Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems
Keywords:
Centralized detection, cyber-attacks, cyberphysical systems, distributed detection, false data injection attack.Abstract
In recent years, Cyber-Physical Systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication networks makes CPSs vulnerable to intentional cyber-attacks. Therefore, a great number of attack detection methods have been proposed to enforce security of CPSs. In this paper, various false data injection attack detection methods presented for CPSs are investigated and reviewed. According to the knowledge of control information, the controllers of CPSs are categorized as centralized and distributed controllers. Existing centralized attack detection approaches are discussed in terms of (i) linear time-invariant systems, (ii) actuator and sensor attacks, (iii) nonlinear systems and (iv) systems with noise. Furthermore, the development of distributed attack detection is reviewed according to different decoupling methods. Some challenges and future research directions in the context of attack detection approaches are provided.
References
- S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system security for the electric power grid,” Proceedings of the IEEE, vol.100, no. 1, pp. 210–224, 2011.
- C. Murguia, N. van de Wouw, and J. Ruths, “Reachable sets of hidden cps sensor attacks: Analysis and synthesis tools,” IFAC-PapersOnLine,vol. 50, no. 1, pp. 2088–2094, 2017.
- H. Chen, “Applications of cyber-physical system: a literature review,”Journal of Industrial Integration and Management, vol. 2, no. 03, p.1750012, 2017.
- Y. Lu, “Cyber physical system (cps)-based industry 4.0: a survey,”Journal of Industrial Integration and Management, vol. 2, no. 03, p.1750014, 2017.
- S. K. Khaitan and J. D. McCalley, “Design techniques and applications of cyberphysical systems: A survey,” IEEE Systems Journal, vol. 9, no. 2, pp. 350–365, 2014.
- R. Atat, L. Liu, H. Chen, J. Wu, H. Li, and Y. Yi, “Enabling cyberphysical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security,” IET Cyber-Physical Systems: Theory & Applications, vol. 2, no. 1, pp. 49–54, 2017.
- J. Wu, S. Guo, H. Huang, W. Liu, and Y. Xiang, “Information and communications technologies for sustainable development goals: stateof-the-art, needs and perspectives,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2389–2406, 2018.
- R. Atat, L. Liu, J. Wu, G. Li, C. Ye, and Y. Yang, “Big data meet cyber-physical systems: A panoramic survey,” IEEE Access, vol. 6, pp.73 603–73 636, 2018.
- E. A. Lee, “Cyber physical systems: Design challenges,” in 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC). IEEE, 2008, pp. 363–369.
- C. Peng, H. Sun, M. Yang, and Y.-L. Wang, “A survey on security communication and control for smart grids under malicious cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems,2019.
- M. S. Mahmoud, M. M. Hamdan, and U. A. Baroudi, “Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges,” Neurocomputing, 2019.
- H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Transactions on Automatic control, vol. 59, no. 6, pp. 1454–1467, 2014.
- A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica,vol. 51, pp. 135–148, 2015.
- A. Teixeira, D. Perez, H. Sandberg, and K. H. Johansson, “Attack ´models and scenarios for networked control systems,” in Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, 2012, pp. 55–64.
- H. Fawzi, P. Tabuada, and S. Diggavi, “Security for control systems under sensor and actuator attacks,” in 2012 IEEE 51st IEEE Conference on Decision and Control (CDC). IEEE, 2012, pp. 3412–3417.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.