{"title":"Social Co-OS: Cyber-human social Co-operating system","authors":"Takeshi Kato, Yasuyuki Kudo, Junichi Miyakoshi, Misa Owa, Yasuhiro Asa, Takashi Numata, Ryuji Mine, Hiroyuki Mizuno","doi":"10.1049/cps2.12037","DOIUrl":"https://doi.org/10.1049/cps2.12037","url":null,"abstract":"<p>The novel concept of a Cyber-Human Social System (CHSS) and a diverse and pluralistic ‘mixed-life society’ is proposed, wherein cyber and human societies commit to each other. This concept enhances the Cyber-Physical System (CPS), which is associated with the current Society 5.0, a social vision realised through the fusion of cyber (virtual) and physical (real) spaces following information society (Society 4.0 and Industry 4.0). Moreover, the CHSS enhances the Human-CPS, the Human-in-the-Loop CPS (HiLCPS), and the Cyber-Human System by intervening in individual behaviour pro-socially and supporting consensus building. As a form of architecture that embodies the CHSS concept, the Cyber-Human Social Co-Operating System (Social Co-OS) that combines cyber and human societies is shown. In this architecture, the cyber and human systems cooperate through the fast loop (operation and administration) and slow loop (consensus and politics). Furthermore, the technical content and current implementation of the basic functions of the Social Co-OS are described. These functions consist of individual behavioural diagnostics, interventions in the fast loop, group decision diagnostics and consensus building in the slow loop. Subsequently, this system will contribute to mutual aid communities and platform cooperatives.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 1","pages":"1-14"},"PeriodicalIF":1.5,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50136491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vivek Kumar Singh, Manimaran Govindarasu, Donald Porschet, Edward Shaffer, Morris Berman
{"title":"NEFTSec: Networked federation testbed for cyber-physical security of smart grid: Architecture, applications, and evaluation","authors":"Vivek Kumar Singh, Manimaran Govindarasu, Donald Porschet, Edward Shaffer, Morris Berman","doi":"10.1049/cps2.12033","DOIUrl":"https://doi.org/10.1049/cps2.12033","url":null,"abstract":"<p>As today's power grid is evolving into a densely interconnected cyber-physical system (CPS), a high fidelity and multifaceted testbed environment is needed to perform cybersecurity experiments in a realistic grid environment. Traditional standalone CPS testbeds lack the ability to emulate complex cyber-physical interdependencies between multiple smart grid domains in a real-time environment. Therefore, there are ongoing research and development (R&D) efforts to develop an interconnected CPS testbed by sharing geographically dispersed testbed resources to perform distributed simulation while analysing simulation fidelity. This paper presents a networked federation testbed for cybersecurity evaluation of today's and emerging smart grid environments. Specifically, it presents two novel testbed architectures, including cyber federation and cyber-physical federation, identifies R&D applications, and also describes testbed building blocks with experimental case studies. It also presents a novel co-simulation interface algorithm to facilitate distributed simulation within cyber-physical federation. The resources available at the PowerCyber CPS security testbed at Iowa State University (ISU) and the US Army Research Laboratory are utilised to develop this platform for performing multiple experimental case studies pertaining to wide-area protection and control applications in power system. Finally, experimental results are presented to analyse the simulation fidelity and real-time performance of the testbed federation.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 4","pages":"197-211"},"PeriodicalIF":1.5,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91940201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time out-of-distribution detection in cyber-physical systems with learning-enabled components","authors":"Feiyang Cai, Xenofon Koutsoukos","doi":"10.1049/cps2.12034","DOIUrl":"https://doi.org/10.1049/cps2.12034","url":null,"abstract":"<p>Learning-enabled components (LECs) such as deep neural networks are used increasingly in cyber-physical systems (CPS) since they can handle the uncertainty and variability of the environment and increase the level of autonomy. LECs, however, may compromise system safety since their predictions may have large errors, for example, when the data available at runtime are different than the data used for training. This study considers the problem of efficient and robust out-of-distribution detection for learning-enabled CPS. Out-of-distribution detection using a single input example is typically not robust and may result in a large number of false alarms. The proposed approach utilises neural network architectures that are used to compute efficiently the nonconformity of new inputs relative to the training data. Specifically, variational autoencoder and deep support vector data description networks are used to learn models for the real-time detection of out-of-distribution high-dimensional inputs. Robustness can be improved by incorporating saliency maps that identify parts of the input contributing most to the LEC predictions. We demonstrate the approach using simulation case studies of an advanced emergency braking system and a self-driving end-to-end controller, as well as a real-world data set for autonomous driving. The experimental results show a small detection delay with a very small number of false alarms while the execution time is comparable to the execution time of the original LECs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 4","pages":"212-234"},"PeriodicalIF":1.5,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91836938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The real-time state identification of the electricity-heat system based on Borderline-SMOTE and XGBoost","authors":"Xin Pei, Fei Mei, Jiaqi Gu","doi":"10.1049/cps2.12032","DOIUrl":"10.1049/cps2.12032","url":null,"abstract":"<p>It is meaningful to study the real-time state monitoring and identification of integrated energy system and grasp its state in time for stable operation. A state identification method based on multi-class data equalisation and extreme gradient boost (XGBoost) is proposed for integrated energy systems. First, Latin hypercube sampling is used to simulate the load at different moments. Different system states are set up and combined with the simulative load at different moments to determine the system operation state at different moments. Then, the energy flow model is used to calculate the system power flow under different states, and the feature indexes are obtained to form the original data set. Aiming at the unbalanced data, the oversampling technology is used to preprocess data to achieve the balance of data sets. The pre-processed data is utilised to train the XGBoost, and the optimal hyperparameters of the model are obtained based on the K-fold cross-validation and grid search. Finally, the pre-processed data set is used to verify the proposed method. The calculation results show the accuracy of the identification model reaches 87.79%. Compared with traditional methods, the model can accurately identify the operating state of the electricity–heat energy system at any time section.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"236-246"},"PeriodicalIF":1.5,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73856072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Corrigendum: Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality","authors":"Amarachi Umunnakwe","doi":"10.1049/cps2.12025","DOIUrl":"https://doi.org/10.1049/cps2.12025","url":null,"abstract":"","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"112"},"PeriodicalIF":1.5,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91839066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaolin Li, Jianmou Lu, Shiyao Qin, Yang Hu, Fang Fang
{"title":"Data-driven lumped dynamic modelling of wind farm frequency regulation characteristics","authors":"Shaolin Li, Jianmou Lu, Shiyao Qin, Yang Hu, Fang Fang","doi":"10.1049/cps2.12031","DOIUrl":"10.1049/cps2.12031","url":null,"abstract":"<p>High proportion of wind power in the power grid leads to the problem of power system frequency instability, which requires the wind farm itself to have the ability of frequency adjustment; therefore, it is particularly important to conduct modelling of wind farm frequency regulation (WFFR) response characteristics. During the modelling process, it is generally necessary to establish a model for each working condition separately, which will bring huge workload. In addition, the accuracy of the model decreases when the frequency response is non-linear. Therefore, this paper investigates the modelling of WFFR response characteristics in different working conditions. A data preprocessing method based on WFFR strategy and modelling methods is introduced. Then, data-based transfer function models of WFFR response characteristics for different working conditions are constructed. After that, the gaps between different models are measured using a gap metric technique to analyse dynamic similarity between models. Finally, in order to make up for the defect of transfer function models, a non-linear autoregressive with exogenous input neural networks (NARXNN) model of WFFR response characteristics is constructed utilising lumped data of all working conditions; then, the trained model is tested by the data of each working condition to verify the accuracy and universality.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"147-156"},"PeriodicalIF":1.5,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132379114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability-aware routing and scheduling for Time-Sensitive Networking","authors":"Niklas Reusch, Silviu S. Craciunas, Paul Pop","doi":"10.1049/cps2.12030","DOIUrl":"10.1049/cps2.12030","url":null,"abstract":"<p>Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real-time, safety and security requirements are upheld. The Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A Constraint Programing-based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing-based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"124-146"},"PeriodicalIF":1.5,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shichao Liu, Ligang Wu, Jose Ignacio Leon, Bo Chen
{"title":"Guest editorial: Machine learning for secure cyber-physical industrial control systems","authors":"Shichao Liu, Ligang Wu, Jose Ignacio Leon, Bo Chen","doi":"10.1049/cps2.12029","DOIUrl":"10.1049/cps2.12029","url":null,"abstract":"<p>Information and communication technologies have increasingly been used to support the exchange of measurements and control signals in industrial control systems, making them important applications of cyber-physical industrial control systems (CPICSs) such as electrical power systems and intelligent transportation systems. While the communication infrastructure significantly facilitates the transmission of vast amounts of data over wide geographical areas, it makes CPICSs vulnerable to cyber-attacks; protecting CPICSs of critical infrastructures from cyber-attacks is crucial and challenging. In order to secure CPICSs, a variety of open challenges need to be tackled, including cyber-physical system modelling approaches, advanced intrusion detection systems, and resilient estimation and control methods. Machine learning (ML) and its emerging algorithms offer the potential of dealing with large-scale data analysis, data processing and decision-making in the security of CPICSs.</p><p>This special issue publishes state-of-the-art ML-based solutions for the open challenges in securing CPICSs of critical infrastructures.</p><p>When modelling cyber-attacks in CPICSs, most of existing works consider using external disturbances, which follow certain assumptions. While it is not sufficient to model cyber-attacks simply as disturbances, the paper ‘Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection (FDI) attacks’ by S. Liu et al. considers the dynamic interaction between the smart attacker (the spoofer) and the defender the microgrid control centre (MGCC). The authors propose a stochastic game between the MGCC and the attacker for enhancing the vulnerability of the MGCC to FDI attack (wireless spoof attack).</p><p>As communication networks are implemented for information exchange between the master and slave sides of bilateral teleoperation systems, they are also exposed to cyber-attack threats. The paper ‘Mode-dependent switching control of bilateral teleoperation against random denial-of-service attacks’ by L. Hu et al. analyses the performance of bilateral teleoperation systems in the presence of random denial-of-service (DoS) attacks and constant transmission delays and proposes a mode-dependent switching controller to mitigate the influence of DoS attacks.</p><p>While machine-learning algorithms are helpful in identifying cyber-attacks such as network intrusion, common network intrusion datasets are negatively affected by class imbalance; the normal traffic behaviour constitutes most of the dataset, whereas intrusion traffic behaviour forms a significantly smaller portion. The paper ‘Network intrusion detection using ML approaches: Addressing data imbalance’ by R. Ahsan et al. conducts a comparative evaluation on the impact of data imbalance of various ML algorithms and presents a hybrid voting classifier to improve the results.</p><p>To improve the anomaly detection performance w","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125416194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marko Jacovic, Michael J. Liston, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar
{"title":"Experimentation framework for wireless communication systems under jamming scenarios","authors":"Marko Jacovic, Michael J. Liston, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar","doi":"10.1049/cps2.12027","DOIUrl":"https://doi.org/10.1049/cps2.12027","url":null,"abstract":"<p>Cyber-physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless communication between devices is necessary to enable the widespread adoption of these emerging technologies. Cyber-physical systems devices must be protected against active threats, such as Radio Frequency (RF) Jammers, which intentionally disrupt communication links. Jamming detection and mitigation techniques must be evaluated extensively to validate algorithms prior to full implementation. Challenges related to obtaining zoning permits, Federal Aviation Administration (FAA) pilot certification for Unmanned Aerial Vehicles (UAVs), and Federal Communications Commission (FCC) licencing lead to evaluation limited to simulation-based or simplistic, non-representative hardware experimentation. A site-specific ray-tracing emulation framework is presented to provide a realistic evaluation of communication devices under RF jamming attacks in complex scenarios involving mobility, vehicular, and UAV systems. System architecture and capabilities are provided for the devices under test, real-world jamming adversaries, channel modelling, and channel emulation. Case studies are provided to demonstrate the use of the framework for different applications and jamming threats. The experimental results illustrate the benefit of the ray-tracing emulation system for conducting complex wireless communication studies under the presence of RF jamming.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"93-111"},"PeriodicalIF":1.5,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91883051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tadanao Zanma, Naohiro Yamamoto, Kenta Koiwa, Kang-Zhi Liu
{"title":"Optimal control input for discrete-time networked control systems with data dropout","authors":"Tadanao Zanma, Naohiro Yamamoto, Kenta Koiwa, Kang-Zhi Liu","doi":"10.1049/cps2.12028","DOIUrl":"10.1049/cps2.12028","url":null,"abstract":"<p>These days, networked control systems (NCSs) in which data is transmitted via communication have been actively studied for many potential applications. In an NCS, data dropout degrades control performance depending on network conditions. For an NCS with data dropout, the authors propose a model-predictive-control-based input optimisation, representing data dropout as both a Bernoulli model and a finite-order Markov chain. Using the proposed NCS data dropout model, the authors derive an optimal input that provides the estimated error between the expected state of the plant and a given reference. The proposed control problem is formulated as its equivalent quadratic programming, as executed at each online sampling. The authors also demonstrate simulations and experiments to show the effectiveness of the proposed method.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"113-123"},"PeriodicalIF":1.5,"publicationDate":"2022-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}