IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
A Systematic Review of Sensor Vulnerabilities and Cyber-Physical Threats in Industrial Robotic Systems 工业机器人系统中传感器漏洞和网络物理威胁的系统综述
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-05-29 DOI: 10.1049/cps2.70023
Abdul Kareem Shaik, Alireza Mohammadi, Hafiz Malik
{"title":"A Systematic Review of Sensor Vulnerabilities and Cyber-Physical Threats in Industrial Robotic Systems","authors":"Abdul Kareem Shaik,&nbsp;Alireza Mohammadi,&nbsp;Hafiz Malik","doi":"10.1049/cps2.70023","DOIUrl":"https://doi.org/10.1049/cps2.70023","url":null,"abstract":"<p>Industrial robotic systems in the era of Industry 4.0 play a pivotal role in modern manufacturing. These systems, which belong to the larger class of cyber-physical systems (CPSs), rely heavily on advanced sensing capabilities to execute complex and delicate tasks with high precision and efficiency. It is of no surprise that the integration of sensors with Industry 4.0 robotic systems exposes them to potential cyber-physical risks/threats. This paper addresses a critical gap in the literature of industrial robotics cybersecurity by presenting a comprehensive analysis of vulnerabilities in the sensing systems of industrial robots. In particular, we systematically explore how sensor performance limits, faults and biases can be exploited by attackers who can then turn these inherent weaknesses into security threats. Our investigation relies on a detailed literature review of a multitude of commonly used sensors in industrial robotic systems through the lens of their physics-based operating principles, classifications, performance limits, potential faults and associated vulnerabilities against disturbances such as temperature fluctuations, electromagnetic and acoustic interference, and ambient light variations. The result of this systematic investigation is a ring chart illustrating the overlaps and entanglements of sensor faults and performance limits, which can be exploited by cyber-physical adversaries. Additionally, we investigate the cascading effects of compromised sensor data on the operation of industrial robotic systems through a cause-and-effect analysis, where the sensor vulnerabilities can cause malfunction and lead to cyber-physical damage. The result of this analysis is a sensor cyber-physical threat cause-and-effect diagram, which can be employed for design of robust and effective cyber-physical defence measures. By providing insights into sensor-related cyber-risks, our cyber-physical threat analysis paves the path for enhanced industrial robotics security.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144171813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Investigation of the Resilience of EV Charging Infrastructure Under Cyber-Physical Threats Based on a Real-Time Co-Simulation Testbed 基于实时联合仿真试验台的网络物理威胁下电动汽车充电基础设施弹性创新研究
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-05-15 DOI: 10.1049/cps2.70021
Feras Alasali, Salah Abu Ghalyon, Naser El-Naily, Mohammed I. Abuashour, Anas AlMajali, Awni Itradat, William Holderbaum
{"title":"Innovative Investigation of the Resilience of EV Charging Infrastructure Under Cyber-Physical Threats Based on a Real-Time Co-Simulation Testbed","authors":"Feras Alasali,&nbsp;Salah Abu Ghalyon,&nbsp;Naser El-Naily,&nbsp;Mohammed I. Abuashour,&nbsp;Anas AlMajali,&nbsp;Awni Itradat,&nbsp;William Holderbaum","doi":"10.1049/cps2.70021","DOIUrl":"https://doi.org/10.1049/cps2.70021","url":null,"abstract":"<p>The rapid expansion of electric vehicle (EV) charging infrastructure has introduced significant vulnerabilities to cyber-physical threats, raising concerns about the resilience of both charging and smart power grid systems. This paper presents an innovative investigation into the resilience of EV charging infrastructure using a real-time co-simulation testbed, integrating both power network models and communication protocols such as IEC 61850. The study addresses gaps in existing research by implementing a realistic smart grid environment that incorporates EVs, charging stations and communication networks to simulate cyber-physical interactions. Key cyber-attacks, such as remote charging station status and configuration manipulations and their impact on it, are analysed in real-time simulations. Results show that even a relatively small attack utilising an IEEE 9-bus system with two EV charging stations can severely disrupt grid stability. The paper also explores various attacks targeting EV infrastructure, including charging stations, communication protocols, and management systems. The combined effects of cyber-attacks on power consumption and current variation highlight the critical importance of ensuring that charging infrastructure can adapt to sudden changes in demand while maintaining operational integrity.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CompDSE: A Methodology for Design Space Exploration of Computing Subsystems Within Complex Cyber-Physical Systems compse:复杂网络物理系统中计算子系统的设计空间探索方法
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-05-15 DOI: 10.1049/cps2.70019
Faezeh Sadat Saadatmand, Todor Stefanov, Ignacio González Alonso, Andy D. Pimentel, Benny Akesson
{"title":"CompDSE: A Methodology for Design Space Exploration of Computing Subsystems Within Complex Cyber-Physical Systems","authors":"Faezeh Sadat Saadatmand,&nbsp;Todor Stefanov,&nbsp;Ignacio González Alonso,&nbsp;Andy D. Pimentel,&nbsp;Benny Akesson","doi":"10.1049/cps2.70019","DOIUrl":"https://doi.org/10.1049/cps2.70019","url":null,"abstract":"<p>Designing the next-generation complex distributed cyber-physical systems (dCPS) poses significant challenges for manufacturing companies, necessitating efficient design space exploration (DSE) techniques to evaluate potential design decisions and their impact on nonfunctional aspects of the systems, such as performance, reliability and energy consumption. This paper introduces CompDSE, a methodology designed to facilitate the DSE of complex dCPS, specifically focusing on the cyber components, that is, the computing subsystems within dCPS. CompDSE defines and utilises abstract models of the application workload, computing hardware platform and workload-to-platform mapping of dCPS, automatically derived from runtime trace data, and integrates them into a discrete event simulation environment to explore various design points. We demonstrate the effectiveness of our methodology through a case study on the ASML TWINSCAN lithography machine, a complex industrial dCPS. The results showcase potential performance enhancements achieved by optimising computing subsystems while considering physical constraints. Evaluating each design point takes under a minute, highlighting the CompDSE efficiency and scalability in tackling complex dCPS with large design spaces.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Federated Learning for Energy Disaggregation of Smart Homes 智能家居能源分解的隐私保护联邦学习
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-05-04 DOI: 10.1049/cps2.70013
Mazhar Ali, Ajit Kumar, Bong Jun Choi
{"title":"Privacy Preserving Federated Learning for Energy Disaggregation of Smart Homes","authors":"Mazhar Ali,&nbsp;Ajit Kumar,&nbsp;Bong Jun Choi","doi":"10.1049/cps2.70013","DOIUrl":"https://doi.org/10.1049/cps2.70013","url":null,"abstract":"<p>Smart advanced metering infrastructure and edge devices show promising solutions in digitalising distributed energy systems. Energy disaggregation of household load consumption provides a better understanding of consumers’ appliance-level usage patterns. Machine learning approaches enhance the power system's efficiency but this is contingent upon sufficient training samples for efficient and accurate prediction tasks. In a centralised setup, transferring such a substantially high volume of information to the cloud server has a communication bottleneck. Although high-computing edge devices seek to address such problems, the data scarcity and heterogeneity among clients remain challenges to be addressed. Federated learning offers a compelling solution in such a scenario by leveraging the ML model training at edge devices and aggregating the client's updates at a cloud server. However, FL still faces significant security issues, including the potential eavesdropping by a malicious actor with the intention of stealing clients' information while communicating with an honest-but-curious server. The study aims to secure the sensitive information of energy users participating in the nonintrusive load monitoring (NILM) program by integrating differential privacy with a personalised federated learning approach. The Fisher information method was adapted to extract the global model information based on common features, while personalised updates will not be shared with the server for client-specific features. Similarly, the authors employed an adaptive differential privacy only on the shared local updates (DP-PFL) while communicating with the server. Experimental results on the Pecan Street and REFIT datasets depict that DP-PFL exhibits more favourable performance on both the energy prediction and status classification tasks compared to other state-of-the-art DP approaches in federated NILM.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143905207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Socio-Technical Security Modelling and Simulations in Cyber-Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers 社会技术安全建模和模拟在网络物理系统:展望知识,观念,实践,使能者和障碍
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-30 DOI: 10.1049/cps2.70017
Uchenna Daniel Ani, Mohammed Al-Mhiqani, Nilufer Tuptuk, Stephen Hailes, Jeremy Daniel McKendrick Watson
{"title":"Socio-Technical Security Modelling and Simulations in Cyber-Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers","authors":"Uchenna Daniel Ani,&nbsp;Mohammed Al-Mhiqani,&nbsp;Nilufer Tuptuk,&nbsp;Stephen Hailes,&nbsp;Jeremy Daniel McKendrick Watson","doi":"10.1049/cps2.70017","DOIUrl":"https://doi.org/10.1049/cps2.70017","url":null,"abstract":"<p>Socio-Technical Security Modelling and Simulation (STSec-M&amp;S) is a technique used for reasoning and representing security viewpoints that include both the social and technical aspects of a system. It has shown great potential for improving the cybersecurity and resilience of Critical Infrastructure (CI). This study involved a multi-methods approach, consisting of a scoping literature review and a focus group workshop, conducted with stakeholder engagement from critical infrastructure stakeholders to explore their perceptions and practices regarding the use of socio-technical security modelling and simulation. The findings suggest that the current state of knowledge regarding the use and effectiveness of STSec-M&amp;Ss approaches is limited in CI domains. Consequently, there is little application of it in existing CI systems, regardless of its recognised benefits of enabling a better understanding of CI functionalities, security goals, early and more holistic risk identifications and selection of appropriate countermeasures. The benefits of the STSec-M&amp;S approach can be better realised by effective cross-sector communications and collaborations, team partnerships, system and approach sophistication, and better security awareness amongst others. The potential barriers that can impede such benefits include high expense for implementing the technique, low data availability and quality, regulatory compliance, and competency gaps etc. Helpful recommendations include exploring and using realistic data, validating system security models, and exploring new ways of reskilling and upskilling CI stakeholders in socio-technical security-thinking and M&amp;S approaches to enhance cybersecurity and resilience of CIs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Storage System Configuration for Supporting the Scheduling and Frequency Regulation of Offshore Microgrids 支持近海微电网调度调频的储能系统配置
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-24 DOI: 10.1049/cps2.70010
Longfei Liu, Jing Liu, Xiandong Xu, Xiaodan Yu, Wei Wei, Hongjie Jia
{"title":"Energy Storage System Configuration for Supporting the Scheduling and Frequency Regulation of Offshore Microgrids","authors":"Longfei Liu,&nbsp;Jing Liu,&nbsp;Xiandong Xu,&nbsp;Xiaodan Yu,&nbsp;Wei Wei,&nbsp;Hongjie Jia","doi":"10.1049/cps2.70010","DOIUrl":"https://doi.org/10.1049/cps2.70010","url":null,"abstract":"<p>Offshore microgrids such as oil and gas platforms are embracing wind power to reduce onsite gas consumption and carbon emission. Meanwhile, the intermittency of wind power threats the operational security of offshore microgrids which are mainly islanded cyber-physical system. Although energy storage system (ESS) could smooth the wind power, it also changes the operational strategy of the microgrids. Yet, it is still not clear on how to determine the ESS configuration, particularly for MW-level offshore microgrid with limited rooms for ESS installment. In this paper, an optimal ESS configuration method is proposed to support operational scheduling and frequency regulation of the microgrids at different time scales. A source-storage-load coordinated frequency response model is proposed to exploit the advantages of different types of ESS. The model is converted to convex quadratic forms and incorporated into the ESS configuration model to guarantee the frequency stability of offshore microgrids. The proposed ESS configuration method is validated using the data of a real offshore oil and gas platform. Compared with existing methods, the full life cycle economic efficiency, wind power utilisation, and operational security are all significantly improved.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems 电力系统中同步相量网络安全评估的可扩展网络物理测试平台
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-24 DOI: 10.1049/cps2.12106
Shuvangkar Chandra Das, Tuyen Vu, Herbert Ginn
{"title":"Scalable cyber-physical testbed for cybersecurity evaluation of synchrophasors in power systems","authors":"Shuvangkar Chandra Das,&nbsp;Tuyen Vu,&nbsp;Herbert Ginn","doi":"10.1049/cps2.12106","DOIUrl":"https://doi.org/10.1049/cps2.12106","url":null,"abstract":"<p>This paper presents a synchrophasor-based real-time cyber-physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real-time cyber-security emulation using different components, including a real-time digital simulator, virtual machines (VM), a communication network emulator, and a packet manipulation tool. The script-based VM deployment and software-defined network emulation facilitate a highly scalable cyber-physical testbed, which enables emulations of a real power system under different attack scenarios such as address resolution protocol (ARP) poisoning attack, man-in-the-middle (MITM) attack, false data injection attack (FDIA), and eavesdropping attack. An open-source pySynphasor module has been implemented to analyse the security vulnerabilities of the IEEE C37.118.2 protocol. The paper also presents an interactive framework for injecting false data into a realistic system utilising the pySynphasor module, which can dissect and reconstruct the C37.118.2 packets. Therefore, it expands the potential of testing and developing PMU-based systems and analysing their security vulnerabilities, benefiting the power industry and academia. A case study demonstrating the FDIA attack on the PMU measurements and the bad-data detection technique is presented as an example of the testbed capability.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIDER: Cyber-Security in Industrial IoT Using Deep Learning and Ring Learning with Errors CIDER:使用深度学习和带错误的环学习的工业物联网网络安全
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-17 DOI: 10.1049/cps2.70015
Siu Ting Tsoi, Anish Jindal
{"title":"CIDER: Cyber-Security in Industrial IoT Using Deep Learning and Ring Learning with Errors","authors":"Siu Ting Tsoi,&nbsp;Anish Jindal","doi":"10.1049/cps2.70015","DOIUrl":"https://doi.org/10.1049/cps2.70015","url":null,"abstract":"<p>Traditional security measures such as access control and authentication need to be more effective against ever-evolving threats. Moreover, security concerns increase as more industries shift towards adopting the industrial Internet of things (IIoT). Therefore, this paper proposes secure measures using deep machine learning-based intrusion detection and advanced encryption schemes based on lattice-based cryptography on three-layered cloud-edge-fog IIoT architecture. The novelty of the paper is an integrated security framework for IIoT that combines deep learning-based intrusion detection system (IDS) with lightweight cryptographic protocols. For deep learning, multi-layer perception (MLP), convolutional neural network (CNN), and TabNet were implemented for intruder detection systems from edge to cloud layer, and ring learning with error (RLWE) was proposed for homomorphic encryption to communicate data between fog and edge layer. The evaluation experiments were performed on the Ton_IoT dataset and the results show that the deep learning models have a very good accuracy of around 92% for multiclass attack classification. Moreover, RLWE results show improved encryption time and reduced ciphertext size against standard Learning With Error encryption.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Risk Identification and Classification-Based Load Forecasting Tool for Pandemic Situations 大流行情况下的网络风险识别和基于分类的负荷预测工具
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-14 DOI: 10.1049/cps2.70014
Kuldeep Singh Shivran, Kyle Swire-Thompson, Neetesh Saxena, Sarasij Das
{"title":"Cyber Risk Identification and Classification-Based Load Forecasting Tool for Pandemic Situations","authors":"Kuldeep Singh Shivran,&nbsp;Kyle Swire-Thompson,&nbsp;Neetesh Saxena,&nbsp;Sarasij Das","doi":"10.1049/cps2.70014","DOIUrl":"https://doi.org/10.1049/cps2.70014","url":null,"abstract":"<p>Smart grid operators use load forecasting algorithms to predict energy load for the reliable and economical operation of the electricity grid. COVID-19 pandemic-like situations (PLS) can significantly impact energy load demand due to uncertainties in factors such as regulatory orders, pandemic severity and human behavioural patterns. Additionally, in a smart grid, cyberattacks can manipulate forecasted load data, leading to suboptimal decisions, economic losses and potential blackouts. Forecasting load during these situations is challenging for traditional load forecasting tools, as they struggle to identify cyberattacks amidst uncertain load demand, where cyberattacks may mimic pandemic-like load patterns. Traditional forecasting methods do not incorporate factors related to pandemics and cyberattacks. Recent studies have focused on forecasting by considering factors such as COVID-19 cases, social distancing, weather, and temperature but fail to account for the impact of regulatory orders and pandemic severity. They also lack the ability to differentiate between normal and anomalous forecasts and classify the type of attack in anomalous data. This paper presents a tool for short-term load forecasting, anomaly detection and cyberattack classification for pandemic-like situations (PLS). The proposed short-term load forecasting algorithm uses a weighted moving average and an adjustment factor incorporating regulatory orders and pandemic severity, making it computationally efficient and deterministic. Additionally, the proposed anomaly detection and cyberattack classification algorithm provides robust options for detecting anomalies and classifying various types of cyberattacks. The proposed tool has been evaluated using K-Fold cross-validation to improve generalisability and reduce overfitting. The mean squared error (MSE) was used to measure prediction accuracy and detect discrepancies. It has been analysed and tested on real-load data from the State Load Dispatch Centre (SLDC), Delhi, of the Indian National Grid.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience PI controller design for mitigating weak denial-of-service attacks in cyber-physical systems 弹性PI控制器设计用于减轻网络物理系统中的弱拒绝服务攻击
IF 1.7
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2025-04-02 DOI: 10.1049/cps2.70002
Hamid Reza Chavoshi, Ali Khoshlahjeh Sedgh, Hamid Khaloozadeh
{"title":"Resilience PI controller design for mitigating weak denial-of-service attacks in cyber-physical systems","authors":"Hamid Reza Chavoshi,&nbsp;Ali Khoshlahjeh Sedgh,&nbsp;Hamid Khaloozadeh","doi":"10.1049/cps2.70002","DOIUrl":"https://doi.org/10.1049/cps2.70002","url":null,"abstract":"<p>Modern control systems integrate with information technologies through Networked Control Systems and Cyber-Physical Systems (CPS). Although these systems are beneficial, they raise security concerns for critical infrastructure. Cyberattacks on CPS communication channels, such as denial-of-service (DoS) attacks, can cause significant time delays and data loss, leading to poor system performance and instability. This article assumes weak DoS attack influences as an unknown delay. Then, system maximum resistance time against DoS attacks will be calculated according to the Lyapunov–Krasovskii theorem, and a conservative upper bound delay is included in the system model, which maintains system stability. With this assumption, Kharitonov's theorem-based robust Proportional-Integral (PI) controller is developed to mitigate DoS attacks. In addition, another Ziegler–Nichols tuned PI controller is presented to demonstrate that the proposed robust PI controller effectively reduces DoS attack impacts on CPSs. Finally, in a liquid-level networked control system, the efficacy of two PI controllers was evaluated. Results show that Kharitonov's theorem-based controller surpasses the Ziegler–Nichols method PI controller in mitigating the impact of DoS attacks on system behaviour, including maintaining system stability and keeping both transient response characteristics and setpoint tracking at desired values. Also, the proposed design strategy for reducing DoS attack effects is simple and less conservative than other robust control methods.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143761836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信