Monitoring and Defense of Industrial Cyber-Physical Systems Under Typical Attacks: From a Systems and Control Perspective

被引:31
作者
Jiang, Yuchen [1 ]
Wu, Shimeng [1 ]
Ma, Renjie [1 ]
Liu, Ming [1 ]
Luo, Hao [1 ]
Kaynak, Okyay [2 ,3 ]
机构
[1] Harbin Inst Technol, Harbin 150001, Peoples R China
[2] Bogazici Univ, Turkish Acad Sci, TR-34342 Istanbul, Turkiye
[3] King Abdulaziz Univ, Jeddah 21589, Saudi Arabia
来源
IEEE TRANSACTIONS ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS | 2023年 / 1卷
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Security; Control systems; Safety; Monitoring; Cyber-physical systems; Cyberattack; Aerospace electronics; Attack defense; attack detection; industrial cyber-physical systems; industrial safety and security; DATA-INJECTION ATTACKS; FALSE-DATA INJECTION; CYBERPHYSICAL SYSTEMS; STATE ESTIMATION; REPLAY ATTACKS; SECURITY; DETECTABILITY; PROTECTION;
D O I
10.1109/TICPS.2023.3317237
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the new industrial environment, the safe and reliable operation of Industrial Cyber-Physical Systems (ICPSs) is being threatened by new types of attacks: Attackers carefully tamper with the measurement and control data transmitted over the network, causing the controlled systems to behave abnormally. The essence of such threats is operational safety issues induced by information security issues, which need to be studied at the bottom monitoring and control layer of the system. Studying safety and security monitoring, as well as defense strategies against these attacks, is of paramount importance. The primary objective of this article is to offer readers a timely survey that sheds light on the current status of safety and security issues in ICPSs. A comprehensive comparison is conducted with existing approaches and relevant literature, focusing on a systems and control perspective. Specifically, we emphasize the concept of cyber-physical attacks by contrasting them with conventional cyberattacks. A summary of real-world instances of typical cyber-physical attacks is provided to illustrate their significance. In terms of methodology, we conduct a thorough review of attack principles, attack detection, and evaluation approaches, as well as defense schemes. During this process, we carefully compare the pros and cons of different detection methods. It is further elaborated that the information asymmetry between the offensive and defensive parties is the booster of the integrated design of industrial safety and security. Looking ahead, we identify and summarize fourteen open questions that warrant further research.
引用
收藏
页码:192 / 207
页数:16
相关论文
共 84 条
[1]   Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Mazinani, Sayyed Majid ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) :7287-7294
[2]  
Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
[3]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[4]   Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (03) :827-838
[5]  
[Anonymous], 2017, The white paper on cyber-physical systems
[6]  
[Anonymous], 2020, Guidelines for the construction of cyber-physical systems
[7]   Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid [J].
Ashok, Aditya ;
Govindarasu, Manimaran ;
Wang, Jianhui .
PROCEEDINGS OF THE IEEE, 2017, 105 (07) :1389-1407
[8]   A moving target defence approach for detecting deception attacks on cyber-physical systems [J].
Babadi, Narges ;
Doustmohammadi, Ali .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
[9]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[10]  
Barboni A, 2019, IEEE DECIS CONTR P, P5623, DOI 10.1109/CDC40024.2019.9030237