4.6 Article

Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach

Journal

IEEE SYSTEMS JOURNAL
Volume 14, Issue 2, Pages 2054-2065

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2019.2941759

Keywords

Sensors; Computer crime; Cooling; Desalination; Pollution measurement; Delay effects; Power generation; Closed-loop systems; cool water basin; cooling towers; cyberattacks; cyber-physical systems; data fusion; energy-water nexus; intrusion detection; liquid-level control; power and water desalination plant; quadruple tank system; security; subobserver; time delay; water utility

Ask authors/readers for more resources

The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available