A survey on security control and attack detection for industrial cyber-physical systems

被引:659
作者
Ding, Derui [1 ]
Han, Qing-Long [1 ]
Xiang, Yang [1 ]
Ge, Xiaohua [1 ]
Zhang, Xian-Ming [1 ]
机构
[1] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Industrial cyber-physical systems; Cyber-attacks; Attack detection; Security control; DATA-INJECTION ATTACKS; DISTRIBUTED BAYESIAN DETECTION; GLOBAL ASYMPTOTIC STABILITY; NETWORKED CONTROL-SYSTEMS; LOAD FREQUENCY CONTROL; H-INFINITY CONTROL; STATE ESTIMATION; POWER-SYSTEM; NEURAL-NETWORKS; LINEAR-SYSTEMS;
D O I
10.1016/j.neucom.2017.10.009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber-physical systems (CPSs), which are an integration of computation, networking, and physical processes, play an increasingly important role in critical infrastructure, government and everyday life. Due to physical constraints, embedded computers and networks may give rise to some additional security vulnerabilities, which results in losses of enormous economy benefits or disorder of social life. As a result, it is of significant to properly investigate the security issue of CPSs to ensure that such systems are operating in a safe manner. This paper, from a control theory perspective, presents an overview of recent advances on security control and attack detection of industrial CPSs. First, the typical system modeling on CPSs is summarized to cater for the requirement of the performance analysis. Then three typical types of cyber-attacks, i.e. denial-of-service attacks, replay attacks, and deception attacks, are disclosed from an engineering perspective. Moreover, robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks. The development on attack detection for industrial CPSs is reviewed according to the categories on detection approaches. Furthermore, the security control and state estimation are discussed in detail. Finally, some challenge issues are raised for the future research. (c) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:1674 / 1683
页数:10
相关论文
共 140 条
  • [1] Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems
    Alippi, Cesare
    Ntalampiras, Stavros
    Roveri, Manuel
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2017, 1 (01): : 61 - 71
  • [2] Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing
    Alnajjab, Basel
    Zhang, Jiangfan
    Blum, Rick S.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (24) : 6659 - 6672
  • [3] Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models
    Amin, Saurabh
    Litrico, Xavier
    Sastry, S. Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1679 - 1693
  • [4] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [5] In Quest of Benchmarking Security Risks to Cyber-Physical Systems
    Amin, Saurabh
    Schwartz, Galina A.
    Hussain, Alefiya
    [J]. IEEE NETWORK, 2013, 27 (01): : 19 - 24
  • [6] Security of interdependent and identical networked control systems
    Amin, Saurabh
    Schwartz, Galina A.
    Sastry, S. Shankar
    [J]. AUTOMATICA, 2013, 49 (01) : 186 - 192
  • [7] Annunziata M., 2012, IND INTERNET WORK
  • [8] [Anonymous], 1988, SENSORS CONTROLS ANA
  • [9] Adaptive cyber-physical system attack detection and reconstruction with application to power systems
    Ao, Wei
    Song, Yongdong
    Wen, Changyun
    [J]. IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) : 1458 - 1468
  • [10] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33