期刊文献+
共找到186篇文章
< 1 2 10 >
每页显示 20 50 100
A Survey on Security Control and Estimation for Cyber-Physical Systems Under Cyber-Attacks:Advances,Challenges and Future Directions 被引量:1
1
作者 Haoyang YU Zidong WANG +1 位作者 Lei ZOU Yezheng WANG 《Artificial Intelligence Science and Engineering》 2025年第1期1-16,共16页
Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widel... Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widely utilized across various domains,such as smart grids,smart healthcare systems,smart vehicles,and smart manufacturing,among others.Due to their unique spatial distribution,CPSs are highly vulnerable to cyber-attacks,which may result in severe performance degradation and even system instability.Consequently,the security concerns of CPSs have attracted significant attention in recent years.In this paper,a comprehensive survey on the security issues of CPSs under cyber-attacks is provided.Firstly,mathematical descriptions of various types of cyberattacks are introduced in detail.Secondly,two types of secure estimation and control processing schemes,including robust methods and active methods,are reviewed.Thirdly,research findings related to secure control and estimation problems for different types of CPSs are summarized.Finally,the survey is concluded by outlining the challenges and suggesting potential research directions for the future. 展开更多
关键词 cyber-physical systems cyber-attacks robust methods active methods secure estimation secure control
在线阅读 下载PDF
Trust-Aware AI-Enabled Edge Framework for Intelligent Traffic Control in Cyber-Physical Systems
2
作者 Khalid Haseeb Imran Qureshi +3 位作者 Naveed Abbas Muhammad Ali Muhammad Arif Shah Qaisar Abbas 《Computer Modeling in Engineering & Sciences》 2025年第12期4349-4362,共14页
The rapid evolution of smart cities has led to the deployment of Cyber-Physical IoT Systems(CPS-IoT)for real-time monitoring,intelligent decision-making,and efficient resource management,particularly in intelligent tr... The rapid evolution of smart cities has led to the deployment of Cyber-Physical IoT Systems(CPS-IoT)for real-time monitoring,intelligent decision-making,and efficient resource management,particularly in intelligent transportation and vehicular networks.Edge intelligence plays a crucial role in these systems by enabling low-latency processing and localized optimization for dynamic,data-intensive,and vehicular environments.However,challenges such as high computational overhead,uneven load distribution,and inefficient utilization of communication resources significantly hinder scalability and responsiveness.Our research presents a robust framework that integrates artificial intelligence and edge-level traffic prediction for CPS-IoT systems.Distributed computing for selecting forwarders and analyzing threats across the IoT system enhances stability while improving energy efficiency.In addition,to achieve efficient routing decision-making,the Artificial Bee Colony algorithmis explored to enhance the effective utilization of network resources across IoT systems.Based on the simulation results,the proposed framework achieves remarkable performance in terms of throughput by 38%–41%,packet loss ratio by 30%–33%,security risk mitigation by 35%–37%,and trust level by 41%–44%as compared to existing work. 展开更多
关键词 Adaptive learning cyber-physical applications communication threats edge intelligence trust computing
在线阅读 下载PDF
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
3
作者 Dapeng Wu Jian Liu +3 位作者 Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin 《Digital Communications and Networks》 2025年第2期563-573,共11页
Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV).With the increasing popularity of digital photography and Internet technology,more and more users are sharing images on CPN.However,many images are shared without any privacy processing,exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI)algorithms.Existing image sharing methods lack fine-grained image sharing policies and cannot protect user privacy.To address this issue,we propose a social relationship-driven privacy customization protection model for publishers and co-photographers.We construct a heterogeneous social information network centered on social relationships,introduce a user intimacy evaluation method with time decay,and evaluate privacy levels considering user interest similarity.To protect user privacy while maintaining image appreciation,we design a lightweight face-swapping algorithm based on Generative Adversarial Network(GAN)to swap faces that need to be protected.Our proposed method minimizes the loss of image utility while satisfying privacy requirements,as shown by extensive theoretical and simulation analyses. 展开更多
关键词 cyber-physical networks Customized privacy Face-swapping Heterogeneous information network Deep fakes
在线阅读 下载PDF
A robustness assessment approach for transportation networks with cyber-physical interdependencies
4
作者 Konstantinos Ntafloukas Liliana Pasquale +1 位作者 Beatriz Martinez-Pastor Daniel P.McCrum 《Resilient Cities and Structures》 2025年第1期71-82,共12页
While in the past the robustness of transportation networks was studied considering the cyber and physical space as isolated environments this is no longer the case.Integrating the Internet of Things devices in the se... While in the past the robustness of transportation networks was studied considering the cyber and physical space as isolated environments this is no longer the case.Integrating the Internet of Things devices in the sensing area of transportation infrastructure has resulted in ubiquitous cyber-physical systems and increasing interdependen-cies between the physical and cyber networks.As a result,the robustness of transportation networks relies on the uninterrupted serviceability of physical and cyber networks.Current studies on interdependent networks overlook the civil engineering aspect of cyber-physical systems.Firstly,they rely on the assumption of a uniform and strong level of interdependency.That is,once a node within a network fails its counterpart fails immedi-ately.Current studies overlook the impact of earthquake and other natural hazards on the operation of modern transportation infrastructure,that now serve as a cyber-physical system.The last is responsible not only for the physical operation(e.g.,flow of vehicles)but also for the continuous data transmission and subsequently the cy-ber operation of the entire transportation network.Therefore,the robustness of modern transportation networks should be modelled from a new cyber-physical perspective that includes civil engineering aspects.In this paper,we propose a new robustness assessment approach for modern transportation networks and their underlying in-terdependent physical and cyber network,subjected to earthquake events.The novelty relies on the modelling of interdependent networks,in the form of a graph,based on their interdependency levels.We associate the service-ability level of the coupled physical and cyber network with the damage states induced by earthquake events.Robustness is then measured as a degradation of the cyber-physical serviceability level.The application of the approach is demonstrated by studying an illustrative transportation network using seismic data from real-world transportation infrastructure.Furthermore,we propose the integration of a robustness improvement indicator based on physical and cyber attributes to enhance the cyber-physical serviceability level.Results indicate an improvement in robustness level(i.e.,41%)by adopting the proposed robustness improvement indicator.The usefulness of our approach is highlighted by comparing it with other methods that consider strong interdepen-dencies and key node protection strategies.The approach is of interest to stakeholders who are attempting to incorporate cyber-physical systems into civil engineering systems. 展开更多
关键词 Transportation network cyber-physical Robustness Interdependencies Natural hazards Robustness improvement indicator
在线阅读 下载PDF
On Resilience Against Cyber-Physical Uncertainties in Distributed Nash Equilibrium Seeking Strategies for Heterogeneous Games
5
作者 Maojiao Ye 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期138-147,共10页
This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical systems.In particular, we are concerned with parametric uncertainties in the control channel of the players. ... This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical systems.In particular, we are concerned with parametric uncertainties in the control channel of the players. Moreover, the weights on communication links can be compromised by time-varying uncertainties, which can result from possibly malicious attacks,faults and disturbances. To deal with the unavailability of measurement of optimization errors, an output observer is constructed,based on which adaptive laws are designed to compensate for physical uncertainties. With adaptive laws, a new distributed Nash equilibrium seeking strategy is designed by further integrating consensus protocols and gradient search algorithms.Moreover, to further accommodate compromised communication weights resulting from cyber-uncertainties, the coupling strengths of the consensus module are designed to be adaptive. As a byproduct, the coupling strengths are independent of any global information. With theoretical investigations, it is proven that the proposed strategies are resilient to these uncertainties and players' actions are convergent to the Nash equilibrium. Simulation examples are given to numerically validate the effectiveness of the proposed strategies. 展开更多
关键词 Adaptive law cyber-physical systems distributed Nash equilibrium seeking UNCERTAINTIES
在线阅读 下载PDF
Optimized Attack and Detection on Multi-Sensor Cyber-Physical System
6
作者 Fangju Zhou Hanbo Zhang +2 位作者 Na Ye Jing Huang Zhu Ren 《Computers, Materials & Continua》 2025年第9期4539-4561,共23页
This paper explores security risks in state estimation based on multi-sensor systems that implement a Kalman filter and aχ^(2) detector.When measurements are transmitted via wireless networks to a remote estimator,th... This paper explores security risks in state estimation based on multi-sensor systems that implement a Kalman filter and aχ^(2) detector.When measurements are transmitted via wireless networks to a remote estimator,the innovation sequence becomes susceptible to interception and manipulation by adversaries.We consider a class of linear deception attacks,wherein the attacker alters the innovation to degrade estimation accuracy while maintaining stealth against the detector.Given the inherent volatility of the detection function based on theχ^(2) detector,we propose broadening the traditional feasibility constraint to accommodate a certain degree of deviation from the distribution of the innovation.This broadening enables the design of stealthy attacks that exploit the tolerance inherent in the detection mechanism.The state estimation error is quantified and analyzed by deriving the iteration of the error covariance matrix of the remote estimator under these conditions.The selected degree of deviation is combined with the error covariance to establish the objective function and the attack scheme is acquired by solving an optimization problem.Furthermore,we propose a novel detection algorithm that employs a majority-voting mechanism to determine whether the system is under attack,with decision parameters dynamically adjusted in response to system behavior.This approach enhances sensitivity to stealthy and persistent attacks without increasing the false alarm rate.Simulation results show that the designed leads to about a 41%rise in the trace of error covariance for stable systems and 29%for unstable systems,significantly impairing estimation performance.Concurrently,the proposed detection algorithm enhances the attack detection rate by 33%compared to conventional methods. 展开更多
关键词 cyber-physical system kalman filter remote state estimation Chi-square detection linear deception attack
在线阅读 下载PDF
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
7
作者 Yu-Ang Wang Zidong Wang +2 位作者 Lei Zou Bo Shen Hongli Dong 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期114-125,共12页
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) perfect stealthy attacks watermark-based strategy
在线阅读 下载PDF
Toward Intrusion Detection of Industrial Cyber-Physical System: A Hybrid Approach Based on System State and Network Traffic Abnormality Monitoring
8
作者 Junbin He Wuxia Zhang +2 位作者 Xianyi Liu Jinping Liu Guangyi Yang 《Computers, Materials & Continua》 2025年第7期1227-1252,共26页
The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also e... The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System(ICPS),enhancing intelligence and autonomy.However,this transition also expands the attack surface,introducing critical security vulnerabilities.To address these challenges,this article proposes a hybrid intrusion detection scheme for securing ICPSs that combines system state anomaly and network traffic anomaly detection.Specifically,an improved variation-Bayesian-based noise covariance-adaptive nonlinear Kalman filtering(IVB-NCA-NLKF)method is developed to model nonlinear system dynamics,enabling optimal state estimation in multi-sensor ICPS environments.Intrusions within the physical sensing system are identified by analyzing residual discrepancies between predicted and observed system states.Simultaneously,an adaptive network traffic anomaly detection mechanism is introduced,leveraging learned traffic patterns to detect node-and network-level anomalies through pattern matching.Extensive experiments on a simulated network control system demonstrate that the proposed framework achieves higher detection accuracy(92.14%)with a reduced false alarm rate(0.81%).Moreover,it not only detects known attacks and vulnerabilities but also uncovers stealthy attacks that induce system state deviations,providing a robust and comprehensive security solution for the safety protection of ICPS. 展开更多
关键词 Industrial cyber-physical systems network intrusion detection adaptive Kalman filter abnormal state monitoring network traffic abnormality monitoring
在线阅读 下载PDF
A Learning-Based Passive Resilient Controller for Cyber-Physical Systems:Countering Stealthy Deception Attacks and Complete Loss of Actuators Control Authority
9
作者 Liang Xin Zhi-Qiang Long 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1368-1380,共13页
Cyber-physical systems(CPSs)are increasingly vulnerable to cyber-attacks due to their integral connection between cyberspace and the physical world,which is augmented by Internet connectivity.This vulnerability necess... Cyber-physical systems(CPSs)are increasingly vulnerable to cyber-attacks due to their integral connection between cyberspace and the physical world,which is augmented by Internet connectivity.This vulnerability necessitates a heightened focus on developing resilient control mechanisms for CPSs.However,current observer-based active compensation resilient controllers exhibit poor performance against stealthy deception attacks(SDAs)due to the difficulty in accurately reconstructing system states because of the stealthy nature of these attacks.Moreover,some non-active compensation approaches are insufficient when there is a complete loss of actuator control authority.To address these issues,we introduce a novel learning-based passive resilient controller(LPRC).Our approach,unlike observer-based state reconstruction,shows enhanced effectiveness in countering SDAs.We developed a safety state set,represented by an ellipsoid,to ensure CPS stability under SDA conditions,maintaining system trajectories within this set.Additionally,by employing deep reinforcement learning(DRL),the LPRC acquires the capacity to adapt and diverse evolving attack strategies.To empirically substantiate our methodology,various attack methods were compared with current passive and active compensation resilient control methods to evaluate their performance. 展开更多
关键词 Actuator authority cyber-physical systems(CPSs) deep reinforcement learning(DRL) learning-based controller resilient control stealthy deception attacks(SDAs)
在线阅读 下载PDF
Period selection for integrated controller tasks in cyber-physical systems 被引量:3
10
作者 Du Chenglie Tan Longhua Dong Yali 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期894-902,共9页
Abstract Performance optimization of cyber-physical systems (CPS) calls for co-design strategies that handle the issues in both computing domain and physical domain. Periods of controller tasks integrated into a uni... Abstract Performance optimization of cyber-physical systems (CPS) calls for co-design strategies that handle the issues in both computing domain and physical domain. Periods of controller tasks integrated into a uniprocessor system are related to both control performance and real-time schedu- lability analysis simultaneously. System performance improvement can be achieved by optimizing the periods of controller tasks. This paper extends an existing model to select task periods in real-time for CPS with fixed priority controller tasks scheduled by rate-monotonic algorithm. When all the tasks can be integrated, the analytic solution of the problem is derived by using the method of Lagrange multipliers and gradient descent method is evaluated to be suitable online. To further deal with the condition that the system is overloaded, an integrated method is proposed to select periods of tasks online by selecting a subset of tasks first and then optimizing the periods for them. Experimental results demonstrate that our method yields near-optimal result with a short running time. 展开更多
关键词 Control performance cyber-physical systemsoptimization Period selection Real-time control
原文传递
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity:A Survey 被引量:16
11
作者 Jun Zhang Lei Pan +3 位作者 Qing-Long Han Chao Chen Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第3期377-391,共15页
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opport... With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research. 展开更多
关键词 cyber-physical system CYBERSECURITY deep learning intrusion detection pattern classification
在线阅读 下载PDF
A survey on the security of cyber-physical systems 被引量:9
12
作者 Guangyu WU Jian SUN Jie CHEN 《Control Theory and Technology》 EI CSCD 2016年第1期2-10,共9页
Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and m... Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. Typical examples where CPSs are deployed include smart grids, civil infrastructure, medical devices and manufacturing. Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years. This paper surveys recent results in this area and mainly focusses on three important categories: attack detection, attack design and secure estimation and control. We also discuss several future research directions including risk assessment, modeling of attacks and attacks design, counter-attack strategy and testbed and validation. 展开更多
关键词 SECURITY cyber-physical systems attack detection secure estimation and control
原文传递
Cyber-Physical Production Systems for Data-Driven,Decentralized,and Secure Manufacturing-A Perspective 被引量:9
13
作者 Manu Suvarna Ken Shaun Yap +3 位作者 Wentao Yang Jun Li Yen Ting Ng Xiaonan Wang 《Engineering》 SCIE EI 2021年第9期1212-1223,共12页
With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,be... With the concepts of Industry 4.0 and smart manufacturing gaining popularity,there is a growing notion that conventional manufacturing will witness a transition toward a new paradigm,targeting innovation,automation,better response to customer needs,and intelligent systems.Within this context,this review focuses on the concept of cyber–physical production system(CPPS)and presents a holistic perspective on the role of the CPPS in three key and essential drivers of this transformation:data-driven manufacturing,decentralized manufacturing,and integrated blockchains for data security.The paper aims to connect these three aspects of smart manufacturing and proposes that through the application of data-driven modeling,CPPS will aid in transforming manufacturing to become more intuitive and automated.In turn,automated manufacturing will pave the way for the decentralization of manufacturing.Layering blockchain technologies on top of CPPS will ensure the reliability and security of data sharing and integration across decentralized systems.Each of these claims is supported by relevant case studies recently published in the literature and from the industry;a brief on existing challenges and the way forward is also provided. 展开更多
关键词 Smart manufacturing cyber-physical production systems Industrial Internet of Things Data analytics Decentralized system Blockchain
在线阅读 下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:20
14
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
在线阅读 下载PDF
Cyber-physical System Security for Networked Industrial Processes 被引量:5
15
作者 Shuang Huang Chun-Jie Zhou +1 位作者 Shuang-Hua Yang Yuan-Qing Qin 《International Journal of Automation and computing》 EI CSCD 2015年第6期567-578,共12页
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke... Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach. 展开更多
关键词 Critical infrastructures cyber-physical systems(CP
原文传递
Analysis of cascading failures of power cyber-physical systems considering false data injection attacks 被引量:8
16
作者 Jian Li Chaowei Sun Qingyu Su 《Global Energy Interconnection》 CAS CSCD 2021年第2期204-213,共10页
This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control func... This study considers the performance impacts of false data injection attacks on the cascading failures of a power cyber-physical system,and identifies vulnerable nodes.First,considering the monitoring and control functions of a cyber network and power flow characteristics of a power network,a power cyber-physical system model is established.Then,the influences of a false data attack on the decision-making and control processes of the cyber network communication processes are studied,and a cascading failure analysis process is proposed for the cyber-attack environment.In addition,a vulnerability evaluation index is defined from two perspectives,i.e.,the topology integrity and power network operation characteristics.Moreover,the effectiveness of a power flow betweenness assessment for vulnerable nodes in the cyberphysical environment is verified based on comparing the node power flow betweenness and vulnerability assessment index.Finally,an IEEE14-bus power network is selected for constructing a power cyber-physical system.Simulations show that both the uplink communication channel and downlink communication channel suffer from false data attacks,which affect the ability of the cyber network to suppress the propagation of cascading failures,and expand the scale of the cascading failures.The vulnerability evaluation index is calculated for each node,so as to verify the effectiveness of identifying vulnerable nodes based on the power flow betweenness. 展开更多
关键词 Power cyber-physical systems False date injection attack Cascading failure VULNERABILITY Power flow betweenness.
在线阅读 下载PDF
Smart Cities as Cyber-Physical Social Systems 被引量:16
17
作者 Christos G. Cassandras 《Engineering》 SCIE EI 2016年第2期156-158,共3页
The emerging prototype for a Smart City is one of an urban environment with a new generation of inno- vative services for transportation, energy distribution, healthcare, environmental monitoring, business, commerce, ... The emerging prototype for a Smart City is one of an urban environment with a new generation of inno- vative services for transportation, energy distribution, healthcare, environmental monitoring, business, commerce, emergency response, and social activities. Enabling the technology for such a setting re- quires a viewpoint of Smart Cities as cyber-physical systems (CPSs) that include new software platforms and strict requirements for mobility, security, safety, privacy, and the processing of massive amounts of information. This paper identifies some key defining characteristics of a Smart City, discusses some lessons learned from viewing them as CPSs, and outlines some fundamental research issues that remain largely open. 展开更多
关键词 Smart Cities cyber-physical systemsData-driven control
在线阅读 下载PDF
Challenges and Requirements for the Application of Industry 4.0:A Special Insight with the Usage of Cyber-Physical System 被引量:6
18
作者 Egon Mueller Xiao-Li Chen Ralph Riedel 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第5期1050-1057,共8页
Considered as a top priority of industrial devel- opment, Industry 4.0 (or Industrie 4.0 as the German ver- sion) has being highlighted as the pursuit of both academy and practice in companies. In this paper, based ... Considered as a top priority of industrial devel- opment, Industry 4.0 (or Industrie 4.0 as the German ver- sion) has being highlighted as the pursuit of both academy and practice in companies. In this paper, based on the review of state of art and also the state of practice in dif- ferent countries, shortcomings have been revealed as the lacking of applicable framework for the implementation of Industrie 4.0. Therefore, in order to shed some light on the knowledge of the details, a reference architecture is developed, where four perspectives namely manufacturing process, devices, software and engineering have been highlighted. Moreover, with a view on the importance of Cyber-Physical systems, the structure of Cyber-Physical System are established for the in-depth analysis. Further cases with the usage of Cyber-Physical System are also arranged, which attempts to provide some implications to match the theoretical findings together with the experience of companies. In general, results of this paper could be useful for the extending on the theoretical understanding of Industrie 4.0. Additionally, applied framework and proto- types based on the usage of Cyber-Physical Systems are also potential to help companies to design the layout of sensor nets, to achieve coordination and controlling of smart machines, to realize synchronous production with systematic structure, and to extend the usage of information and communication technologies to the maintenance scheduling. 展开更多
关键词 Industrie 4.0 - Internet of Things cyber-physical System Smart factory Reference architectureIntelligent sensor nets Robot control Synchronousproduction
在线阅读 下载PDF
A Sensorless State Estimation for A Safety-Oriented Cyber-Physical System in Urban Driving:Deep Learning Approach 被引量:4
19
作者 Mohammad Al-Sharman David Murdoch +4 位作者 Dongpu Cao Chen Lv Yahya Zweiri Derek Rayside William Melek 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第1期169-178,共10页
In today's modern electric vehicles,enhancing the safety-critical cyber-physical system(CPS)'s performance is necessary for the safe maneuverability of the vehicle.As a typical CPS,the braking system is crucia... In today's modern electric vehicles,enhancing the safety-critical cyber-physical system(CPS)'s performance is necessary for the safe maneuverability of the vehicle.As a typical CPS,the braking system is crucial for the vehicle design and safe control.However,precise state estimation of the brake pressure is desired to perform safe driving with a high degree of autonomy.In this paper,a sensorless state estimation technique of the vehicle's brake pressure is developed using a deep-learning approach.A deep neural network(DNN)is structured and trained using deep-learning training techniques,such as,dropout and rectified units.These techniques are utilized to obtain more accurate model for brake pressure state estimation applications.The proposed model is trained using real experimental training data which were collected via conducting real vehicle testing.The vehicle was attached to a chassis dynamometer while the brake pressure data were collected under random driving cycles.Based on these experimental data,the DNN is trained and the performance of the proposed state estimation approach is validated accordingly.The results demonstrate high-accuracy brake pressure state estimation with RMSE of 0.048 MPa. 展开更多
关键词 Brake pressure state estimation cyber-physical system(CPS) deep learning dropout regularization approach
在线阅读 下载PDF
Variance-Constrained Filtering Fusion for Nonlinear Cyber-Physical Systems With the Denial-of-Service Attacks and Stochastic Communication Protocol 被引量:4
20
作者 Hang Geng Zidong Wang +2 位作者 Yun Chen Xiaojian Yi Yuhua Cheng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第6期978-989,共12页
In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the st... In this paper,a new filtering fusion problem is studied for nonlinear cyber-physical systems under errorvariance constraints and denial-of-service attacks.To prevent data collision and reduce communication cost,the stochastic communication protocol is adopted in the sensor-to-filter channels to regulate the transmission order of sensors.Each sensor is allowed to enter the network according to the transmission priority decided by a set of independent and identicallydistributed random variables.From the defenders’view,the occurrence of the denial-of-service attack is governed by the randomly Bernoulli-distributed sequence.At the local filtering stage,a set of variance-constrained local filters are designed where the upper bounds(on the filtering error covariances)are first acquired and later minimized by appropriately designing filter parameters.At the fusion stage,all local estimates and error covariances are combined to develop a variance-constrained fusion estimator under the federated fusion rule.Furthermore,the performance of the fusion estimator is examined by studying the boundedness of the fused error covariance.A simulation example is finally presented to demonstrate the effectiveness of the proposed fusion estimator. 展开更多
关键词 cyber-physical system(CPS) denial-of-service attack stochastic communication protocol(SCP) variance-constrained filtering fusion
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部