Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

被引:2
|
作者
Zerdazi, I. [1 ,2 ]
Fezari, M. [1 ]
Ouziala, M. [2 ,3 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Elect, Lab Automat & Signals Annaba LASA, Annaba 23000, Algeria
[2] Lille Univ, Polytech Lille, Ctr Rech Informat Signal & Automat Lille CRIStAL, UMR CNRS 9189, F-59655 Villeneuve Dascq, France
[3] MHamed Bougara Boumerdes Univ, Fac Engn Sci, Lab Mech & Solid Syst LMSS, Boumerdes 30000, Algeria
关键词
SCADA; cyber-attacks; bond graph; deception attack; analytical redundancy relation;
D O I
10.3103/S0146411620020091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [21] Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks
    Stranahan, John
    Soni, Tapan
    Heydari, Vahid
    2019 IEEE SOUTHEASTCON, 2019,
  • [22] Modeling, Control and Analyze of Multi-Machine Drive Systems using Bond Graph Technique
    Belhadj, J.
    JOURNAL OF ELECTRICAL SYSTEMS, 2006, 2 (01) : 29 - 51
  • [23] Connectivity Preservation for Flocking Control of Multi-Agent Systems under Deception Attacks on Velocity
    Tran Quang Huy
    Liu, Yen-Chen
    IFAC PAPERSONLINE, 2023, 56 (02): : 10638 - +
  • [24] Adaptive finite-time control for cyber-physical systems with injection and deception attacks
    Sun, Haibin
    Cui, Yahui
    Hou, Linlin
    Shi, Kaibo
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 430
  • [25] Asynchronous output feedback control for fuzzy Markov jump systems with actuator faults and deception attacks
    Hu, Meng-Jie
    Cheng, Jun
    NONLINEAR DYNAMICS, 2024, 112 (22) : 20035 - 20045
  • [26] Resilient adaptive quantized control for nonlinear cyber-physical systems under deception attacks
    Jia, Xianglei
    Fu, Kaicheng
    Xiang, Chengdi
    Li, Jianning
    NONLINEAR DYNAMICS, 2025, 113 (02) : 1301 - 1314
  • [27] Privacy-preserving Average Consensus Control for Multi-agent Systems Under Deception Attacks
    Ying C.-D.
    Wu Y.-M.
    Xu M.
    Zheng N.
    He X.-X.
    Zidonghua Xuebao/Acta Automatica Sinica, 2023, 49 (02): : 425 - 436
  • [28] Event-triggered fault tolerant control for a class of state saturated systems subject to deception attacks
    Gao, Yi
    Li, Yunji
    Peng, Li
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2020, 42 (11) : 1935 - 1945
  • [29] Ultimate Boundedness Control for Networked Singularly Perturbed Systems With Deception Attacks: A Markovian Communication Protocol Approach
    Cheng, Jun
    Park, Ju H.
    Wu, Zheng-Guang
    Yan, Huaicheng
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (02): : 445 - 456
  • [30] Memory-event-triggered consensus control for multi-UAV systems against deception attacks
    Mu, Xiufeng
    Gu, Zhou
    Lu, Qing
    ISA TRANSACTIONS, 2023, 139 : 95 - 105