A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems

被引:26
作者
Addeen, Hajar Hameed [1 ]
Xiao, Yang [1 ]
Li, Jiacheng [1 ]
Guizani, Mohsen [2 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Qatar Univ QU, Dept Comp Sci & Engn, Doha, Qatar
关键词
Sensors; Water resources; Intelligent sensors; Security; Sensor systems; Water conservation; SCADA systems; Cyber-physical attacks; artificial intelligence; water distribution systems; smart water; sensors; Internet of Things; SCADA COMMUNICATION;
D O I
10.1109/ACCESS.2021.3095713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, the limitations of these technologies introduce cyber-physical attacks to the WDS. The main goals of cyber-physical attacks include disrupting normal operations and tampering the critical data, which have negative impacts on the WDS. Therefore, it is vital to develop and implement solutions to increase the security of the WDS by detecting and mitigating cyber-physical attacks. Since security for WDS is relatively new, there are no surveys on this topic despite its vital importance. Therefore, in this paper, we provide a comprehensive survey for the common cyber-physical attacks and common detection mechanisms for the WDS. We compare the attacks and detection methods with emphasis on ideas, methods, evaluation results, advantages, limitations, etc. We further provide a future research direction. We realize that there are still not many research attempts in this area and we hope that this work can trigger more research activities related to the WDS.
引用
收藏
页码:99905 / 99921
页数:17
相关论文
共 47 条
[1]   Real-Time Identification of Cyber-Physical Attacks on Water Distribution Systems via Machine Learning-Based Anomaly Detection Techniques [J].
Abokifa, Ahmed A. ;
Haddad, Kelsey ;
Lo, Cynthia ;
Biswas, Pratim .
JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2019, 145 (01)
[2]  
Abokifa AA, 2017, WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, P676
[3]  
Abrams M, 2008, MITRE CORP US WWW MI
[4]   WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Prakash, Jay ;
Mathur, Aditya .
2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, :341-347
[5]  
Ahmed C. M., 2017, P 3 INT WORKSH CYB P, P25, DOI 10.1145/3055366.3055375
[6]  
Ali A., Restricted Boltzmann Machine
[7]   Monitoring system reaction in cyber-physical testbed under cyber-attacks [J].
Bernieri, Giuseppe ;
Miciolino, Estefania Etcheves ;
Pascucci, Federica ;
Setola, Roberto .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :86-98
[8]   Passive Inference of Attacks on SCADA Communication Protocols [J].
Bou-Harb, Elias .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, :62-67
[9]  
Chandy SE, 2017, WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, P611
[10]   Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun ;
Adepu, Sridhar ;
Zhang, Fan .
34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, :962-973