A survey on security of cyber-physical systems under network attacks

被引:0
作者
Ye D. [1 ,2 ]
Jin K.-J. [1 ]
Zhang T.-Y. [1 ]
机构
[1] College of Information Science and Engineering, Northeastern University, Shenyang
[2] State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang
来源
Kongzhi yu Juece/Control and Decision | 2023年 / 38卷 / 08期
关键词
attack detection; cyber-physical systems; network attacks; secure control; secure state estimation;
D O I
10.13195/j.kzyjc.2023.0386
中图分类号
学科分类号
摘要
With the wide application in modern industry and manufacturing, the security of cyber-physical systems has gradually become an important factor to ensure the healthy development of society, and has received extensive attention from scholars. Due to the deep integration of physical devices and communication networks within cyber-physical systems, the threat of network attacks on system security is becoming increasingly prominent. In this paper, we first summarize the characteristics of various network attacks from the attacker’s perspective, and reveal the vulnerability of systems under different attacks. Secondly, in view of the characteristics of different network attacks, the secure state estimation, attack detection and secure control of cyber-physical systems are introduced from the defender’s perspective, and the main application scenarios and advantages of each defense strategy are presented. Finally, the major challenges for the study of cyber-physical system security are proposed. © 2023 Northeast University. All rights reserved.
引用
收藏
页码:2243 / 2252
页数:9
相关论文
共 88 条
[1]  
Li R F, Xie Y, Li R, Et al., Survey of cyber-physical systems, Journal of Computer Research and Development, 49, 6, pp. 1149-1161, (2012)
[2]  
Zhang S Q, Che W W, Deng C., Observer-based event-triggered control for linear MASs under a directed graph and DoS attacks, Journal of Control and Decision, 9, 3, pp. 384-396, (2022)
[3]  
Sun Z W, Zhang Y Q., Research on attack modeling of industrial cyber physical systems, Control and Decision, 34, 11, pp. 2323-2329, (2019)
[4]  
Xia Y Q, Yan C, Wang X J, Et al., Intelligent transportation cyber-physical cloud control systems, Acta Automatica Sinica, 45, 1, pp. 132-142, (2019)
[5]  
Ding D R, Han Q L, Wang Z D, Et al., A survey on model-based distributed control and filtering for industrial cyber-physical systems, IEEE Transactions on Industrial Informatics, 15, 5, pp. 2483-2499, (2019)
[6]  
Zhou C J, Hu B W, Shi Y, Et al., A unified architectural approach for cyberattack-resilient industrial control systems, Proceedings of the IEEE, 109, 4, pp. 517-541, (2021)
[7]  
Svetlana K., SQL slammer worm lessons learned for consideration by the electricity sector, North American Electric Reliability Council, 1, 2, (2003)
[8]  
Farwell J P, Rohozinski R., Stuxnet and the future of cyber war, Survival, 53, 1, pp. 23-40, (2011)
[9]  
Yang H J, Ye D., Observer-based fixed-time secure tracking consensus for networked high-order multiagent systems against DoS attacks, IEEE Transactions on Cybernetics, 52, 4, pp. 2018-2031, (2022)
[10]  
Zhang H, Cheng P, Shi L, Et al., Optimal denial-of-service attack scheduling with energy constraint, IEEE Transactions on Automatic Control, 60, 11, pp. 3023-3028, (2015)