Review
Chemistry, Analytical
Mary Nankya, Robin Chataut, Robert Akl
Summary: Industrial Control Systems (ICS), including SCADA, DCS, and PLC, are crucial for managing and regulating industrial processes. This article provides an overview of ICS security, covering its components, protocols, threats, vulnerabilities, and existing security countermeasures. It also explores the integration of machine learning techniques for enhancing ICS cybersecurity.
Article
Engineering, Electrical & Electronic
Chunjie Zhou, Bowen Hu, Yang Shi, Yu-Chu Tian, Xuan Li, Yue Zhao
Summary: This article presents a global and systematic architectural approach for industrial control system cybersecurity to address the threats posed by cyberattacks on ICSs. Through the integration of secure networks, secure control systems, and secure physical processes, layer-by-layer defense is implemented to enhance the network security risk management level of ICSs.
PROCEEDINGS OF THE IEEE
(2021)
Article
Automation & Control Systems
Yue Zhao, Chunjie Zhou, Yu-Chu Tian, Jianhui Yang, Xiaoya Hu
Summary: Cyber attacks pose serious threats to the security of cyber-physical systems. This article proposes a resilient control scheme based on cloud computing environments to address the destructive changes in system structure caused by actuator attacks. The scheme consists of a local resilient controller and a cloud-based resilient controller. Simulation experiments on a permanent synchronous motor control system demonstrate the effectiveness of the proposed scheme.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Gabriela Ahmadi-Assalemi, Haider Al-Khateeb, Gregory Epiphaniou, Amar Aggoun
Summary: Industrial control systems (ICSs) are crucial to modern societies and smart cities, but they face increasing cybersecurity threats. Utilizing artificial intelligence and sensor-generated data, it is possible to innovate in modeling anomalous behavior, enhancing the resilience of ICSs against cyberattacks.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Automation & Control Systems
Elham Akbari, Seyyed Mostafa Tabatabaei, Mojtaba Barkhordari Yazdi, Mohammad Mehdi Arefi, Jinde Cao
Summary: In this study, the tracking control problem is investigated for a switched time-delay nonlinear nonstrict-feedback cyber-physical system (CPS). These CPSs are susceptible to collusive network attacks, such as false data injection (FDI) and denial-of-service (DoS) attacks. To address these issues, a Lyapunov-Krasovskii (LK) candidate, a neural network (NN) switched observer, and a Nussbaum gain approach are employed. The proposed resilient control ensures bounded closed-loop system signals and tracking errors. Practical and numerical examples are presented to demonstrate the effectiveness of the proposed scheme.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
(2023)
Article
Chemistry, Analytical
Asaad Balla, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md. Rafiqul Islam, F. M. Suliman
Summary: Integrating IoT devices in SCADA systems has improved data collection and transmission technologies, but also presents security challenges. Many studies on IDS in SCADA systems neglect the fundamental issue of imbalanced datasets. This research investigates the impact of data imbalance on the effectiveness of a SCADA-based IDS.
Article
Automation & Control Systems
Bohui Wang, Bin Zhang, Rong Su
Summary: This article proposes a novel dynamic fault-tolerant control model for cyber-physical systems, by considering systems as a multiagent system and managing the admissible levels of actuator fault resiliently. The results show that the cooperative tracking behaviors can be achieved with the resilient control method and fault management mechanism introduced in the study.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Automation & Control Systems
Yishi Liu, Xiwang Dong, Zhang Ren, Jianwei Liu
Summary: This paper considers a distributed cyber-security and fault tolerance formation problem using a multi-agent system. The agents focus on a formation reference function and achieve a desired time-varying formation even in the presence of malicious attacks and multiple faults. A distributed control protocol, utilizing an event-triggered technique and active reconfigurable strategy, is proposed to achieve resilient control in the face of adverse effects. The attack parameters are bounded by analyzing the Lyapunov stability theorem and the property of the Laplacian matrix. An observer-based fault estimator is used to improve fault-tolerance capabilities. Simulation results validate the effectiveness of the proposed scheme in addressing distributed formation issues with faults and attack intervals.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Automation & Control Systems
Yu Wang, Suman Mondal, Chao Deng, Kuntal Satpathi, Yan Xu, Souvik Dasgupta
Summary: This article proposes a cyber-resilient cooperative control method for BICs in ac/dc NMGs, which can maintain system stability and power regulation among multiple BICs under false signal injection attacks. The effectiveness of the proposed method is demonstrated through hardware-in-the-loop experiments.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2021)
Article
Automation & Control Systems
Chao Deng, Yu Wang, Changyun Wen, Yan Xu, Pengfeng Lin
Summary: This article proposes a distributed resilient control strategy for multiple energy storage systems in islanded microgrids to address hidden but lethal issues. By introducing an adaptive technique, it presents a distributed resilient control method for frequency/voltage restoration, fair real power sharing, and state-of-charge balancing in abnormal conditions with multiple ESSs. The stability of the method is rigorously proven using Lyapunov methods and validated on test systems in the OPAL-RT simulator under various cases.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Sangjun Kim, Kyung-Joon Park, Chenyang Lu
Summary: Cyber-physical systems (CPS) integrate physical systems in the real world with control software in computing systems through networks. However, CPS are vulnerable to malicious attackers intruding on the network. Therefore, extensive research on cyber-physical security has been conducted to detect cyber-physical attacks and ensure the stability of the physical systems.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Automation & Control Systems
Hiroki Matsume, Yuan Wang, Hideaki Ishii
Summary: This paper investigates the problem of multi-agent consensus in the presence of adversarial agents using mean subsequence reduced algorithms and self-triggered communication to reduce computation and communication resource usage. Ternary signals for agent control inputs are employed to decrease information transmission. In hostile environments, the self-triggered approach is shown to have advantages over the event-triggered approach, and a switching scheme mixing the two protocols is introduced to enhance agent performance.
NONLINEAR ANALYSIS-HYBRID SYSTEMS
(2021)
Editorial Material
Automation & Control Systems
Alireza Jolfaei, Mian Ahmad Jan, Krishna Kant, Muhammad Usman
Summary: The papers in this special section discuss the configuration security of industrial automation and control systems, highlighting the main research challenges and solutions for enhancing security in industrial applications.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Automation & Control Systems
Mahmood Mazare, Mostafa Taghizadeh, Hadi Asharioun
Summary: This article presents a novel anomaly-based resilient pitch angle control methodology for wind energy systems to mitigate the detrimental effects of cyber-attacks. The proposed strategy incorporates a fixed-time high-order sliding mode observer and adaptive sliding-based controller to adjust the pitch angle and supply the required power.
INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING
(2023)
Article
Automation & Control Systems
Dan Zhang, Qing-Guo Wang, Gang Feng, Yang Shi, Athanasios V. Vasilakos
Summary: The paper surveys recent advances on security issues of industrial cyber-physical systems (ICPSs), focusing on two typical types of attacks - Denial-of-Service (DoS) attack and Deception attack. Recent results on attack detection, estimation, and control of ICPSs are presented. Current studies are classified and summarized based on different system modeling and analysis methods, discussing advantages and disadvantages of various methodologies. Potential future research directions on secure ICPSs are also highlighted.
Article
Automation & Control Systems
Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl Henrik Johansson
Summary: In this article, we propose a filter design framework for a sequence of sensor measurements, where the joint probability density function depends on a private parameter. The framework includes a randomizer and a nonlinear transformation to ensure parameter privacy and modify the joint p.d.f. of the filter's output. The design of the randomizer is formulated as an optimization problem, and it is shown that the Privacy Filter's output limits the performance of any estimator of the private parameter.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2023)
Article
Computer Science, Theory & Methods
Ehsan Nekouei, Mohammad Pirani, Henrik Sandberg, Karl H. Johansson
Summary: This paper proposes a framework to defend against inference attacks targeting the controller gains of an active steering control system (ASCS). By using a randomized filtering framework, the controller gains are protected against inference attacks. The optimal design of the randomizer is studied under a privacy constraint, and the inference ability of an adversary is analyzed using information-theoretic inequalities. The proposed privacy filter outperforms the additive noise privacy mechanism in terms of performance.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Automation & Control Systems
Rijad Alisic, Philip E. Pare, Henrik Sandberg
Summary: This article analyzes the impact of non-pharmaceutical interventions on the spread rate of COVID-19 and proposes a detectability method based on sudden changes in model parameters. The method is applied to the susceptible-infected-removed model and suggests that analyzing the number of recovered/deceased may be less accurate compared to the cumulative number of infected, due to the difficulty in estimating sudden changes.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL
(2023)
Article
Automation & Control Systems
Takashi Tanaka, Henrik Sandberg, Mikael Skoglund
Summary: This article introduces the framework of the transfer-entropy-regularized Markov decision process (TERMDP) and proposes an iterative computational procedure to find the optimal solution. The applications of TERMDPs in networked control systems theory and nonequilibrium thermodynamics are discussed, and the algorithm is applied to a maze navigation problem to study the impact of information prices on optimal decision policies.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2022)
Article
Automation & Control Systems
Dongyu Han, Kun Liu, Henrik Sandberg, Senchun Chai, Yuanqing Xia
Summary: This article discusses a distributed optimization problem with privacy concerns in multi-agent networks where malicious agents try to infer the privacy information of normal agents. A novel dual averaging algorithm is proposed that utilizes a correlated perturbation mechanism to protect the privacy of normal agents. It is proven that the algorithm achieves deterministic convergence under any initial conditions while guaranteeing privacy preservation. Furthermore, a probability density function for the perturbation is provided to maximize privacy measured by the trace of the Fisher information matrix. Lastly, a numerical example is presented to illustrate the effectiveness of the algorithm.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2022)
Article
Automation & Control Systems
Xingkang He, Xiaoqiang Ren, Henrik Sandberg, Karl Henrik Johansson
Summary: In this article, the authors study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. They propose a recursive distributed filter and an online local attack detector to protect the filters from attacks.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2022)
Article
Automation & Control Systems
Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg
Summary: This study focuses on incident handling for dynamical networked control systems during adverse events, with specific emphasis on attack detection unit reconfiguration to maintain detection and isolation capabilities under possible disconnections and separations. The proposed solution utilizes retrofit control techniques and is applied to low-voltage power distribution networks with distributed generation, demonstrating practical applications through numerical examples on a benchmark distribution network.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY
(2022)
Article
Automation & Control Systems
Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg, Karl Henrik Johansson
Summary: This article proposes a distributed design method of controllers for large-scale network systems. The method uses a global/local information structure to enhance the scalability of the controllers. The global subcontroller coordinates the local subcontrollers to regulate interarea oscillations among subsystems. By representing the original network system as a hierarchical cascaded system, the design is achieved in a distributed manner. The primary findings of this study include a tractable solution to the design problem, an existence condition for the hierarchical model decomposition, and a clustering method appropriate for the proposed framework and a robust extension.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2023)
Article
Automation & Control Systems
Rijad Alisic, Junsoo Kim, Henrik Sandberg
Summary: In this paper, we investigate the homomorphic property in the encryption method based on the Learning with Errors (LWE) problem and find that it can lead to failure in defending dynamical control systems from undetectable attacks. We demonstrate how model-free undetectable attacks on linear systems over integers can be computed from encrypted sampled inputs and outputs. By applying previous work to our scenario, we analyze the probability of detecting an attack explicitly depending on the encryption parameters. Finally, we simulate an attack on an encrypted linear system over integers and analyze the probability of detection.
IEEE CONTROL SYSTEMS LETTERS
(2023)
Article
Automation & Control Systems
Amr Alanwar, Victor Gassmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl H. Johansson, Matthias Althoff
Summary: The set-based estimation is highly valued for its ability to ensure state enclosures in safety-critical systems. However, the need to outsource set-based operations to a central aggregator node for collecting measurements from distributed sensors raises privacy concerns. To address this, we propose set-based estimation protocols using partially homomorphic encryption to protect the privacy of measurements and estimations. We demonstrate the effectiveness of our protocols by localizing a real mobile quadcopter using ultra-wideband wireless devices.
EUROPEAN JOURNAL OF CONTROL
(2023)
Article
Automation & Control Systems
David Umsonst, Justin Ruths, Henrik Sandberg
Summary: In threshold-based anomaly detection, tuning the threshold is a challenging task due to unknown detector output distributions. This study proposes the use of quantile estimators based on order statistics to estimate the detector threshold and provides three distribution-free finite sample guarantees. The guarantees are compared and validated using simulated and experimental data.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY
(2023)
Article
Automation & Control Systems
Philip E. Pare, Axel Janson, Sebin Gracy, Ji Liu, Henrik Sandberg, Karl H. Johansson
Summary: In this article, a layered networked spread model (SIWS) is developed to study the spreading of a susceptible-infected-susceptible pathogen-borne disease over a human contact network and an infrastructure network. The existence, uniqueness, stability, and observability of various equilibria in the model are investigated, and a necessary and sufficient condition for the estimation of sickness levels of nodes is provided.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS
(2023)
Article
Automation & Control Systems
Twan Keijzer, Riccardo M. G. Ferrari, Henrik Sandberg
Summary: Interconnected modern systems are vulnerable to adversarial attackers who can corrupt communication channels and compromise subsystems. The field of secure state estimation (SSE) aims to provide accurate state estimation even when some measurement signals are corrupted. In this letter, a solution is proposed for a new generalized SSE problem where entire subsystems can be compromised, affecting both actuation and measurement signals. The sliding mode observer (SMO)-based solution allows for multiple attack channels on both actuation and measurement signals, which is a larger class of attacks than previously considered. The proposed method is demonstrated on 10 interconnected mass-spring-damper subsystems.
IEEE CONTROL SYSTEMS LETTERS
(2023)
Article
Engineering, Electrical & Electronic
Yicheng Liao, Henrik Sandberg, Xiongfei Wang
Summary: This paper studies the truncation of harmonic transfer functions (HTFs) in power systems equipped with power electronic converters for dynamic analysis. The gain function of an HTF is defined as the norm of its central-column vector, and the error bound of the gain function in relation to the truncation order is explicitly derived as an indicator for HTF truncation. Compared with existing solutions, the proposed method is practical in truncating black-box systems with unknown internal parameters, as the truncation error bound can be estimated through frequency scan. The truncation approach is verified on a three-phase electronic power system by electromagnetic transient simulations.
IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY
(2022)
Article
Automation & Control Systems
Hampei Sasahara, Henrik Sandberg
Summary: This paper proposes a model of cyber deception with asymmetric recognition represented by private beliefs. By explicitly quantifying players' asymmetric recognition, the paper introduces epistemic signaling games based on the Mertens-Zamir model to achieve a precise evaluation of the risks arising from cognitive gaps.
IEEE CONTROL SYSTEMS LETTERS
(2022)