Amir Norouzi Mobarakeh, Mohammad Ataei, Rahmat-Allah Hooshmand
{"title":"The threat of zero-dynamics attack on non-linear cyber-physical systems","authors":"Amir Norouzi Mobarakeh, Mohammad Ataei, Rahmat-Allah Hooshmand","doi":"10.1049/cps2.12099","DOIUrl":"https://doi.org/10.1049/cps2.12099","url":null,"abstract":"<p>Zero-dynamics attack (ZDA) is a destructive stealthy cyberattack that threatens cyber-physical systems (CPS). The authors have warned about the risk of a cyberattack by introducing a new general ZDA that can be effective and robust in non-linear multiple-input multiple-output CPS. In this proposed attack policy, the adversary extracts the sensor and actuator online data on the network platform. Then, by utilising a state observer and considering specific delay times, the attacker injects a ZDA signal into the actuator channels of the cyber-physical system. As a result, the internal dynamics will diverge from the nominal working region of the controlled cyber-physical system, while the outputs remain close to the actual outputs of the attack-free system. Therefore, this cyberattack can remain stealthy, and it can also be robust against revealing signals. The efficiency of this new attack policy is demonstrated in the simulation results for a continuous stirred tank reactor regarded as a cyber-physical system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"463-476"},"PeriodicalIF":1.7,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an efficient dynamic context-based privacy policy deployment model via dual bioinspired Q learning optimisations","authors":"Namrata Jiten Patel, Ashish Jadhav","doi":"10.1049/cps2.12100","DOIUrl":"https://doi.org/10.1049/cps2.12100","url":null,"abstract":"<p>A novel context-based privacy policy deployment model enhanced with bioinspired Q-learning optimisations is presented. The model addresses the challenge of maintaining privacy while ensuring data integrity and usability in various settings. Leveraging datasets including Adult (Census Income), Yelp, UC Irvine Machine Learning, and Movie Lens, the authors evaluate the model's performance against state-of-the-art techniques, such as GEF AL, Deep Forest, and Robust Continual Learning. The approach employs Firefly Optimiser (FFO) and Ant Lion Optimiser (ALO) algorithms to dynamically adjust privacy parameters and handle large datasets efficiently. Additionally, Q-learning enables intelligent decision-making and rapid adaptation to changing data and network conditions and scenarios. Evaluation results demonstrate that the model consistently outperforms reference techniques across multiple metrics, including privacy levels, scalability, fidelity, and sensitivity management. By reducing reputational harm, minimising delays, and enhancing network quality, the model offers robust privacy protection without sacrificing data utility. Overall, a dynamic context-based privacy policy deployment approach, enhanced with bioinspired Q-learning optimisations, presents a significant advancement in privacy preservation methods. The combination of ALO, FFO, and Q-learning techniques offers a practical solution to evolving data privacy challenges and enhances flexibility in various use case scenarios.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"477-496"},"PeriodicalIF":1.7,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shining Sun, Hao Huang, Emily Payne, Shamina Hossain-McKenzie, Nicholas Jacobs, H. Vincent Poor, Astrid Layton, Katherine Davis
{"title":"A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale","authors":"Shining Sun, Hao Huang, Emily Payne, Shamina Hossain-McKenzie, Nicholas Jacobs, H. Vincent Poor, Astrid Layton, Katherine Davis","doi":"10.1049/cps2.12097","DOIUrl":"https://doi.org/10.1049/cps2.12097","url":null,"abstract":"<p>Power systems are facing an increasing number of cyber incidents, potentially leading to damaging consequences to both physical and cyber aspects. However, the development of analytical methods for the study of large-scale power infrastructures as cyber-physical systems is still in its early stages. Drawing inspiration from machine-learning techniques, the authors introduce a method inspired by the principles of graph embedding that is tailored for quantitative risk assessment and the exploration of possible mitigation strategies of large-scale cyber-physical power systems. The primary advantage of the graph embedding approach lies in its ability to generate numerous random walks on a graph, simulating potential access paths. Meanwhile, it enables capturing high-dimensional structures in low-dimensional spaces, facilitating advanced machine-learning applications, and ensuring scalability and adaptability for comprehensive network analysis. By employing this graph embedding-based approach, the authors present a structured and methodical framework for risk assessment in cyber-physical systems. The proposed graph embedding-based risk analysis framework aims to provide a more insightful perspective on cyber-physical risk assessment and situation awareness for power systems. To validate and demonstrate its applicability, the method has been tested on two cyber-physical power system models: the <i>Western System Coordinating Council (WSCC) 9-Bus System</i> and the <i>Illinois 200-Bus System</i>, thereby showing its advantages in enhancing the accuracy of risk analysis and comprehensiveness of situational awareness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"435-453"},"PeriodicalIF":1.7,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhicong Sun, Guang Chen, Yulong Ding, Shuang-Hua Yang
{"title":"Joint safety and security risk analysis in industrial cyber-physical systems: A survey","authors":"Zhicong Sun, Guang Chen, Yulong Ding, Shuang-Hua Yang","doi":"10.1049/cps2.12095","DOIUrl":"10.1049/cps2.12095","url":null,"abstract":"<p>Industrial Cyber-Physical Systems (iCPSs) represent a new generation of industrial systems that enable a profound integration of industrial processes and informational spaces, thereby empowering the fourth industrial revolution. iCPSs confront more severe safety and security (S&S) challenges compared to traditional industrial systems. One of the most critical challenges is the joint risk analysis of S&S. Many scholars have devoted their research to this area. However, there is a dearth of literature reviews encapsulating recent advancements, which provides the motivation for this study. The authors review the methodologies in this field, delve into the S&S relationships involved, and propose 12 criteria for evaluating these methods. Furthermore, the current research limitations were analysed and potential directions were suggested for future research.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"334-349"},"PeriodicalIF":1.7,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141343900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience quantification model for cyber-physical power systems","authors":"Mohammad AlMuhaini","doi":"10.1049/cps2.12098","DOIUrl":"10.1049/cps2.12098","url":null,"abstract":"<p>As power grids develop, their structure becomes more complex, multi-dimensional, and digitalised—hence, it is referred to as cyber-physical infrastructure. The sensitivity of grids to extreme cyber and physical events is becoming a hot research topic due to the increasing rate of such events and their catastrophic consequences. To produce accurate and comprehensive measures, modelling and assessing the resilience of power systems must include both the physical and cyber domains. However, resilience quantification models that include both domains have not received sufficient attention. A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. A resilience index is also proposed to measure the resilience levels of local nodes and entire systems, including various factors that contribute to the modelled degradation states. Severe weather conditions were modelled to examine the impact of this category of events on the proposed resilience model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"454-462"},"PeriodicalIF":1.7,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141338829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical system model based on multi-agent system","authors":"Maqbol Ahmed, Okba Kazar, Saad Harous","doi":"10.1049/cps2.12096","DOIUrl":"10.1049/cps2.12096","url":null,"abstract":"<p>Integrating physical processes with computational components creates cyber-physical systems (CPS) that seamlessly interact between the physical and digital worlds. The cyber-physical system has become an interesting research area and an attractive application domain, especially in industry based on the big advantages of this new paradigm. All companies are trying to use this model to control the real industry sector by integrating the cyber system. Many solutions were proposed however, they were not entirely satisfactory. This research proposes a novel CPS model based on Multi-Agent Systems (MAS). This model takes advantage of MAS's collaborative and distributed nature to improve CPS's performance and functionality. Therefore, this model offers a flexible and scalable approach to the development and management of intricate, and interwoven CPSs. The research focuses on developing a CPS model, that encompasses nine layers: the physical agent, security agent, computation agent, decision-making agent, control agent, communication agent, resilience agent, maintenance agent, and application agent layer. The MAS framework is employed to overcome the challenges associated with CPS design, such as coordination, dependability, maintainability, robustness, security, control etc. The results of this exploration are significant in their contribution to the advancement of CPS modelling by utilising Multi-Agent Systems.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"424-434"},"PeriodicalIF":1.7,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141352489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng
{"title":"Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing","authors":"Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng","doi":"10.1049/cps2.12094","DOIUrl":"https://doi.org/10.1049/cps2.12094","url":null,"abstract":"<p>Despite the substantial advancements in health technology, the COVID-19 pandemic has underscored the imperative of enhancing the resilience and efficiency of healthcare systems. Within this context, the Internet of Things (IoT) paradigm emerges as highly pertinent in healthcare services, facilitating enriched doctor-patient interaction while concurrently ameliorating healthcare expenditures. Wearable devices provide patients with personalised access to health-related data, empower physicians with more effective health monitoring capabilities, and enable hospitals to oversee medical equipment, personnel, and infection transmission dynamics. IoT devices, functioning as data aggregators, accumulate extensive datasets, furnishing valuable insights that augment decision-making prowess within healthcare settings. However, the exponential proliferation of IoT devices poses formidable challenges in processing this voluminous and diverse data and extracting actionable insights. Amid the manifold benefits of IoT integration in healthcare services, several hurdles persist, including paramount data security and privacy concerns. Real-time data transmission from IoT devices amplifies these concerns, compounding issues related to data overload and potential inaccuracies. This special issue endeavours to disseminate the latest advancements in IoT within healthcare services. The principal objective is to empower researchers to delve into key concepts conducive to IoT's practical, feasible, and robust integration in healthcare delivery, thereby ensuring expeditious, end-to-end, and dependable service provision to patients.</p><p>In this Special Issue, our attention has been directed towards a spectrum of topics of scientific interest, encompassing artificial intelligence and IoT-based healthcare methodologies tailored for pandemic disease management, the synergy between Cloud computing and IoT-based healthcare infrastructures, the intricacies of IoT-based healthcare networks, the application of IoT for personalised health monitoring, the utilisation of IoT for disease diagnosis, and related domains. This special issue aims to showcase the latest research in IoT-based health monitoring systems and estimated computing. The papers presented here will provide valuable insights and contribute to the ongoing efforts to mitigate the impact of pandemics on public health.</p><p>The papers selected for this Special Issue collectively demonstrate the progressive advancement of scientific inquiry into solutions for IoT-based Secure Health Monitoring and Tracking through Estimated Computing. The pursuit of synergy among disciplines such as Artificial Intelligence, IoT, and Cloud Computing to develop diagnostic systems for diseases and personalised health monitoring stands poised to emerge as a paramount ambition within the scientific community dedicated to advancing societal well-being and health. Thus, the overall submissions were of high quality, which marks the success ","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"99-101"},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141304297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri
{"title":"A survey on detection and localisation of false data injection attacks in smart grids","authors":"Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri","doi":"10.1049/cps2.12093","DOIUrl":"https://doi.org/10.1049/cps2.12093","url":null,"abstract":"<p>In the recent years, cyberattacks to smart grids are becoming more frequent. Among the many malicious activities that can be launched against smart grids, the False Data Injection (FDI) attacks have raised significant concerns from both academia and industry. FDI attacks can affect the (internal) state estimation process—critical for smart grid monitoring and control—thus being able to bypass conventional Bad Data Detection (BDD) methods. Hence, prompt detection and precise localisation of FDI attacks are becoming of paramount importance to ensure smart grids security and safety. Several papers recently started to study and analyse this topic from different perspectives and address existing challenges. Data-driven techniques and mathematical modelling are the major ingredients of the proposed approaches. The primary objective is to provide a systematic review and insights into FDI attacks joint detection and localisation approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localisation aspects. For this purpose, more than 40 major research contributions were selected and inspected, while conducting a detailed analysis of the methodology and objectives in relation to the FDI attacks detection and localisation. Key findings of the identified papers were provided according to different criteria, such as employed FDI attacks localisation techniques, utilised evaluation scenarios, investigated FDI attack types, application scenarios, adopted methodologies and the use of additional data. Finally, open issues and future research directions were discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"313-333"},"PeriodicalIF":1.7,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó
{"title":"Cyber-physical-based welding systems: Components and implementation strategies","authors":"József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó","doi":"10.1049/cps2.12092","DOIUrl":"10.1049/cps2.12092","url":null,"abstract":"<p>The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"293-312"},"PeriodicalIF":1.7,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"135-149"},"PeriodicalIF":1.5,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}