kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Networked Control Systems
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). Digital Futures .ORCID iD: 0000-0003-1835-2963
Univ Notre Dame, Dept Elect Engn, Notre Dame, IN 46556 USA..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). Digital Futures .ORCID iD: 0000-0001-9940-5929
2022 (English)In: ANNUAL REVIEW OF CONTROL ROBOTICS AND AUTONOMOUS SYSTEMS, ISSN 2573-5144, Vol. 5, no 1, p. 445-464Article, review/survey (Refereed) Published
Abstract [en]

Cyber-vulnerabilities are being exploited in a growing number of control systems. As many of these systems form the backbone of critical infrastructure and are becoming more automated and interconnected, it is of the utmost importance to develop methods that allow system designers and operators to do risk analysis and develop mitigation strategies. Over the last decade, great advances have been made in the control systems community to better understand cyber-threats and their potential impact. This article provides an overview of recent literature on secure networked control systems. Motivated by recent cyberattacks on the power grid, connected road vehicles, and process industries, a system model is introduced that covers many of the existing research studies on control system vulnerabilities. An attack space is introduced that illustrates how adversarial resources are allocated in some common attacks. The main part of the article describes three types of attacks: false data injection, replay, and denial-of-service attacks. Representative models andmathematical formulations of these attacks are given along with some proposed mitigation strategies. The focus is on linear discrete-time plant models, but various extensions are presented in the final section, which also mentions some interesting research problems for future work.

Place, publisher, year, edition, pages
Annual Reviews , 2022. Vol. 5, no 1, p. 445-464
Keywords [en]
attack space, false data injection attack, replay attack, denial-of-service attack, networked control systems, cyber-physical security
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-313342DOI: 10.1146/annurev-control-072921-075953ISI: 000795864800018Scopus ID: 2-s2.0-85129871075OAI: oai:DiVA.org:kth-313342DiVA, id: diva2:1663384
Note

QC 20220602

Available from: 2022-06-02 Created: 2022-06-02 Last updated: 2025-01-03Bibliographically approved

Open Access in DiVA

fulltext(3213 kB)55 downloads
File information
File name FULLTEXT01.pdfFile size 3213 kBChecksum SHA-512
a2fa8de899d962a3f078062ee6d6e9c4d3b5fcafba85d3374e9712c3a3307e02492ced9c9450f8b7bc7256d568ec281e1d3dce24a3509dc7326079f95ff29cda
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Sandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Sandberg, HenrikJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 55 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 195 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf