{"title":"Resilience quantification model for cyber-physical power systems","authors":"Mohammad AlMuhaini","doi":"10.1049/cps2.12098","DOIUrl":"10.1049/cps2.12098","url":null,"abstract":"<p>As power grids develop, their structure becomes more complex, multi-dimensional, and digitalised—hence, it is referred to as cyber-physical infrastructure. The sensitivity of grids to extreme cyber and physical events is becoming a hot research topic due to the increasing rate of such events and their catastrophic consequences. To produce accurate and comprehensive measures, modelling and assessing the resilience of power systems must include both the physical and cyber domains. However, resilience quantification models that include both domains have not received sufficient attention. A novel resilience model and quantification framework are proposed. The model is based on a resilience trapezoid that depicts the different phases of the cyber and physical domains during severe natural or anthropogenic events. A resilience index is also proposed to measure the resilience levels of local nodes and entire systems, including various factors that contribute to the modelled degradation states. Severe weather conditions were modelled to examine the impact of this category of events on the proposed resilience model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"454-462"},"PeriodicalIF":1.7,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141338829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical system model based on multi-agent system","authors":"Maqbol Ahmed, Okba Kazar, Saad Harous","doi":"10.1049/cps2.12096","DOIUrl":"10.1049/cps2.12096","url":null,"abstract":"<p>Integrating physical processes with computational components creates cyber-physical systems (CPS) that seamlessly interact between the physical and digital worlds. The cyber-physical system has become an interesting research area and an attractive application domain, especially in industry based on the big advantages of this new paradigm. All companies are trying to use this model to control the real industry sector by integrating the cyber system. Many solutions were proposed however, they were not entirely satisfactory. This research proposes a novel CPS model based on Multi-Agent Systems (MAS). This model takes advantage of MAS's collaborative and distributed nature to improve CPS's performance and functionality. Therefore, this model offers a flexible and scalable approach to the development and management of intricate, and interwoven CPSs. The research focuses on developing a CPS model, that encompasses nine layers: the physical agent, security agent, computation agent, decision-making agent, control agent, communication agent, resilience agent, maintenance agent, and application agent layer. The MAS framework is employed to overcome the challenges associated with CPS design, such as coordination, dependability, maintainability, robustness, security, control etc. The results of this exploration are significant in their contribution to the advancement of CPS modelling by utilising Multi-Agent Systems.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"424-434"},"PeriodicalIF":1.7,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141352489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng
{"title":"Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing","authors":"Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng","doi":"10.1049/cps2.12094","DOIUrl":"https://doi.org/10.1049/cps2.12094","url":null,"abstract":"<p>Despite the substantial advancements in health technology, the COVID-19 pandemic has underscored the imperative of enhancing the resilience and efficiency of healthcare systems. Within this context, the Internet of Things (IoT) paradigm emerges as highly pertinent in healthcare services, facilitating enriched doctor-patient interaction while concurrently ameliorating healthcare expenditures. Wearable devices provide patients with personalised access to health-related data, empower physicians with more effective health monitoring capabilities, and enable hospitals to oversee medical equipment, personnel, and infection transmission dynamics. IoT devices, functioning as data aggregators, accumulate extensive datasets, furnishing valuable insights that augment decision-making prowess within healthcare settings. However, the exponential proliferation of IoT devices poses formidable challenges in processing this voluminous and diverse data and extracting actionable insights. Amid the manifold benefits of IoT integration in healthcare services, several hurdles persist, including paramount data security and privacy concerns. Real-time data transmission from IoT devices amplifies these concerns, compounding issues related to data overload and potential inaccuracies. This special issue endeavours to disseminate the latest advancements in IoT within healthcare services. The principal objective is to empower researchers to delve into key concepts conducive to IoT's practical, feasible, and robust integration in healthcare delivery, thereby ensuring expeditious, end-to-end, and dependable service provision to patients.</p><p>In this Special Issue, our attention has been directed towards a spectrum of topics of scientific interest, encompassing artificial intelligence and IoT-based healthcare methodologies tailored for pandemic disease management, the synergy between Cloud computing and IoT-based healthcare infrastructures, the intricacies of IoT-based healthcare networks, the application of IoT for personalised health monitoring, the utilisation of IoT for disease diagnosis, and related domains. This special issue aims to showcase the latest research in IoT-based health monitoring systems and estimated computing. The papers presented here will provide valuable insights and contribute to the ongoing efforts to mitigate the impact of pandemics on public health.</p><p>The papers selected for this Special Issue collectively demonstrate the progressive advancement of scientific inquiry into solutions for IoT-based Secure Health Monitoring and Tracking through Estimated Computing. The pursuit of synergy among disciplines such as Artificial Intelligence, IoT, and Cloud Computing to develop diagnostic systems for diseases and personalised health monitoring stands poised to emerge as a paramount ambition within the scientific community dedicated to advancing societal well-being and health. Thus, the overall submissions were of high quality, which marks the success ","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"99-101"},"PeriodicalIF":1.5,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141304297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri
{"title":"A survey on detection and localisation of false data injection attacks in smart grids","authors":"Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri","doi":"10.1049/cps2.12093","DOIUrl":"https://doi.org/10.1049/cps2.12093","url":null,"abstract":"<p>In the recent years, cyberattacks to smart grids are becoming more frequent. Among the many malicious activities that can be launched against smart grids, the False Data Injection (FDI) attacks have raised significant concerns from both academia and industry. FDI attacks can affect the (internal) state estimation process—critical for smart grid monitoring and control—thus being able to bypass conventional Bad Data Detection (BDD) methods. Hence, prompt detection and precise localisation of FDI attacks are becoming of paramount importance to ensure smart grids security and safety. Several papers recently started to study and analyse this topic from different perspectives and address existing challenges. Data-driven techniques and mathematical modelling are the major ingredients of the proposed approaches. The primary objective is to provide a systematic review and insights into FDI attacks joint detection and localisation approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localisation aspects. For this purpose, more than 40 major research contributions were selected and inspected, while conducting a detailed analysis of the methodology and objectives in relation to the FDI attacks detection and localisation. Key findings of the identified papers were provided according to different criteria, such as employed FDI attacks localisation techniques, utilised evaluation scenarios, investigated FDI attack types, application scenarios, adopted methodologies and the use of additional data. Finally, open issues and future research directions were discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"313-333"},"PeriodicalIF":1.7,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó
{"title":"Cyber-physical-based welding systems: Components and implementation strategies","authors":"József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó","doi":"10.1049/cps2.12092","DOIUrl":"10.1049/cps2.12092","url":null,"abstract":"<p>The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"293-312"},"PeriodicalIF":1.7,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"135-149"},"PeriodicalIF":1.5,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A machine learning model for Alzheimer's disease prediction","authors":"Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi","doi":"10.1049/cps2.12090","DOIUrl":"10.1049/cps2.12090","url":null,"abstract":"<p>Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"125-134"},"PeriodicalIF":1.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the Internet of Medical Things with ECG-based PUF encryption","authors":"Biagio Boi, Christian Esposito","doi":"10.1049/cps2.12089","DOIUrl":"10.1049/cps2.12089","url":null,"abstract":"<p>The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"115-124"},"PeriodicalIF":1.5,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks","authors":"Mohsen Moradi, Amir Hossein Jahangir","doi":"10.1049/cps2.12088","DOIUrl":"10.1049/cps2.12088","url":null,"abstract":"<p>Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"407-423"},"PeriodicalIF":1.7,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140426605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes
{"title":"Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation","authors":"Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes","doi":"10.1049/cps2.12087","DOIUrl":"10.1049/cps2.12087","url":null,"abstract":"<p>Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"392-406"},"PeriodicalIF":1.7,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139960393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}