计算机安全
杠杆(统计)
工业控制系统
对抗制
对手
观点
数码产品
异常检测
计算机科学
控制(管理)
分离(微生物学)
工程类
人工智能
艺术
微生物学
电气工程
视觉艺术
生物
作者
Renjie Ma,Zhijian Hu,Hongyan Yang,Yuchen Jiang,Mingyi Huo,Hao Luo,Rongni Yang
出处
期刊:IEEE Industrial Electronics Magazine
[Institute of Electrical and Electronics Engineers]
日期:2023-07-31
卷期号:18 (2): 48-57
被引量:9
标识
DOI:10.1109/mie.2023.3292988
摘要
With the rapid developments in computational and communication resources, modern industrial electronics systems can leverage networked structures to realize wireless remote control. However, owing to the intrinsically more open attributes of their cyberrealms, an adversary could eavesdrop on the sensitive information of control systems to elaborate insidious false data injection (FDI) attacks, leading to the destruction of safety performance at the control systems level while potentially also performing disguising capabilities against traditional anomaly detectors. In this article, we first introduce three kinds of FDI attack monitoring architectures while discussing their applicability to stealthy corruptions and capturing their advantages and deficiencies. Then, we discuss the significant meanings of FDI attack monitoring for deploying secure defense control, where the interconnections as well as the distinctions between safety and security, the methodologies of isolation and compensation for FDI attack-resilient control, and their great potential of integration with information security and machine learning techniques are discussed. Finally, a case study of an autonomous robot in an industrial electronics system is performed to provide viewpoints for researchers and practitioners. The purpose of this review is to retrospect the representative results on FDI attack monitoring and control and provide meticulous insights to advance the developments in safety and reliability of cyberphysical systems (CPSs).
科研通智能强力驱动
Strongly Powered by AbleSci AI