Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems

Authors

  • Bhaludra R Nadh Singh  Professor, Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Nallan Chakravarthula Sai Vyuha  Student, Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Mariyala Roshini  Student, Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India

Keywords:

Centralized detection, cyber-attacks, cyberphysical systems, distributed detection, false data injection attack.

Abstract

In recent years, Cyber-Physical Systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication networks makes CPSs vulnerable to intentional cyber-attacks. Therefore, a great number of attack detection methods have been proposed to enforce security of CPSs. In this paper, various false data injection attack detection methods presented for CPSs are investigated and reviewed. According to the knowledge of control information, the controllers of CPSs are categorized as centralized and distributed controllers. Existing centralized attack detection approaches are discussed in terms of (i) linear time-invariant systems, (ii) actuator and sensor attacks, (iii) nonlinear systems and (iv) systems with noise. Furthermore, the development of distributed attack detection is reviewed according to different decoupling methods. Some challenges and future research directions in the context of attack detection approaches are provided.

References

  1. S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system security for the electric power grid,” Proceedings of the IEEE, vol.100, no. 1, pp. 210–224, 2011.
  2. C. Murguia, N. van de Wouw, and J. Ruths, “Reachable sets of hidden cps sensor attacks: Analysis and synthesis tools,” IFAC-PapersOnLine,vol. 50, no. 1, pp. 2088–2094, 2017.
  3. H. Chen, “Applications of cyber-physical system: a literature review,”Journal of Industrial Integration and Management, vol. 2, no. 03, p.1750012, 2017.
  4. Y. Lu, “Cyber physical system (cps)-based industry 4.0: a survey,”Journal of Industrial Integration and Management, vol. 2, no. 03, p.1750014, 2017.
  5. S. K. Khaitan and J. D. McCalley, “Design techniques and applications of cyberphysical systems: A survey,” IEEE Systems Journal, vol. 9, no. 2, pp. 350–365, 2014.
  6. R. Atat, L. Liu, H. Chen, J. Wu, H. Li, and Y. Yi, “Enabling cyberphysical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security,” IET Cyber-Physical Systems: Theory & Applications, vol. 2, no. 1, pp. 49–54, 2017.
  7. J. Wu, S. Guo, H. Huang, W. Liu, and Y. Xiang, “Information and communications technologies for sustainable development goals: stateof-the-art, needs and perspectives,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2389–2406, 2018.
  8. R. Atat, L. Liu, J. Wu, G. Li, C. Ye, and Y. Yang, “Big data meet cyber-physical systems: A panoramic survey,” IEEE Access, vol. 6, pp.73 603–73 636, 2018.
  9. E. A. Lee, “Cyber physical systems: Design challenges,” in 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC). IEEE, 2008, pp. 363–369.
  10. C. Peng, H. Sun, M. Yang, and Y.-L. Wang, “A survey on security communication and control for smart grids under malicious cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems,2019.
  11. M. S. Mahmoud, M. M. Hamdan, and U. A. Baroudi, “Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges,” Neurocomputing, 2019.
  12. H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Transactions on Automatic control, vol. 59, no. 6, pp. 1454–1467, 2014.
  13. A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica,vol. 51, pp. 135–148, 2015.
  14. A. Teixeira, D. Perez, H. Sandberg, and K. H. Johansson, “Attack ´models and scenarios for networked control systems,” in Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, 2012, pp. 55–64.
  15. H. Fawzi, P. Tabuada, and S. Diggavi, “Security for control systems under sensor and actuator attacks,” in 2012 IEEE 51st IEEE Conference on Decision and Control (CDC). IEEE, 2012, pp. 3412–3417.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
Bhaludra R Nadh Singh, Nallan Chakravarthula Sai Vyuha, Mariyala Roshini "Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 3, pp.643-649, May-June-2023.