processes, without considering all dimensions of an ICPS. As a step towards closing this gap, this work proposes a novel approach based on multilayer graphs to generate a flexible information model that addresses three key aspects of an ICPS: engineering, production flow, and automation. To illustrate the effectiveness of the proposed approach, a specific case study on a mineral processing plant is presented.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"108-117"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Output-Based Secure Control Under False Data Injection Attacks","authors":"Lezhong Xu;Hongming Zhu;Kang Guo;Yabin Gao;Chengwei Wu","doi":"10.1109/TICPS.2024.3359154","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3359154","url":null,"abstract":"This paper investigates the problem of cyber-physical systems in the presence of false data injection attacks. When the communication network connects the controller and the actuator, malicious adversaries can execute false data injection attacks to modify the control commands, deteriorating the performance of the system. A more general attack model is established to describe false data injection attacks including multiplicative and additive attacks. To effectively mitigate such attacks, an output-based secure controller is designed. Sufficient criteria are derived to guarantee that the cyber-physical system under such attacks is stochastically stable. Furthermore, a condition is proposed to design the secure control gain using singular value decomposition, providing a more specific form of the controller. Finally, simulation results are provided to illustrate the effectiveness of the proposed secure control scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"43-50"},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}