A systems and control perspective of CPS security

被引:368
作者
Dibaji, Seyed Mehran [1 ]
Pirani, Mohammad [2 ]
Flamholz, David Bezalel [1 ]
Annaswamy, Anuradha M. [1 ]
Johansson, Karl Henrik [2 ]
Chakrabortty, Aranya [3 ]
机构
[1] MIT, Dept Mech Engn, Cambridge, MA 02139 USA
[2] KTH Royal Inst Technol, Dept Automat Control, Stockholm, Sweden
[3] North Carolina State Univ, Dept Elect Engn, Raleigh, NC USA
基金
美国国家科学基金会;
关键词
Cyber-physical systems; Cyber-security; Cyber-physical security; Secure control; Resilient control; CYBER-PHYSICAL SYSTEMS; DATA-INJECTION ATTACKS; DETECTING INTEGRITY ATTACKS; INTRUSION DETECTION; RESILIENT CONTROL; NETWORKED CONTROL; STOCHASTIC GAME; POWER-SYSTEM; CONSENSUS; CYBERSECURITY;
D O I
10.1016/j.arcontrol.2019.04.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently garnered increased attention. A key concern that is ubiquitous in CPS is a need to ensure security in the face of cyber attacks. In this paper, we carry out a survey of systems and control methods that have been proposed for the security of CPS. We classify these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation. A unified threat assessment metric is proposed in order to evaluate how CPS security is achieved in each of these three cases. Also surveyed are the risk assessment tools and the effect of network topology on CPS security. Furthermore, an emphasis has been placed on power and transportation applications in the overall survey. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:394 / 411
页数:18
相关论文
共 264 条
[1]   Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus [J].
Abbas, Waseem ;
Laszka, Aron ;
Koutsoukos, Xenofon .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (04) :2036-2048
[2]   A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis [J].
Abdo, H. ;
Kaouk, M. ;
Flaus, J. -M. ;
Masse, F. .
COMPUTERS & SECURITY, 2018, 72 :175-195
[3]   Resilient Cooperative Control of DC Microgrids [J].
Abhinav, Shankar ;
Modares, Hamidreza ;
Lewis, Frank L. ;
Davoudi, Ali .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (01) :1083-1085
[4]   WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining [J].
Adhikari, Uttam ;
Morris, Thomas ;
Pan, Shengyi .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (06) :2744-2753
[5]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[6]   Cooperative Vehicular Networking: A Survey [J].
Ahmed, Ejaz ;
Gharavi, Hamid .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (03) :996-1014
[7]  
Alam M, 2016, STUD SYST DECIS CONT, V52, P1, DOI 10.1007/978-3-319-28183-4_1
[8]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[9]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[10]   Security of interdependent and identical networked control systems [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Sastry, S. Shankar .
AUTOMATICA, 2013, 49 (01) :186-192