期刊
ISA TRANSACTIONS
卷 116, 期 -, 页码 1-16出版社
ELSEVIER SCIENCE INC
DOI: 10.1016/j.isatra.2021.01.036
关键词
Cyber-physical systems; Security; DoS attack; Deception attack; Attack detection; Secure estimation; Secure control
资金
- National Key R&D Funding, China [2018YFB1403702]
- National Natural Science Foundation of China [61873237]
- Fundamental Research Funds for the Provincial Universities of Zhejiang, China [RF-A2019003]
- Fundamental Research Funds for the Central Universities, China
- Research Grants Council of the Hong Kong Special Administrative Region of China [CityU/11201120]
- Hong Kong Scholars Program [XJ2016030]
- Natural Science and Engineering Research Council of Canada
The paper surveys recent advances on security issues of industrial cyber-physical systems (ICPSs), focusing on two typical types of attacks - Denial-of-Service (DoS) attack and Deception attack. Recent results on attack detection, estimation, and control of ICPSs are presented. Current studies are classified and summarized based on different system modeling and analysis methods, discussing advantages and disadvantages of various methodologies. Potential future research directions on secure ICPSs are also highlighted.
Cyber-physical systems (CPSs) are complex systems that involve technologies such as control, communication, and computing. Nowadays, CPSs have a wide range of applications in smart cities, smart grids, smart manufacturing and intelligent transportation. However, with integration of industrial control systems with modern communication technologies, CPSs would be inevitably exposed to increasing security threats, which could lead to severe degradation of the system performance and even destruction of CPSs. This paper presents a survey on recent advances on security issues of industrial cyber-physical systems (ICPSs). We specifically discuss two typical kinds of attacks, i.e., Denial-of-Service (DoS) attack and Deception attack, and present recent results in terms of attack detection, estimation, and control of ICPSs. Classifications of current studies are analyzed and summarized based on different system modeling and analysis methods. In addition, advantages and disadvantage of various methodologies are also discussed. Finally, the paper concludes with some potential future research directions on secure ICPSs. (C) 2021 ISA. Published by Elsevier Ltd. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据