http://iet.metastore.ingenta.com
1887

Security analysis of cyber-physical systems using norm

Security analysis of cyber-physical systems using norm

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Control Theory & Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks using norms of attacks to target and monitoring outputs is proposed. In addition, optimisation problems for selecting inputs or outputs that point to attacks with maximum impact and least detectability are posed, and subsequently solved. To demonstrate the applicability of the analysis methods proposed in this study, the IEEE 9-bus and 50-generator 145-bus systems are considered as test cases.

References

    1. 1)
      • 1. Teixeira, A., Amin, S., Sandberg, H., et al: ‘Cyber security analysis of state estimators in electric power systems’. Proc. of the 49th IEEE Conf. on Decision and Control, 2010, pp. 59915998.
    2. 2)
      • 2. Sridhar, S., Hahn, A., Govindarasu, M.: ‘Cyber–physical system security for the electric power grid’, Proc. IEEE, 2012, 100, (1), pp. 210224.
    3. 3)
      • 3. Sandberg, H., Teixeira, A., Johansson, K.H.: ‘On security indices for state estimators in power networks’. Proc. of the 1st Workshop on Secure Control Systems (CPSWEEK 2010), 2010.
    4. 4)
      • 4. Hendrickx, J.M., Johansson, K.H., Jungers, R.M., et al: ‘Efficient computations of a security index for false data attacks in power networks’, IEEE Trans. Autom. Control, 2014, 59, (12), pp. 31943208.
    5. 5)
      • 5. Teixeira, A., Sou, K.C., Sandberg, H., et al: ‘Quantifying cyber-security for networked control systems’, in Tarraf, D.C.(Ed.): ‘Control of cyber-physical systems’, ser. Lecture Notes in Control and Information Sciences, (Springer International Publishing, 2013), vol. 449, pp. 123142.
    6. 6)
      • 6. Pushpak, S., Diwadkar, A., Fardad, M., et al: ‘Vulnerability analysis of large-scale dynamical networks to coordinated attacks’. Proc. of the Australian Control Conf., 2014.
    7. 7)
      • 7. Pasqualetti, F., Dörfler, F., Bullo, F.: ‘Attack detection and identification in cyber-physical systems’, IEEE Trans. Autom. Control, 2013, 58, (11), pp. 27152729.
    8. 8)
      • 8. Varga, A.: ‘Integrated algorithm for solving H 2-optimal fault detection and isolation problems’. 2010 Conf. on Control and Fault-Tolerant Systems (SysTol), 2010, pp. 353358.
    9. 9)
      • 9. Khosrowjerdi, M.J., Nikoukhah, R., Safari-Shad, N.: ‘A mixed H2/H approach to simultaneous fault detection and control’, Automatica, 2004, 40, (2), pp. 261267.
    10. 10)
      • 10. Dawande, M., Keskinocak, P., Swaminathan, J.M., et al: ‘On bipartite and multipartite clique problems’, J. Algorithms, 2001, 41, (2), pp. 388403.
    11. 11)
      • 11. Freire, A.S., Moreno, E., Vielma, J.P.: ‘An integer linear programming approach for bilinear integer programming’, Oper. Res. Lett., 2012, 40, (2), pp. 7477.
    12. 12)
      • 12. Ibaraki, T.: ‘Integer programming formulation of combinatorial optimization problems’, Ann. Discrete Math., 1976, 16, (1), pp. 3952.
    13. 13)
      • 13. Padberg, M.: ‘The boolean quadric polytope: some characteristics, facets and relatives’, Math. Program., 1989, 45, (1-3), pp. 139172.
    14. 14)
      • 14. Kundur, P., Balu, N.J., Lauby, M.G.: ‘Power system stability and control’ (McGraw-Hill New York, 1994), vol. 7.
    15. 15)
      • 15. Zhang, Y., Phillips, C.A., Rogers, G.L., et al: ‘On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types’, BMC Bioinform., 2014, 15, (1), p. 110.
    16. 16)
      • 16. Peeters, R.: ‘The maximum edge biclique problem is NP-complete’, Discrete Appl. Math., 2003, 131, (3), pp. 651654.
    17. 17)
      • 17. Papadimitriou, C.H., Steiglitz, K.: ‘Combinatorial optimization: algorithms and complexity’, ser. Dover Books on Computer Science, (Dover Publications, 2013).
    18. 18)
      • 18. Dorfler, F., Bullo, F.: ‘Kron reduction of graphs with applications to electrical networks’, IEEE Trans. Circuits Syst. I, Regul. Pap., 2013, 60, (1), pp. 150163.
    19. 19)
      • 19. Shames, I., Farokhi, F., Summers, T.H.: ‘Simulations scripts of ‘Security Analysis of Networked Systems in the Presence of Impulsive Attacks”. Available at: https://dl.dropboxusercontent.com/u/4527019/Simulations/imp-sim.zip.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cta.2016.1391
Loading

Related content

content/journals/10.1049/iet-cta.2016.1391
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address