ﻻ يوجد ملخص باللغة العربية
Cyber-physical-social connectivity is a key element in Intelligent Transportation Systems (ITSs) due to the ever-increasing interaction between human users and technological systems. Such connectivity translates the ITSs into dynamical systems of socio-technical nature. Exploiting this socio-technical feature to our advantage, we propose a cyber-attack detection scheme for ITSs that focuses on cyber-attacks on freeway traffic infrastructure. The proposed scheme combines two parallel macroscopic traffic model-based Partial Differential Equation (PDE) filters whose output residuals are compared to make decision on attack occurrences. One of the filters utilizes physical (vehicle/infrastructure) sensor data as feedback whereas the other utilizes social data from human users mobile devices as feedback. The Social Data-based Filter is aided by a fake data isolator and a social signal processor that translates the social information into usable feedback signals. Mathematical convergence properties are analyzed for the filters using Lyapunovs stability theory. Lastly, we validate our proposed scheme by presenting simulation results.
In this paper a novel approach to co-design controller and attack detector for nonlinear cyber-physical systems affected by false data injection (FDI) attack is proposed. We augment the model predictive controller with an additional constraint requir
Assuring the correct behavior of cyber-physical systems requires significant modeling effort, particularly during early stages of the engineering and design process when a system is not yet available for testing or verification of proper behavior. A
For a class of Cyber-Physical Systems (CPSs), we address the problem of performing computations over the cloud without revealing private information about the structure and operation of the system. We model CPSs as a collection of input-output dynami
The distributed cooperative controllers for inverter-based systems rely on communication networks that make them vulnerable to cyber anomalies. In addition, the distortion effects of such anomalies may also propagate throughout inverter-based cyber-p
Existing coordinated cyber-attack detection methods have low detection accuracy and efficiency and poor generalization ability due to difficulties dealing with unbalanced attack data samples, high data dimensionality, and noisy data sets. This paper