Emanuele Bellini , Giuseppe D’Aniello , Francesco Flammini , Rosario Gaeta
{"title":"Situation Awareness for Cyber Resilience: A review","authors":"Emanuele Bellini , Giuseppe D’Aniello , Francesco Flammini , Rosario Gaeta","doi":"10.1016/j.ijcip.2025.100755","DOIUrl":"10.1016/j.ijcip.2025.100755","url":null,"abstract":"<div><div>Cyber resilience is increasingly crucial in critical infrastructure protection. Central to achieving cyber resilience is Situation Awareness (SA), the comprehension of the current state of cyber environments, and the ability to anticipate future developments. This paper reviews the intersection of cyber resilience and SA, highlighting the most important features of SA to address the resilience objectives in cyber–physical systems. The survey synthesizes recent research findings, highlights trends, and offers insights into its importance across various domains. By synthesizing diverse perspectives and recent developments in the field, this survey serves as a valuable resource for researchers, practitioners, and policymakers engaged in cyber resilience and SA operations, providing a foundation for further research and practical implementations in the field.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100755"},"PeriodicalIF":4.1,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143563168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interdependencies and third parties","authors":"Roberto Setola","doi":"10.1016/S1874-5482(25)00011-3","DOIUrl":"10.1016/S1874-5482(25)00011-3","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100750"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143508441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamad Naeem , Farhan Ullah , Ondrej Krejcar , Deguang Li , Danish Vasan
{"title":"Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization","authors":"Hamad Naeem , Farhan Ullah , Ondrej Krejcar , Deguang Li , Danish Vasan","doi":"10.1016/j.ijcip.2025.100745","DOIUrl":"10.1016/j.ijcip.2025.100745","url":null,"abstract":"<div><div>An extension of the Internet of Things (IoT) paradigm, the Internet of Vehicles (IoV) makes it easier for smart cars to connect to the Internet and communicate with one another. Consumer interest in IoV technology has grown significantly as a result of the increased capabilities of smart vehicles. However, the rapid growth of IoV raises serious privacy and security issues that can lead to dangerous accidents. To detect intrusions into IoT networks, several academics have developed deep learning-based algorithms. Detecting malicious assaults inside vehicle networks and lowering the frequency of smart vehicle accidents are the goals of these models. The proposed approach makes use of an advanced three-layer design that combines ensemble approaches, Genetic Algorithms (GA), and Convolutional Neural Networks (CNNs). Three essential steps are used to execute this methodology: In order to perform CNN-based analysis, we first convert high-level IoV data into image format. The hyperparameters of each base learning model are then optimized via GA, which improves the performance and adaptability of the models. Lastly, we combine the outputs of the three CNN models using ensemble approaches, which greatly improves the intrusion detection system’s (IDS) long-term robustness. Two data sets were used for the evaluations: the CICEVSE dataset, which contains 22,086 samples from 12 distinct intrusion categories, and the publicly accessible Car Hacking dataset, which contains 29,228 samples from five different intrusion categories. According to the experimental findings, the proposed strategy obtained an optimal score of 100% on the Car Hacking images and 93% on the CICEVSE images, demonstrating excellent accuracy. The findings have substantial implications for the development of safe, effective, and flexible intrusion detection systems in the complicated environment of the Internet of Vehicles.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100745"},"PeriodicalIF":4.1,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143534114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency","authors":"Vladislav Semenyuk , Ildar Kurmashev , Alberto Lupidi , Dmitriy Alyoshin , Liliya Kurmasheva , Alessandro Cantelli-Forti","doi":"10.1016/j.ijcip.2025.100744","DOIUrl":"10.1016/j.ijcip.2025.100744","url":null,"abstract":"<div><div>This review critically examines the progress in unmanned aerial vehicle (UAV) detection and classification technologies from 2020 to the present. It highlights a range of detection methods, including radar, radio frequency (RF), optical, and acoustic sensors, with particular emphasis on the integration of these technologies through advanced sensor fusion techniques. The paper explores the core technologies driving improvements in detection accuracy, range, and reliability, with a special focus on the transformative role of artificial intelligence and machine learning. These innovations have significantly enhanced system performance, enabling more precise and efficient UAV detection. The review concludes with insights into emerging trends and future developments that promise to further refine UAV detection technologies, ensuring greater security and operational reliability.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100744"},"PeriodicalIF":4.1,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure","authors":"Zhuoqun Xia , Hongmei Zhou , Zhenzhen Hu , Qisheng Jiang , Kaixin Zhou","doi":"10.1016/j.ijcip.2025.100742","DOIUrl":"10.1016/j.ijcip.2025.100742","url":null,"abstract":"<div><div>The emergence of smart grid brings great convenience to users and power companies, but also brings many new problems, among which the most prominent one is network attack security. Although federated learning works well in dealing with smart grid network attacks, it suffers from gradient leakage, client node failure and a single type of training model. Therefore, this paper proposes a semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure (AMI). First, we design a hierarchical federated learning framework based on chained secure multiparty computing, which allows concentrators to collaboratively train models to protect local gradients. Second, we adapt the framework to the AMI network structure characteristics, and design a semi-asynchronous model distribution protocol. Finally, we build an ensemble model based on temporal convolutional network and gated recurrent unit (TCN-GRU) to detect AMI network attacks. The experimental results show that the proposed method can achieve 99.23% accuracy than existing methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100742"},"PeriodicalIF":4.1,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143464781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H M Imran Kays, Arif Mohaimin Sadri, K.K. "Muralee" Muraleetharan, P. Scott Harvey, Gerald A. Miller
{"title":"Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks","authors":"H M Imran Kays, Arif Mohaimin Sadri, K.K. \"Muralee\" Muraleetharan, P. Scott Harvey, Gerald A. Miller","doi":"10.1016/j.ijcip.2025.100741","DOIUrl":"10.1016/j.ijcip.2025.100741","url":null,"abstract":"<div><div>This study addresses the challenge of modeling flood propagation and cascading failures in geographically interdependent transportation and stormwater systems, filling a critical gap in the literature by effectively capturing the temporal progression and spatial distribution of failures in interdependent systems. We developed a contagion-based Susceptible-Exposed-Flooded-Recovered (SEFR) model to monitor flood propagation dynamics within these interconnected systems. We established a spatial interdependency threshold for transportation and stormwater systems using a multilayer network representation and incorporated the state-of-the-art Hydrologic Engineering Center's River Analysis System (HEC-RAS) to generate reliable flood data. The SEFR model combines the topological characteristics of the multilayer network with simulated flood data to accurately model the propagation of flood damage and cascading failures. Focusing on Norman, Oklahoma, we calibrated the SEFR model using the HEC-RAS 2D flood simulation data for a major precipitation event on July 27, 2021. Results demonstrate the SEFR model's ability to identify the spatiotemporal variations in flood propagation, highlighting critical infrastructure components at risk, including specific road segments and stormwater system elements vulnerable to cascading failures during flooding events. The findings provide new insights into interdependent system resilience and inform intervention strategies to mitigate adverse flooding impacts, enhancing the robustness of critical infrastructure against natural disasters.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100741"},"PeriodicalIF":4.1,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mustafa Sinasi Ayas , Enis Kara , Selen Ayas , Ali Kivanc Sahin
{"title":"OptAML: Optimized adversarial machine learning on water treatment and distribution systems","authors":"Mustafa Sinasi Ayas , Enis Kara , Selen Ayas , Ali Kivanc Sahin","doi":"10.1016/j.ijcip.2025.100740","DOIUrl":"10.1016/j.ijcip.2025.100740","url":null,"abstract":"<div><div>This research presents the optimized adversarial machine learning framework, OptAML, which is developed for use in water distribution and treatment systems. In consideration of the physical invariants of these systems, the OptAML generates adversarial samples capable of deceiving a hybrid convolutional neural network-long short-term memory network model. The efficacy of the framework is assessed using the Secure Water Treatment (SWaT) and Water Distribution (WADI) datasets. The findings demonstrate that OptAML is capable of effectively evading rule checkers and significantly reducing the accuracy of anomaly detection frameworks in both systems. Additionally, the study investigates a defense mechanism that demonstrates enhanced robustness against these adversarial attacks and is based on adversarial training. Our results underscore the necessity for robust and flexible protection tactics and highlight the shortcomings of the machine learning-based anomaly detection systems for critical infrastructure that are currently in place.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100740"},"PeriodicalIF":4.1,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Fu , Chengxi Yang , Yuxuan Liu , Kunsan Zhang , Jiaqi Li , Beibei Li
{"title":"Artificial immunity-based energy theft detection for advanced metering infrastructures","authors":"Jie Fu , Chengxi Yang , Yuxuan Liu , Kunsan Zhang , Jiaqi Li , Beibei Li","doi":"10.1016/j.ijcip.2025.100739","DOIUrl":"10.1016/j.ijcip.2025.100739","url":null,"abstract":"<div><div>Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and communication channels are usually weakly protected, often opening a huge door for data eavesdroppers who may be easily to further construct energy thefts. Although some energy theft detection schemes have already been reported in the literature, they often fail to take into account the dense data distribution characteristics of energy consumption data, resulting in compromised detection performance. To this end, we in this paper propose a novel ar<strong>T</strong>ificial <strong>IM</strong>mune based <strong>E</strong>nergy theft <strong>D</strong>etection (TIMED) scheme, which can effectively identify five types of energy thefts. Specifically, we first develop an energy consumption data pre-processing method, which can effectively reduce the dimensionality of raw energy consumption data to facilitate the data analyzing efficiency. Second, we design a center-distance-based energy theft detector generation method to create high-quality detectors with low elimination rates. Last, we devise a nonself-based hole repair method for energy theft detectors, which can further reduce the false negative alarms. Extensive experiments on a real public AMI dataset demonstrate that the proposed TIMED scheme is highly effective in identifying pulse attacks, scaling attacks, ramping attacks, random attacks, and smooth-curve attacks. The results show that TIMED outperforms many existing machine learning and traditional artificial immunity-based energy theft detection methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100739"},"PeriodicalIF":4.1,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheeja Rani S , Mostafa F. Shaaban , Abdelfatah Ali
{"title":"An efficient convolutional neural network based attack detection for smart grid in 5G-IOT","authors":"Sheeja Rani S , Mostafa F. Shaaban , Abdelfatah Ali","doi":"10.1016/j.ijcip.2024.100738","DOIUrl":"10.1016/j.ijcip.2024.100738","url":null,"abstract":"<div><div>The deployment of 5G networks and IoT devices in smart grid applications provides electricity-generated, distributed, and managed bidirectional transmission of real-time information between utility providers and consumers. However, this increased transmission and confidence in IoT devices also present novel security challenges, since they are vulnerable to malicious attacks. Ensuring robust attack detection mechanisms in 5G-IoT smart grid systems for reliable and efficient power distribution, and early accurate identification of attacks addressed. To solve these concerns, a novel technique called Target Projection Regressed Gradient Convolutional Neural Network (TPRGCNN) is introduced to improve the accuracy of attack detection during data transmission in a 5G-IoT smart grid environment. The TPRGCNN method is combined with feature selection and classification for improving secure data transmission by detecting attacks in 5G-IoT smart grid networks. In the feature selection process, TPRGCNN utilizes the Ruzicka coefficient Dichotonic projection regression method and aims to enhance the accuracy of attack detection while minimizing time complexity. Then selected significant features are fed into Jaspen’s correlative stochastic gradient convolutional neural learning classifier for attack detection. Classification indicates whether transmission is normal or an attack in the 5G-IoT smart grid network. The implementation results demonstrate that the proposed TPRGCNN method achieve a 5% of improved attack detection accuracy and 2% improvement in precision, recall, F-score while reducing time complexity and space complexity by 13% and 23% compared to conventional methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100738"},"PeriodicalIF":4.1,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mikaëla Ngamboé , Xiao Niu , Benoit Joly , Steven P. Biegler , Paul Berthier , Rémi Benito , Greg Rice , José M. Fernandez , Gabriela Nicolescu
{"title":"CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B","authors":"Mikaëla Ngamboé , Xiao Niu , Benoit Joly , Steven P. Biegler , Paul Berthier , Rémi Benito , Greg Rice , José M. Fernandez , Gabriela Nicolescu","doi":"10.1016/j.ijcip.2024.100728","DOIUrl":"10.1016/j.ijcip.2024.100728","url":null,"abstract":"<div><div>The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptographic solutions fully meet the backward compatibility and bandwidth preservation requirements of the standard. Hence, we propose the Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B (CABBA), an improved approach that integrates TESLA, phase-overlay modulation techniques and certificate-based PKI. As a result, entity authentication, data origin authentication, and data integrity are the security services that CABBA offers. To assess compliance with the standard, we designed an SDR-based implementation of CABBA and performed backward compatibility tests on commercial and general aviation (GA) ADS-B in receivers. Besides, we calculated the 1090ES band’s activity factor and analyzed the channel occupancy rate according to ITU-R SM.2256-1 recommendation. Also, we performed a bit error rate analysis of CABBA messages. The results suggest that CABBA is backward compatible, does not incur significant communication overhead, and has an error rate that is acceptable for Eb/No values above 14 dB.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100728"},"PeriodicalIF":4.1,"publicationDate":"2024-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}