A systems and control perspective of CPS security

Annual Reviews in Control - Tập 47 - Trang 394-411 - 2019
Seyed Mehran Dibaji1, Mohammad Pirani2, David Bezalel Flamholz1, Anuradha M. Annaswamy1, Karl Henrik Johansson2, Aranya Chakrabortty3
1Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA, USA
2Department of Automatic Control, KTH Royal Institute of Technology, Sweden
3Department of Electrical Engineering, North Carolina State University, Raleigh, NC, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Abbas, 2018, Improving network connectivity and robustness using trusted nodes with application to resilient consensus, IEEE Transactions on Control of Network Systems, 5, 2036, 10.1109/TCNS.2017.2782486

Abdo, 2018, A safety/security risk analysis approach of industrial control systems: a cyber bowtie–combining new version of attack tree with bowtie analysis, Computers & Security, 72, 175, 10.1016/j.cose.2017.09.004

Abhinav, 2019, Resilient Cooperative Control of DC Microgrids, IEEE Transactions on Smart Grid, 10, 1083, 10.1109/TSG.2018.2872252

Accident to the Airbus A320-211, (2015) Registered D-AIPX and operated by Germanwings, flight GWI18G, on 03/24/15 at Prads-Haute-Blone, Available online at https://www.bea.aero/uploads/tx_elydbrapports/d-px150324.en.pdf (Accessed: 2018-08-3).

Adhikari, 2017, WAMS cyber-physical test bed for power system, cybersecurity study, and data mining, IEEE Transactions on Smart Grid, 8, 2744, 10.1109/TSG.2016.2537210

Ahmed, 2015, A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks, Frontiers of Computer Science, 9, 280, 10.1007/s11704-014-4212-5

Ahmed, 2018, Cooperative vehicular networking: a survey, IEEE Transactions on Intelligent Transportation Systems, 19, 996, 10.1109/TITS.2018.2795381

Alam, 2016, Introduction to intelligent transportation systems, 1

Algorand. (2018). Available online at https://www.algorand.com/ (Accessed: 2018-07-18).

Almalawi, 2014, An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems, Computers & Security, 46, 94, 10.1016/j.cose.2014.07.005

Amin, 2009, Safe and secure networked control systems under denial-of-service attacks, 31

Amin, 2013, Cyber security of water SCADA systems-part I: analysis and experimentation of stealthy deception attacks, IEEE Transactions on Control Systems Technology, 21, 1963, 10.1109/TCST.2012.2211873

Amin, 2013, Security of interdependent and identical networked control systems, Automatica, 49, 186, 10.1016/j.automatica.2012.09.007

Amoozadeh, 2015, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Communications Magazine, 53, 126, 10.1109/MCOM.2015.7120028

Andersson, 2012, Cyber-security of SCADA systems, IEEE PES Innovative Smart Grid Technologies, 1

Annaswamy, 2016, Emerging research topics in control for smart infrastructures, Annual Reviews in Control, 42, 259, 10.1016/j.arcontrol.2016.10.001

Anwar, 2017, Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements, Journal of Computer and System Sciences, 83, 58, 10.1016/j.jcss.2016.04.005

Ashok, 2017, Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid, Proceedings of the IEEE, 105, 1389, 10.1109/JPROC.2017.2686394

Bai, 2015, Security in stochastic control systems: Fundamental limitations and performance bounds, 195

Bai, 2017, Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs, Automatica, 82, 251, 10.1016/j.automatica.2017.04.047

Barbosa, 2013, Flow whitelisting in SCADA networks, International Journal of Critical Infrastructure Protection, 6, 150, 10.1016/j.ijcip.2013.08.003

Baros, 2017

Barreno, 2006, Can machine learning be secure?, 16

Bi, 2017, Graph-based cyber security analysis of state estimation in smart power grid, IEEE Communications Magazine, 2, 10.1109/MCOM.2017.1600210C

Bishop, 2005

Bobba, 2012, Enhancing grid measurements: Wide area measurement systems, NASPInet, and security, IEEE Power Energy Magazine, 10, 67, 10.1109/MPE.2011.943133

Bradbury, 2012, SCADA: a critical vulnerability, Computer Fraud & Security, 11, 10.1016/S1361-3723(12)70030-1

Brown, 2018, Risk of cyber-physical attack via load with emulated inertia control, IEEE Transactions on Smart Grid, 9, 5854, 10.1109/TSG.2017.2697823

Brown, 2019, Security against impersonation attacks in distributed systems, IEEE Transactions on Control of Network Systems, 6, 440, 10.1109/TCNS.2018.2838519

Brown, P. N., & Marden, H. B. N. J. R. (2017). Are multiagent systems resilient to communication failures? arXiv:1711.00609.

Bruneau, 2003, A framework to quantitatively assess and enhance the seismic resilience of communities, Earthquake Spectra, 19, 733, 10.1193/1.1623497

Burmester, 2012, Modeling security in cyber–physical systems, International Journal of Critical Infrastructure Protection, 5, 118, 10.1016/j.ijcip.2012.08.002

Cárdenas, 2011, Attacks against process control systems: risk assessment, detection, and response, 355

Cárdenas, 2008, Research challenges for the security of control systems

Cardenas, 2008, Secure control: Towards survivable cyber-physical systems, 495

Case, 2016, Analysis of the cyber attack on the Ukrainian power grid, Electricity Information Sharing and Analysis Center (E-ISAC)

Cetinkaya, 2017, Networked control under random and malicious packet losses, IEEE Transactions on Automatic Control, 62, 2434, 10.1109/TAC.2016.2612818

Cetinkaya, 2019, An overview on Denial-of-Service attacks in control systems: Attack models and security analyses, Entropy, 21

Chakhchoukh, 2015, Coordinated cyber-attacks on the measurement function in hybrid state estimation, IEEE Transactions on Power Systems, 30, 2487, 10.1109/TPWRS.2014.2357182

Chakhchoukh, 2017, LTS-based robust hybrid SE integrating correlation, IEEE Transactions on Power Systems, 32, 3127, 10.1109/TPWRS.2016.2632723

Chen, 2015

Chen, 2017, Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: a contract design approach, IEEE Transactions on Information Forensics and Security, 12, 2736, 10.1109/TIFS.2017.2718489

Chen, 2014, A study on Advanced Persistent Threats, 63

Chen, 2010, Stuxnet, the real start of cyber warfare?[Editor’s note], IEEE Network, 24, 2, 10.1109/MNET.2010.5634434

Chen, 2017, Dynamic attack detection in cyber-physical systems with side initial state information, IEEE Transactions on Automatic Control, 62, 4618, 10.1109/TAC.2016.2626267

Cherdantseva, 2016, A review of cyber security risk assessment methods for SCADA systems, Computers & Security, 56, 1, 10.1016/j.cose.2015.09.009

Cherdantseva, 2012

Cherdantseva, 2013, A reference model of information assurance & security, 546

Cho, 2017, Cyber security in nuclear industry–Analytic study from the terror incident in nuclear power plants (NPPs), Annals of Nuclear Energy, 99, 47, 10.1016/j.anucene.2016.09.024

Chung, 1997

Clark, 2013, An impact-aware defense against Stuxnet, 4140

Corts, 2016, Differential privacy in control and network systems, 4252

Cyber security and resilience of intelligent public transport: Good practices and recommendations. Technical Report. (2016) European Union Agency For Network And Information Security. Available online at https://www.enisa.europa.eu/publications/good-practices-recommendations/at_download/fullReport (Accessed: 2019-01-15).

Cybersecurity Funding 21. Cybersecurity Funding. (2019) Retrieved from https://www.whitehouse.gov/ (Accessed: 2019-01-15).

Darup, 2018, Towards encrypted MPC for linear constrained systems, IEEE Control Systems Letters, 2, 195, 10.1109/LCSYS.2017.2779473

Data Breach Investigations Report, 2009

Data Breach Investigations Report. (2015). Technical Report, Retrieved from https://www.verizonenterprise.com/ (Accessed: 2019-01-15).

De Persis, 2001, A geometric approach to nonlinear fault detection and isolation, IEEE Transactions on Automatic Control, 46, 853, 10.1109/9.928586

De Persis, 2014, On resilient control of nonlinear systems under denial-of-service, 5254

De Persis, 2015, Input-to-state stabilizing control under Denial-of-Service, IEEE Transactions on Automatic Control, 60, 2930, 10.1109/TAC.2015.2416924

De Persis, 2018, A comparison among deterministic packet-dropouts models in networked control systems, IEEE Control Systems Letters, 2, 109, 10.1109/LCSYS.2017.2759423

Dibaji, 2017, Resilient consensus of second-order agent networks: Asynchronous update rules with delays, Automatica, 81, 123, 10.1016/j.automatica.2017.03.008

Dibaji, 2018, Resilient randomized quantized consensus, IEEE Transactions on Automatic Control, 63, 2508, 10.1109/TAC.2017.2771363

Dibaji, 2018, Secure control of power systems: Confidentiality and integrity threats, 7269

Dibaji, 2019, Resilient distributed averaging

Diffie, 1976, New directions in cryptography, IEEE Transactions on Information Theory, 22, 644, 10.1109/TIT.1976.1055638

Ding, 2018, A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, 275, 1674, 10.1016/j.neucom.2017.10.009

Ding, 2017, A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, 194, 10.1016/j.automatica.2016.12.020

Ding, 2016, Deception-based sensor scheduling for remote estimation under DoS attacks, 169

Do, 2017, 21, 746

du Pin Calmon, 2012, Privacy against statistical inference, 1401

Dwork, 2011, Differential privacy, 338

Fagnant, 2015, Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations, Transportation Research Part A: Policy and Practice, 77, 167

Falliere, N., Murchu, L. O., & Chien, E. (2018). W32. Stuxnet dossier: Symantec security response. Technical Report, Symantec, Available online at https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (Accessed: 2018-08-05).

Farokhi, 2017, Secure and private control using semi-homomorphic encryption, Control Engineering Practice, 67, 13, 10.1016/j.conengprac.2017.07.004

Farokhi, 2017, Private and secure coordination of match-making for heavy-duty vehicle platooning, 7345

Fawzi, 2012, Security for control systems under sensor and actuator attacks, Proceedings of IEEE conference on decision and control, 3412

Fawzi, 2014, Secure estimation and control for cyber-physical systems under adversarial attacks, IEEE Transactions on Automatic Control, 59, 1454, 10.1109/TAC.2014.2303233

Felegyhazi, 2006, Game theory in wireless networks: A tutorial

Ferdowsi, A., Saad, W., & Mandayam, N. B. (2017). Colonel Blotto game for secure state estimation in interdependent critical infrastructure. arXiv:1709.09768.

Ferrari, 2017, Detection and isolation of routing attacks through sensor watermarking, 5436

Ferrari, 2017, Detection and isolation of replay attacks through sensor watermarking, 7363

Flamholz, 2019, Baiting for defense against stealthy attacks on cyber-physical systems, 2338

Fovino, 2009, An experimental investigation of malware attacks on scada systems, International Journal of Critical Infrastructure Protection, 2, 139, 10.1016/j.ijcip.2009.10.001

Frasca, 2015, Distributed randomized algorithms for opinion formation, centrality computation and power systems estimation: A tutorial overview, European Journal of Control, 24, 2, 10.1016/j.ejcon.2015.04.002

Garcia-Teodoro, 2009, Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, 28, 18, 10.1016/j.cose.2008.08.003

GhasemiGol, 2016, A comprehensive approach for network attack forecasting, Computers & Security, 58, 83, 10.1016/j.cose.2015.11.005

Gil, 2017, Guaranteeing spoof-resilient multi-robot networks, Autonomous Robots, 41, 1383, 10.1007/s10514-017-9621-5

Giraldo, 2018, A survey of physics-based attack detection in cyber-physical systems, ACM Computing Surveys, 51, Artilce76, 10.1145/3203245

Góes, 2017, Stealthy deception attacks for cyber-physical systems, 4224

Gomez-Exposito, 2004

Greenberg, 2018

Greenberg, 2017

Gross, 2005

Guerrero-Bonilla, 2017, Formations for resilient robot teams, IEEE Robotics and Automation Letters, 2, 841, 10.1109/LRA.2017.2654550

Guo, 2017, Optimal linear cyber-attack on remote state estimation, IEEE Transactions on Control of Network Systems, 4, 4, 10.1109/TCNS.2016.2570003

Guo, 2018, Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 89, 117, 10.1016/j.automatica.2017.11.018

Gupta, 2010, Optimal control in the presence of an intelligent jammer with limited actions, 1096

Gupta, 2017, Privacy in distributed average consensus, 9515

Gusrialdi, 2019, Smart grid security: Attacks and defenses, 199

Hackmageddon: Information security timelines and statistics. Accessed: 2018-08-3. https://www.hackmageddon.com/.

Harding, 2014, Vehicle-to-vehicle communications: Readiness of V2V technology for application

Hartmann, 2013, The vulnerability of UAVs to cyber attacks-An approach to the risk assessment, 1

Haus, 2014, Trust-based self-organising network control, IET Control Theory & Applications, 8, 2126, 10.1049/iet-cta.2014.0333

He, 2016, Real-time detection of false data injection attacks in smart grids: A deep learning-based intelligent mechanism, IEEE Transactions on Smart Grid, 8, 1

Heemels, 2012, An introduction to event-triggered and self-triggered control, 3270

Hein, 2017, Formal guarantees on the robustness of a classifier against adversarial manipulation, 2266

Hirzallah, 2018, On the computation of worst attacks: a LP framework, 4527

Hoehn, 2016, Detection of covert attacks and zero dynamics attacks in cyber-physical systems, 302

Hoory, 2006, Expander graphs and their applications, Bulletin of the American Mathematical Society, 43, 439, 10.1090/S0273-0979-06-01126-8

Hoppe, 2008, Security threats to automotive can networks–practical examples and selected short-term countermeasures, 235

Horák, 2017, Manipulating adversarys belief: A dynamic game approach to deception by design for proactive network security, 273

Hu, 2018, State estimation under false data injection attacks: Security analysis and system protection, Automatica, 87, 176, 10.1016/j.automatica.2017.09.028

Huang, 2011, Adversarial machine learning, 43

Huang, S., Papernot, N., Goodfellow, I., Duan, Y., & Abbeel, P. (2017). Adversarial attacks on neural network policies. arXiv:1702.02284.

Huang, 2018, An Online Detection Framework for Cyber Attacks on Automatic Generation Control, IEEE Transactions on Power Systems, 33, 6816, 10.1109/TPWRS.2018.2829743

Huitsing, 2008, Attack taxonomies for the modbus protocols, International Journal of Critical Infrastructure Protection, 1, 37, 10.1016/j.ijcip.2008.08.003

Humayed, 2017, Cyber-physical systems securitya survey, IEEE Internet of Things Journal, 4, 1802, 10.1109/JIOT.2017.2703172

Jafarnejadsani, 2017, Dual-rate ℓ1 adaptive controller for cyber-physical sampled-data systems, 6259

Jafarnia-Jahromi, 2012, GPS vulnerability to spoofing threats and a review of antispoofing techniques, International Journal of Navigation and Observation, 1, 10.1155/2012/127072

Jajodia, 2011, Vol. 54

Javed, 2017, On the interrelation of security, QoS, and safety in cooperative ITS, IEEE Transactions on Intelligent Transportation Systems, 18, 1943, 10.1109/TITS.2016.2614580

Jiang, 2006, Trust evaluation in anarchy: A case study on autonomous networks, 1

Kailkhura, B., Han, Y. S., Brahma, S., & Varshney, P. K. (2013). Distributed Bayesian detection with Byzantine data. arXiv:1307.3544.

Katz, 1996

Kern, 2007

Khan, 2013, Secure distributed estimation in cyber-physical systems, 5209

Khanafer, 2013, 1

Khargonekar, 2015, Enabling research for infrastructure resilience: An NSF perspective

Khazraei, 2017, Replay attack detection in a multi agent system using stability analysis and loss effective watermarking, 4778

Kikuya, 2018, Fault-tolerant clock synchronization over unreliable channels in wireless sensor networks, IEEE Transactions on Control of Network Systems, 5, 1551, 10.1109/TCNS.2017.2732169

Kim, 2016, Zero-stealthy attack for sampled-data control systems: The case of faster actuation than sensing, 5956

Ko, 2016, Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems, 416

Koscher, 2010, Experimental security analysis of a modern automobile, Proceedings of IEEE symposium on security and privacy, 447

Krotofil, 2014, Vulnerabilities of cyber-physical systems to stale data determining the optimal time to launch attacks, International Journal of Critical Infrastructure Protection, 7, 213, 10.1016/j.ijcip.2014.10.003

Kurmanaev, 2019

Kwon, 2014, Analysis and design of stealthy cyber attacks on unmanned aerial systems, Journal of Aerospace Information Systems, 11, 525, 10.2514/1.I010201

La, 2017, Estimation of externalities in interdependent security: A case study of large systems, 3961

Lamnabhi-Lagarrigue, 2017, Systems & control for the future of humanity, research agenda: Current and future roles, impact and grand challenges, Annual Reviews in Control, 43, 1, 10.1016/j.arcontrol.2017.04.001

LeBlanc, 2018, Resilient first-order consensus and weakly stable, higher order synchronization of continuous-time networked multiagent systems, IEEE Transactions on Control of Network Systems, 5, 1219, 10.1109/TCNS.2017.2696364

LeBlanc, 2013, Resilient asymptotic consensus in robust networks, IEEE Journal on Selected Areas in Communications, 31, 766, 10.1109/JSAC.2013.130413

Lei, 2016, Event-based distributed state estimation over a WSN with false data injection attack, 286

Li, 2017, Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system, Journal of Parallel and Distributed Computing, 103, 32, 10.1016/j.jpdc.2016.12.012

Li, 2017, Cybersecurity in distributed power systems, Proceedings of the IEEE, 105, 1367, 10.1109/JPROC.2017.2687865

Liang, 2017, A review of false data injection attacks against modern power systems, IEEE Transactions on Smart Grid, 8, 1630, 10.1109/TSG.2015.2495133

Liao, 2018, Optimization algorithms for catching data manipulators in power system estimation loops, IEEE Transactions on Control Systems Technology, 1

Lippmann, 2000, Improving intrusion detection performance using keyword selection and neural networks, Computer Networks, 34, 597, 10.1016/S1389-1286(00)00140-7

Liu, 2017, Resilient control strategy of cyber-physical system under DoS attacks, 7760

Liu, 2017, False data attack models, impact analyses and defense strategies in the electricity grid, The Electricity Journal, 30, 35, 10.1016/j.tej.2017.04.001

Liu, 2009, 14, 21

Lu, 2016, On resilience analysis and quantification for wide-area control of power systems, 5799

Lucia, W., Sinopoli, B., & Franze, G. (2016). Networked constrained cyber-physical systems subject to malicious attacks: A resilient set-theoretic control approach. arXiv:1603.07984.

Lynch, 1996

Macwan, 2016, Collaborative defense against data injection attack in iec61850 based smart substations, 1

Magiera, 2015, Detection and mitigation of gps spoofing based on antenna array processing, Journal of Applied Research and Technology, 13, 45, 10.1016/S1665-6423(15)30004-3

Manadhata, 2011, An attack surface metric, IEEE Transactions on Software Engineering, 37, 371, 10.1109/TSE.2010.60

Manshaei, 2013, Game theory meets network security and privacy, ACM Computing Surveys, 45, 53, 10.1145/2480741.2480742

Marden, 2009, Cooperative control and potential games, IEEE Transactions on Systems, Man, and Cybernetics, 39, 1393, 10.1109/TSMCB.2009.2017273

Massoumnia, 1989, Failure detection and identification, IEEE Transactions on Automatic Control, 34, 316, 10.1109/9.16422

McLaughlin, 2016, The cybersecurity landscape in industrial control systems, Proceedings of the IEEE, 104, 1039, 10.1109/JPROC.2015.2512235

Miao, 2018, A hybrid stochastic game for secure control of cyber-physical systems, Automatica, 93, 55, 10.1016/j.automatica.2018.03.012

Mikulski, 2011, Trust dynamics in multi-agent coalition formation

Mikulski, 2014, Trust-based coalition formation in multi-agent systems, The Journal of Defense Modeling and Simulation, 11, 19, 10.1177/1548512912454763

Milanese, 2013

Milani, 2018, Equilibrium point analysis and power sharing methods for distribution systems driven by solid-state transformers, IEEE Transactions on Power Systems, 33, 1473, 10.1109/TPWRS.2017.2720540

Miloševič, 2017, Analysis and mitigation of bias injection attacks against a Kalman filter, 8393

Mishra, 2017, Secure state estimation against sensor attacks in the presence of noise, IEEE Transactions on Control of Network Systems, 4, 49, 10.1109/TCNS.2016.2606880

Mitra, 2018, Distributed observers for LTI systems, IEEE Transactions on Automatic Control, 63, 3689, 10.1109/TAC.2018.2798998

Mo, 2014, Detecting integrity attacks on scada systems, IEEE Transactions on Control Systems Technology, 22, 1396, 10.1109/TCST.2013.2280899

Mo, 2014, Resilient detection in the presence of integrity attacks, IEEE Transactions on Signal Processing, 62, 31, 10.1109/TSP.2013.2284145

Mo, 2017, Privacy preserving average consensus, IEEE Transactions on Automatic Control, 62, 753, 10.1109/TAC.2016.2564339

Mo, 2015, Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs, IEEE Control Systems Magazine, 35, 93, 10.1109/MCS.2014.2364724

Moghadam, R., & Modares, H. (2017). Attack analysis for distributed control systems: An internal model principle approach. arXiv:1710.03856.

Momani, M., & Challa, S. (2010). Survey of trust models in different network domains. arXiv:1010.0168.

Motwani, 2010

Murguia, 2017, Reachable sets of hidden CPS sensor attacks: Analysis and synthesis tools

Naghnaeian, M., Hirzallah, N., & Voulgaris, P. G. (2015). Dual rate control for security in cyber-physical systems. arXiv:1504.07586.

Ng, 2018

Nicol, 2004, Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, 1, 48, 10.1109/TDSC.2004.11

Nordell, 2012, Terms of protection: The many faces of smart grid security, IEEE Power and Energy Magazine, 10, 18, 10.1109/MPE.2011.943194

Nozari, 2017, Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, Automatica, 81, 221, 10.1016/j.automatica.2017.03.016

Ntalampiras, 2016, Automatic identification of integrity attacks in cyber-physical systems, Expert Systems with Applications, 58, 164, 10.1016/j.eswa.2016.04.006

Nudell, 2015, A real-time attack localization algorithm for large power system networks using graph-theoretic techniques, IEEE Transactions on Smart Grid, 6, 2551, 10.1109/TSG.2015.2406571

Onyeji, 2014, Cyber security and critical energy infrastructure, The Electricity Journal, 27, 52, 10.1016/j.tej.2014.01.011

Pajic, 2017, Attack-resilient state estimation for noisy dynamical systems, IEEE Transactions on Control of Network Systems, 4, 82, 10.1109/TCNS.2016.2607420

Pal, 2018, Classification and detection of PMU data manipulation attacks using transmission line parameters, IEEE Transactions on Smart Grid, 9, 5057, 10.1109/TSG.2017.2679122

Pan, 1999, H–infinity control of large scale jump linear systems via averaging and aggregation, International Journal of Control, 72, 866, 10.1080/002071799220605

Parkinson, 2017, Cyber threats facing autonomous and connected vehicles: Future challenges, IEEE Transactions on Intelligent Transportation Systems, 18, 2898, 10.1109/TITS.2017.2665968

Pasqualetti, 2012, Consensus computation in unreliable networks: A system theoretic approach, IEEE Transactions on Automatic Control, 57, 90, 10.1109/TAC.2011.2158130

Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, 58, 2715

Pasqualetti, 2015, Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems, IEEE Control Systems Magazine, 35, 110, 10.1109/MCS.2014.2364725

Pasqualetti, 2015, A divide-and-conquer approach to distributed attack identification, 5801

Pawlick, 2015, Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats, 289

Petit, 2015, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent Transportation Systems, 16, 546

Pirani, 2016, On the smallest eigenvalue of grounded Laplacian matrices, IEEE Transaction on Automatic Control, 61, 509

Pramod, 2015, Polynomial based scheme for secure SCADA operations, Procedia Technology, 21, 474, 10.1016/j.protcy.2015.10.027

Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. Retrieved from https://obamawhitehouse.archives.gov.

Rani, 2016, Security of unmanned aerial vehicle systems against cyber-physical attacks, The Journal of Defense Modeling and Simulation, 13, 331, 10.1177/1548512915617252

Reddy, 2013, Neural networks for intrusion detection and its applications, Vol. 2, 3

Rezai, 2013, Secure SCADA communication by using a modified key management scheme, ISA Transactions, 52, 517, 10.1016/j.isatra.2013.02.005

Rieger, 2009, Resilient control systems: Next generation design research, 632

Rus, 2018

Shitharth, 2017, An enhanced optimization based algorithm for intrusion detection in SCADA network, Computers & Security, 70, 16, 10.1016/j.cose.2017.04.012

Saltzer, 1975, The protection of information in computer systems, Proceedings of the IEEE, 63, 1278, 10.1109/PROC.1975.9939

Sandberg, 2015, Special issue on cyberphysical security in networked control systems, IEEE Control Systems Magazine, 35

Sandberg, 2010, On security indices for state estimators in power networks

Sandberg, 2016, From control system security indices to attack identifiability, 1

Sanjab, 2016, On bounded rationality in cyber-physical systems security: Game-theoretic analysis with application to smart grid protection, 10.1109/CPSRSG.2016.7684101

Sanjab, A., Saad, W., & Başar, T. (2017). Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. arXiv:1702.04240.

Sanjab, 2016

Satchidanandan, 2017, Dynamic watermarking: Active defense of networked cyber–physical systems, Proceedings of the IEEE, 105, 219, 10.1109/JPROC.2016.2575064

Satchidanandan, 2018, Control systems under attack: The securable and unsecurable subspaces of a linear stochastic system, Emerging Applications of Control and Systems Theory, 217, 10.1007/978-3-319-67068-3_16

Satchidanandan, 2018, On the operational significance of the securable subspace for partially observed linear stochastic systems, Proceedings of IEEE conference on decision and control, 2068

Shahrivar, 2017, Spectral and structural properties of random interdependent networks, Automatica, 83, 234, 10.1016/j.automatica.2017.06.024

Shannon, 1949, Communication theory of secrecy systems, Bell System Technical Journal, 28, 656, 10.1002/j.1538-7305.1949.tb00928.x

Sherif, 2017, Privacy-preserving ride sharing scheme for autonomous vehicles in big data era, IEEE Internet of Things Journal, 4, 611, 10.1109/JIOT.2016.2569090

Shoukry, 2018, SMT-based observer design for cyber-physical systems under sensor attacks, ACM Transactions on Cyber-Physical Systems, 2, 5, 10.1145/3078621

Siegel, 2018, A survey of the connected vehicle landscape architectures, enabling technologies, applications, and development areas, IEEE Transactions on Intelligent Transportation Systems, 19, 2391, 10.1109/TITS.2017.2749459

Slay, 2007, Lessons learned from the Maroochy water breach, 73

Sniper attack on California power grid may have been ‘an insider,’ DHS says. (2015), Availble online at https://money.cnn.com/2015/10/16/technology/sniper-power-grid/index.html (Accessed: 2018-08-05).

Sridhar, 2012, Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 100, 210, 10.1109/JPROC.2011.2165269

Stoustrup, 2019

Sucasas, 2016, An autonomous privacy-preserving authentication scheme for intelligent transportation systems, Computers & Security, 60, 193, 10.1016/j.cose.2016.04.006

Sun, 2017, Resilient control of networked control systems with stochastic denial of service attacks, Neurocomputing, 270, 170, 10.1016/j.neucom.2017.02.093

Sun, 2018, Security-based resilient event-triggered control of networked control systems under denial of service attacks, Journal of the Franklin Institute, 10.1016/j.jfranklin.2018.06.009

Sundaram, 2016, Secure local filtering algorithms for distributed optimization, 1871

Sundaram, 2011, Distributed function calculation via linear iterative strategies in the presence of malicious agents, IEEE Transactions on Automatic Control, 56, 1495, 10.1109/TAC.2010.2088690

Tanaka, 2017, Directed information and privacy loss in cloud-based control, 1666

Teixeira, 2010, Cyber security analysis of state estimators in electric power systems, 5991

Teixeira, 2012, Revealing stealthy attacks in control systems, 1806

Teixeira, 2015, A secure control framework for resource-limited adversaries, Automatica, 51, 135, 10.1016/j.automatica.2014.10.067

Teixeira, 2015, Secure control systems: A quantitative risk management approach, IEEE Control Systems Magazine, 35, 24, 10.1109/MCS.2014.2364709

Ten, 2011, Anomaly detection for cybersecurity of the substations, IEEE Transactions on Smart Grid, 2, 865, 10.1109/TSG.2011.2159406

Ten, 2008, Vulnerability assessment of cybersecurity for SCADA systems, IEEE Transactions on Power Systems, 23, 1836, 10.1109/TPWRS.2008.2002298

Tranquillus, 1957

Tsai, 2009, Intrusion detection by machine learning: A review, Expert Systems with Applications, 36, 11994, 10.1016/j.eswa.2009.05.029

Ugrinovskii, 2017, Controller–jammer game models of denial of service in control systems operating over packet-dropping links, Automatica, 84, 128, 10.1016/j.automatica.2017.07.009

Usevitch, J., & Panagou, D. (2018a). Determining r-robustness of arbitrary digraphs using zero-one linear integer programming. arXiv:1810.01784.

Usevitch, J., & Panagou, D. (2018b). Resilient leader-follower consensus to arbitrary reference values. arXiv:1802.09654.

Vamvoudakis, 2018, Cooperative Q-learning for rejection of persistent adversarial inputs in unknown networked systems, IEEE Transactions on Automatic Control, 63, 1018, 10.1109/TAC.2017.2734840

Vamvoudakis, 2018, Game-theory-based consensus learning of double-integrator agents in the presence of worst-case adversaries, Journal of Optimization Theory and Applications, 177, 222, 10.1007/s10957-018-1268-7

Vamvoudakis, 2014, Detection in adversarial environments, IEEE Transactions on Automatic Control, 59, 3209, 10.1109/TAC.2014.2351671

Wang, 2016, Recent advances on filtering and control for cyber-physical systems under security and resource constraints, Journal of the Franklin Institute, 353, 2451, 10.1016/j.jfranklin.2016.04.011

Wang, 2013, Cyber security in the smart grid: Survey and challenges, Computer Networks, 57, 1344, 10.1016/j.comnet.2012.12.017

Watts, 2003, Security and vulnerability in electric power systems, 2, 559

Weerakkody, 2017, A graph-theoretic characterization of perfect attackability for secure design of distributed control systems, IEEE Transactions on Control of Nerwork Systems, 4, 60, 10.1109/TCNS.2016.2573741

Weerakkody, 2014, 3757

Weerakkody, 2017, A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems, 966

Weerakkody, 2015, Detecting integrity attacks on control systems using a moving target approach, 5820

Weerakkody, S., & Sinopoli, B. (2016). A moving target approach for identifying malicious sensors in control systems. arXiv:1609.09043.

Wiese, 2018, Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, IEEE Transactions on Automatic Control

Woo, 2015, A practical wireless attack on the connected car and security protocol for in-vehicle CAN, IEEE Transactions on Intelligent Transportation Systems, 16, 993

Wu, 2017, A game-theoretic approach to remote state estimation in presence of a DoS attacker, 2595

Xie, 2011, Integrity data attacks in power market operations, IEEE Transactions on Smart Grid, 2, 659, 10.1109/TSG.2011.2161892

Xue, 2014, Security concepts for the dynamics of autonomous vehicle networks, Automatica, 50, 852, 10.1016/j.automatica.2013.12.001

Yan, 2013, Distributed autonomous online learning: Regrets and intrinsic privacy-preserving properties, IEEE Transactions on Knowledge and Data Engineering, 25, 2483, 10.1109/TKDE.2012.191

Yan, 2013, A survey on smart grid communication infrastructures: Motivations, requirements and challenges, IEEE Communication Surveys & Tutorials, 15, 5, 10.1109/SURV.2012.021312.00034

Yang, 2015, A new cyber security risk evaluation method for oil and gas SCADA based on factor state space, Chaos, Solitons and Fractals, 89, 203, 10.1016/j.chaos.2015.10.030

Yang, 2017, Event-based distributed state estimation under deception attack, Neurocomputing, 270, 145, 10.1016/j.neucom.2016.12.109

Yuan, 2015, Security in cyber-physical systems: Controller design against known-plaintext attack, 5814

Zeldovich, 2014

Zero Days, 2016

Zhang, 2015, A notion of robustness in complex networks, IEEE Transactions on Control of Network Systems, 2, 310, 10.1109/TCNS.2015.2413551

Zhao, 2015, Distributed frequency control for stability and economic dispatch in power networks, 2359

Zhao, 2017, Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults, Journal of the Franklin Institute, 354, 6520, 10.1016/j.jfranklin.2017.08.005

Zhu, 2011, Robust and resilient control design for cyber-physical systems with an application to power systems, 4066

Zhu, 2013, Resilient distributed control of multi-agent cyber-physical systems, 301

Zhu, 2010, Network security configurations: A nonzero-sum stochastic game approach, 1059