期刊文献+
共找到180篇文章
< 1 2 9 >
每页显示 20 50 100
A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs
1
作者 Pavlo Mykytyn Marcin Brzozowski +1 位作者 Zoya Dyka Peter Langendoerfer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1019-1050,共32页
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th... The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature. 展开更多
关键词 Unmanned aerial vehicle unmanned aerial system cyber security and privacy drone swarm security vulnerabilities cyber-threats cyber-attacks plausibility check
下载PDF
Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks
2
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期530-547,共18页
The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vu... The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vulnerabilities in the nation’s infrastructure have become more pronounced. Cyber-attacks on critical infrastructure, such as power grids, transportation networks, and financial systems, pose a significant risk to national security and public safety. These attacks can disrupt essential services, cause economic losses, and potentially have severe consequences for the well-being of individuals and communities. The rise of cyber-terrorism is also a concern. Cyber-terrorists can exploit vulnerabilities in cyberspace to compromise infrastructure systems, causing chaos and panic among the population. The potential for destructive attacks on critical infrastructure is a pressing issue requiring constant attention and proactive measures. 展开更多
关键词 Critical Infrastructure cyber-attacks cyberSECURITY cyberSPACE cyber-Terrorism
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
3
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 cyber-attacks cyberCRIME cyberSECURITY cyber Threats Domestic Terrorism
下载PDF
网络攻击下产品与供应链协同演进系统数据驱动变更控制设计 被引量:3
4
作者 李庆奎 高雪峰 +2 位作者 彭晨 张蕴隆 易军凯 《中国科学:信息科学》 CSCD 北大核心 2023年第2期325-343,共19页
产品与供应链协同演进系统(product and supply chain synchronous evolution system,PSCSE)是一类复杂的分布式信息物理系统(cyber-physical system,CPS),含有大量的未建模动态与不确定性.剧烈的需求波动及突发的网络事件,使系统结构... 产品与供应链协同演进系统(product and supply chain synchronous evolution system,PSCSE)是一类复杂的分布式信息物理系统(cyber-physical system,CPS),含有大量的未建模动态与不确定性.剧烈的需求波动及突发的网络事件,使系统结构参数极易发生变化.产品设计变更是维持PSCSES稳定、满足用户需求及保证经济效益的重要手段.本文研究基于分布式CPS的PSCSES在受到DoS攻击下的应急变更控制问题.首先,针对PSCSES在网络攻击下数据包丢失问题,利用每条子链的历史数据设计基于循环神经网络(recurrent neural network,RNN)的预测器以弥补因网络攻击造成的库存数据丢失;其次,利用博弈论思想将H∞一致性控制问题转化为多人零和图博弈问题,提出一种应急变更补偿机制;进而基于Q-learning的策略迭代技术设计了模型未知的控制器求解算法,实现了系统的库存状态H∞一致性.最后,仿真实验验证了所提方法的有效性. 展开更多
关键词 网络攻击 数据驱动 供应链 变更控制设计 多智能体
原文传递
Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks
5
作者 Dan You Shouguang Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期240-248,共9页
In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur. In particular, we focus on the problem of liveness enforcement and consider a sensor-reading m... In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur. In particular, we focus on the problem of liveness enforcement and consider a sensor-reading modification attack(SM-attack) that may disguise the occurrence of an event as that of another event by intruding sensor communication channels. To solve the problem, we introduce non-deterministic supervisors in the paper, which associate to every observed sequence a set of possible control actions offline and choose a control action from the set randomly online to control the system. Specifically, given a bounded Petri net(PN) as the reference formalism and an SMattack, an algorithm that synthesizes a liveness-enforcing nondeterministic supervisor tolerant to the SM-attack is proposed for the first time. 展开更多
关键词 cyber-attacks cyber-physical system(CPS) LIVENESS non-deterministic supervisors Petri net(PN)
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
6
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Cybersecurity Landscape on Remote State Estimation:A Comprehensive Review
7
作者 Jing Zhou Jun Shang Tongwen Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期851-865,共15页
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state esti... Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state estimation(RSE)is an indispensable functional module of CPSs.Recently,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance degradation.This paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against RSE.Firstly,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of RSE.Secondly,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from adversaries.Thirdly,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'perspectives.Finally,several challenges and open problems are presented to inspire further exploration and future research in this field. 展开更多
关键词 cyber-attacks Kalman filtering remote state estimation unreliable transmission channels
下载PDF
Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks
8
作者 Asad Raza Shahzad Memon +1 位作者 Muhammad Ali Nizamani Mahmood Hussain Shah 《Intelligent Automation & Soft Computing》 2024年第3期545-566,共22页
Smart Industrial environments use the Industrial Internet of Things(IIoT)for their routine operations and transform their industrial operations with intelligent and driven approaches.However,IIoT devices are vulnerabl... Smart Industrial environments use the Industrial Internet of Things(IIoT)for their routine operations and transform their industrial operations with intelligent and driven approaches.However,IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet.Traditional signature-based IDS are effective in detecting known attacks,but they are unable to detect unknown emerging attacks.Therefore,there is the need for an IDS which can learn from data and detect new threats.Ensemble Machine Learning(ML)and individual Deep Learning(DL)based IDS have been developed,and these individual models achieved low accuracy;however,their performance can be improved with the ensemble stacking technique.In this paper,we have proposed a Deep Stacked Neural Network(DSNN)based IDS,which consists of two stacked Convolutional Neural Network(CNN)models as base learners and Extreme Gradient Boosting(XGB)as the meta learner.The proposed DSNN model was trained and evaluated with the next-generation dataset,TON_IoT.Several pre-processing techniques were applied to prepare a dataset for the model,including ensemble feature selection and the SMOTE technique.Accuracy,precision,recall,F1-score,and false positive rates were used to evaluate the performance of the proposed ensemble model.Our experimental results showed that the accuracy for binary classification is 99.61%,which is better than in the baseline individual DL and ML models.In addition,the model proposed for IDS has been compared with similar models.The proposed DSNN achieved better performance metrics than the other models.The proposed DSNN model will be used to develop enhanced IDS for threat mitigation in smart industrial environments. 展开更多
关键词 Industrial internet of things smart industrial environment cyber-attacks convolutional neural network ensemble learning
下载PDF
山东半岛沿岸海域航行中补给船抗干扰同步控制
9
作者 韩国杰 刘志朋 +2 位作者 巩庆涛 徐丙莲 胡鑫 《鲁东大学学报(自然科学版)》 2024年第2期97-104,共8页
本文研究了山东半岛沿岸海域航行中补给船同步控制问题,并解决网络攻击和干扰补偿引起的增益时变问题。首先,构造了干扰观测器以提供海洋中的时变干扰估计值,构造了自适应律实时更新未知控制参数;其次,通过将干扰观测器与矢量反步技术... 本文研究了山东半岛沿岸海域航行中补给船同步控制问题,并解决网络攻击和干扰补偿引起的增益时变问题。首先,构造了干扰观测器以提供海洋中的时变干扰估计值,构造了自适应律实时更新未知控制参数;其次,通过将干扰观测器与矢量反步技术相结合,设计一种用于同步的抗干扰跟踪控制器;最后,在1∶70比例的补给船模型上进行了仿真模拟。结果表明:抗干扰同步跟踪控制器能够实现补给船与被补给船的同步航行,并保证闭环同步跟踪控制系统中的所有信号全局一致最终有界。 展开更多
关键词 航行补给 同步控制 干扰观测器 网络攻击 矢量反步法
下载PDF
Set-theoretic detection of data corruption attacks on cyber physical power systems 被引量:4
10
作者 Efstathios KONTOURAS Anthony TZES Leonidas DRITSAS 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期872-886,共15页
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control area... This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand. 展开更多
关键词 Power systems LOAD frequency control cyber-attacks Set-theoretic methods
原文传递
网络攻击下多智能体系统动态事件触发一致性 被引量:1
11
作者 王柳 胡爱花 江正仙 《控制与决策》 EI CSCD 北大核心 2023年第5期1295-1302,共8页
研究网络攻击下一般线性多智能体系统的动态事件触发一致性问题.考虑多智能体系统在受到网络攻击后,被攻击节点的状态会改变,导致与其相应的连接无法工作,设计修复策略恢复被攻击节点及其相应的连接,给出网络攻击下分布式事件触发控制协... 研究网络攻击下一般线性多智能体系统的动态事件触发一致性问题.考虑多智能体系统在受到网络攻击后,被攻击节点的状态会改变,导致与其相应的连接无法工作,设计修复策略恢复被攻击节点及其相应的连接,给出网络攻击下分布式事件触发控制协议.在静态事件触发机制基础上,通过引入动态阈值参数,提出动态事件触发机制.进一步,利用图论、线性矩阵不等式和李雅普诺夫函数方法,给出网络攻击下实现多智能体系统一致性的充分条件,并证明在所提出的动态事件触发条件下,能够有效避免芝诺行为.最后,通过仿真例子来验证理论结果的有效性. 展开更多
关键词 多智能体系统 网络攻击 动态事件触发机制 一致性 芝诺行为
原文传递
网络攻击下电力系统连锁故障仿真分析及处理 被引量:1
12
作者 李沁雪 钟伟伦 +1 位作者 曾岳烽 李瑞 《广州航海学院学报》 2023年第2期1-6,共6页
针对网络攻击下的电力系统防护和降损,对系统连锁故障进行仿真分析及应急处理:从攻击者的角度,采用合理的指标对电力系统进行线路分析,对关键线路发动攻击,并模拟网络攻击下连锁故障特征;从防御者的角度,采用图论方法对故障过程中形成... 针对网络攻击下的电力系统防护和降损,对系统连锁故障进行仿真分析及应急处理:从攻击者的角度,采用合理的指标对电力系统进行线路分析,对关键线路发动攻击,并模拟网络攻击下连锁故障特征;从防御者的角度,采用图论方法对故障过程中形成的孤岛进行判别,在此基础上计算负荷中断量,对系统进行有效的应急处理.实验结果表明:电力系统中关键线路在遭受网络攻击后,将引发严重连锁故障;即使电力系统发生含发电机的小区域解列,主系统也可采用科学有序的中断负荷方式恢复电力系统的正常运行,及时降低网络攻击后连锁故障带来的负面影响. 展开更多
关键词 电力系统 网络攻击 连锁故障 应急处理
下载PDF
基于多服务器互相验证的用户身份认证协议 被引量:4
13
作者 牛雨 《计算机仿真》 CSCD 北大核心 2016年第2期350-354,共5页
为了提高多服务器系统中用户身份验证的安全性,并提升验证效率,提出一种基于多服务器互相验证的用户身份认证协议。协议在用户注册阶段采用椭圆曲线理论和散列函数来加强用户密码的安全性。在验证信息提取阶段,根据用户信息的不同有效期... 为了提高多服务器系统中用户身份验证的安全性,并提升验证效率,提出一种基于多服务器互相验证的用户身份认证协议。协议在用户注册阶段采用椭圆曲线理论和散列函数来加强用户密码的安全性。在验证信息提取阶段,根据用户信息的不同有效期,提出了两种方案来执行服务器与用户私有密匙的验证机制。最后通过用户与服务器之间会话密钥的互相验证来确认访问权限。通过协议安全性及性能分析表明,上述协议相比基于椭圆曲线密码体制的用户认证协议和非交互的双通道连续流的身份验证协议,在防御网络重放攻击等黑客攻击上具有更高的安全性,且算法的身份验证效率分别提高了29.7%、34.2%。 展开更多
关键词 用户认证协议 多服务器互相验证体系 密钥协商 网络攻击
下载PDF
基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计 被引量:4
14
作者 刘金良 顾媛媛 费树岷 《中国科学:信息科学》 CSCD 北大核心 2018年第10期1348-1363,共16页
本文研究了基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计问题.为了节约网络传输带宽资源,本文引入事件触发机制降低负荷频率控制电力系统测量输出的传输量.考虑网络环境下随机网络攻击的影响,建立基于事件触发和网络攻... 本文研究了基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计问题.为了节约网络传输带宽资源,本文引入事件触发机制降低负荷频率控制电力系统测量输出的传输量.考虑网络环境下随机网络攻击的影响,建立基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波误差模型.基于此滤波误差模型,利用Lyapunov稳定性理论和线性矩阵不等式技术分别给出了负荷频率控制电力系统均方渐近稳定的充分性条件和H_∞滤波器设计方法,最后通过仿真算例验证本文所提H_∞滤波器设计方法的有效性. 展开更多
关键词 电力系统 事件触发 网络攻击 H∞滤波 网络化控制系统
原文传递
An ensemble deep learning based IDS for IoT using Lambda architecture
15
作者 Rubayyi Alghamdi Martine Bellaiche 《Cybersecurity》 EI CSCD 2023年第3期1-17,共17页
The Internet of Things(IoT)has revolutionized our world today by providing greater levels of accessibility,connectivity and ease to our everyday lives.It enables massive amounts of data to be traversed across multiple... The Internet of Things(IoT)has revolutionized our world today by providing greater levels of accessibility,connectivity and ease to our everyday lives.It enables massive amounts of data to be traversed across multiple heterogeneous devices that are all interconnected.This phenomenon makes IoT networks vulnerable to various network attacks and intrusions.Building an Intrusion Detection System(IDS)for IoT networks is challenging as they enable a massive amount of data to be aggregated,which is difficult to handle and analyze in real time mainly because of the heterogeneous nature of IoT devices.This inefficient,traditional IDS approach accentuates the need to develop advanced IDS techniques by employing Machine or Deep Learning.This paper presents a deep ensemble-based IDS using Lambda architecture by following a multi-pronged classification approach.Binary classification uses Long Short Term Memory(LSTM)to differentiate between malicious and benign traffic,while the multi-class classifier uses an ensemble of LSTM,Convolutional Neural Network and Artificial Neural Network classifiers to detect the type of attacks.The model training is performed in the batch layer,while real-time evaluation is carried out through model inferences in the speed layer of the Lambda architecture.The proposed approach gives high accuracy of over 99.93%and saves useful processing time due to the multi-pronged classification strategy and using the lambda architecture. 展开更多
关键词 IOT IDS Lambda architecture cyber-attacks Deep learning Ensemble learning
原文传递
Attack-resilient control for converter-based DC microgrids
16
作者 Sen Tan Juan C.Vasquez Josep M.Guerrero 《Global Energy Interconnection》 EI CSCD 2023年第6期751-757,共7页
In light of the growing integration of renewable energy sources in power systems,the adoption of DC microgrids has become increasingly popular,due to its simple structure,having no frequency,power factor concerns.Howe... In light of the growing integration of renewable energy sources in power systems,the adoption of DC microgrids has become increasingly popular,due to its simple structure,having no frequency,power factor concerns.However,the dependence of DC microgrids on cyber-networks also makes them susceptible to cyber-attacks.Potential cyberattacks can disrupt power system facilities and result in significant economic and loss of life.To address this concern,this paper presents an attack-resilient control strategy for microgrids to ensure voltage regulation and power sharing with stable operation under cyber-attack on the actuators.This paper first formulates the cyber-security problem considering a distributed generation based microgrid using the converter model,after which an attack-resilient control is proposed to eliminate the actuator attack impact on the system.Steady state analysis and root locus validation illustrate the feasibility of the proposed method.The effectiveness of the proposed control scheme is demonstrated through simulation results. 展开更多
关键词 cyber-attacks DC microgrids Resilient control
下载PDF
Fuzzy Unknown Input Observer for Estimating Sensor and Actuator Cyber‑Attacks in Intelligent Connected Vehicles
17
作者 Juntao Pan Anh‑Tu Nguyen +2 位作者 Sujun Wang Huifan Deng Hui Zhang 《Automotive Innovation》 EI CSCD 2023年第2期164-175,共12页
The detection and mitigation of cyber-attacks in connected vehicle systems(CVSs)are critical for ensuring the security of intelligent connected vehicles.This paper presents a solution to estimate sensor and actuator c... The detection and mitigation of cyber-attacks in connected vehicle systems(CVSs)are critical for ensuring the security of intelligent connected vehicles.This paper presents a solution to estimate sensor and actuator cyber-attacks in CVSs.A novel method is proposed that utilizes an augmented system representation technique and a nonlinear unknown input observer(UIO)to achieve asymptotic estimation of both CVS dynamics and cyber-attacks.The nonlinear CVS dynamics is represented in a Takagi–Sugeno(TS)fuzzy form with nonlinear consequents,which allows for the effective use of the differential mean value theorem to handle unmeasured premise variables.Furthermore,via Lyapunov stability theory sufficient conditions are proposed,expressed in terms of linear matrix inequalities,to design TS fuzzy UIO.Several test scenarios are performed with high-fidelity Simulink-CarSim co-simulations to show the effectiveness of the proposed cyber-attack estimation method. 展开更多
关键词 Connected vehicle systems cyber-attacks Unknown input observers Vehicle dynamics estimation Takagi-Sugeno fuzzy models
原文传递
Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks 被引量:2
18
作者 Yingjun Wu Hao Xu Ming Ni 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第4期750-759,共10页
With the widespread use of communication and information technology,power system has been evolving into cyber-physical power system(CPPS)and becoming more vulnerable to cyber-attacks.Therefore,it is necessary to enhan... With the widespread use of communication and information technology,power system has been evolving into cyber-physical power system(CPPS)and becoming more vulnerable to cyber-attacks.Therefore,it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks.This paper proposes a method to enhance the survivability of the communication and information system in CPPS.Firstly,the communication and information system for critical business of power system is decomposed into certain types of atomic services,and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed.Secondly,considering the efficacy and cost defensive resources,a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS.Then,a modified genetic algorithm is adopted to solve the proposed model.Finally,the simulation results of CPPS for an IEEE 30-node system verify the proposed method. 展开更多
关键词 cyber-physical power system(CPPS) cyber-attacks survivability evaluation communication and information system defensive resource
原文传递
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
19
作者 Tala Talaei Khoei Hadjar Ould Slimane Naima Kaabouch 《Communications and Network》 2022年第4期119-170,共52页
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba... One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. 展开更多
关键词 Smart Grid Architecture cyber-attacks Network Security CONFIDENTIALITY Integrity Availability ACCOUNTABILITY Countermeasures Detection Techniques
下载PDF
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
20
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部