Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A survey on attack detection, estimation and control of industrial cyber-physical systems
Department of Automation, Zhejiang University of Technology, Hangzhou, 310023, China. Key Laboratory of Advanced Control and Optimization for Chemical Processes (East China University of Science and Technology), Ministry of Education, Shanghai 200237, China.
Institute for Intelligent Systems, University of Johannesburg, South Africa.
Department of Biomedical Engineering, City University of Hong Kong, Hong Kong, China.
Department of Mechanical Engineering, University of Victoria, Canada.
Show others and affiliations
2021 (English)In: ISA transactions, ISSN 0019-0578, E-ISSN 1879-2022, Vol. 116, p. 1-16Article in journal (Refereed) Published
Abstract [en]

Cyber-physical systems (CPSs) are complex systems that involve technologies such as control, communication, and computing. Nowadays, CPSs have a wide range of applications in smart cities, smart grids, smart manufacturing and intelligent transportation. However, with integration of industrial control systems with modern communication technologies, CPSs would be inevitably exposed to increasing security threats, which could lead to severe degradation of the system performance and even destruction of CPSs. This paper presents a survey on recent advances on security issues of industrial cyber-physical systems (ICPSs). We specifically discuss two typical kinds of attacks, i.e., Denial-of-Service (DoS) attack and Deception attack, and present recent results in terms of attack detection, estimation, and control of ICPSs. Classifications of current studies are analyzed and summarized based on different system modeling and analysis methods. In addition, advantages and disadvantage of various methodologies are also discussed. Finally, the paper concludes with some potential future research directions on secure ICPSs.

Place, publisher, year, edition, pages
Elsevier, 2021. Vol. 116, p. 1-16
Keywords [en]
Cyber-physical systems, Security, DoS attack, Deception attack, Attack detection, Secure estimation, Secure control
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-82715DOI: 10.1016/j.isatra.2021.01.036ISI: 000686078600001PubMedID: 33581894Scopus ID: 2-s2.0-85100650822OAI: oai:DiVA.org:ltu-82715DiVA, id: diva2:1523922
Note

Validerad;2021;Nivå 2;2021-08-17 (johcin);

Finansiär: National Key R&D Funding (2018YFB1403702), National Natural Science Foundation of China (61873237), Fundamental Research Funds for the Central Universities, Fundamental Research Funds for the Provincial Universities of Zhejiang (RF-A2019003), Research Grants Council of the Hong Kong Special Administrative Region of China (CityU/11204315), Hong Kong Scholars Program (XJ2016030), Natural Science and Engineering Research Council of Canada 

Available from: 2021-01-29 Created: 2021-01-29 Last updated: 2021-08-31Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textPubMedScopus

Authority records

Vasilakos, Athanasios V.

Search in DiVA

By author/editor
Vasilakos, Athanasios V.
By organisation
Computer Science
In the same journal
ISA transactions
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
pubmed
urn-nbn

Altmetric score

doi
pubmed
urn-nbn
Total: 82 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf