TY - JOUR
T1 - Brief Survey on Attack Detection Methods for Cyber-Physical Systems
AU - Tan, Sen
AU - Guerrero, Josep M.
AU - Xie, Peilin
AU - Han, Renke
AU - Vasquez, Juan C.
PY - 2020
Y1 - 2020
N2 - In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication networks makes CPSs vulnerable to intentional cyberattacks. Therefore, a great number of attack detection methods have been proposed to enforce security of CPSs. In this article, various false data injection attack detection methods presented for CPSs are investigated and reviewed. According to the knowledge of control information, the controllers of CPSs are categorized as centralized and distributed controllers. Existing centralized attack detection approaches are discussed in terms of i) linear time-invariant systems, ii) actuator and sensor attacks, iii) nonlinear systems, and iv) systems with noise. Furthermore, the development of distributed attack detection is reviewed according to different decoupling methods. Some challenges and future research directions in the context of attack detection approaches are provided.
AB - In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication networks makes CPSs vulnerable to intentional cyberattacks. Therefore, a great number of attack detection methods have been proposed to enforce security of CPSs. In this article, various false data injection attack detection methods presented for CPSs are investigated and reviewed. According to the knowledge of control information, the controllers of CPSs are categorized as centralized and distributed controllers. Existing centralized attack detection approaches are discussed in terms of i) linear time-invariant systems, ii) actuator and sensor attacks, iii) nonlinear systems, and iv) systems with noise. Furthermore, the development of distributed attack detection is reviewed according to different decoupling methods. Some challenges and future research directions in the context of attack detection approaches are provided.
KW - Centralized detection
KW - cyberattacks
KW - Cyber Physical Systems
KW - distributed detection
KW - false data injection attack
UR - http://www.scopus.com/inward/record.url?scp=85090764783&partnerID=8YFLogxK
U2 - 10.1109/JSYST.2020.2991258
DO - 10.1109/JSYST.2020.2991258
M3 - Journal article
SN - 1932-8184
VL - 14
SP - 5329
EP - 5339
JO - I E E E Systems Journal
JF - I E E E Systems Journal
IS - 4
M1 - 9097420
ER -