Skip to main content

Distributed Control Systems Security for CPS

  • Chapter
  • First Online:
Cyber Security for Cyber Physical Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 768))

Abstract

Distributed control systems (DCSs) are one of the founding technologies of the cyber-physical systems (CPSs), which are implemented in industries and grids. The DCSs are studies from the aspect of design, architecture, modeling, framework, management, security, and risk. From the findings, it was identified that the security of these systems is the most vital aspect among the modern issues. To address the security of DCSs, it is important to understand the bridging features between DCSs and the CPSs in order to protect them from cyberattacks against known and unknown vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alcaraz, C., Lopez, J., & Wolthusen, S. (2016). Policy enforcement system for secure interoperable control in distributed smart grid systems. Journal of Network and Computer Applications, 59, 301–314.

    Article  Google Scholar 

  • Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53–66.

    Article  Google Scholar 

  • Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1, 1–6.

    Article  Google Scholar 

  • Ansari, S., & Janghel, R. R. (2013). A dynamic approach to generate behavior patterns of virus and worms for intrusion detection system. International Journal of Advanced Research in Computer Science, 4.

    Google Scholar 

  • Bae, K., Krisiloff, J., Meseguer, J., & Ölveczky, P. C. (2015). Designing and verifying distributed cyber-physical systems using Multirate PALS: An airplane turning control system case study. Science of Computer Programming, 103, 13–50.

    Article  Google Scholar 

  • Bologna, S., Fasani, M. A., & Martellini, M. (2013). The importance of securing industrial control systems of critical infrastructures. General Secretariat. Como, Italy: Landau Network. Retrieved January, 14, 2014.

    Google Scholar 

  • Bolognani, S., Carli, R., Cavraro, G., & Zampieri, S. (2015). Distributed reactive power feedback control for voltage regulation and loss minimization. IEEE Transactions on Automatic Control, 60, 966–981.

    Article  MathSciNet  MATH  Google Scholar 

  • Boyer, W., & Mcqueen, M. (2007). Ideal based cyber security technical metrics for control systems. In International Workshop on Critical Information Infrastructures Security (pp. 246–260). Springer.

    Google Scholar 

  • Bradley, J. M., & Atkins, E. M. (2015). Coupled cyber-physical system modeling and coregulation of a cubesat. IEEE Transactions on Robotics, 31, 443–456.

    Article  Google Scholar 

  • Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. System, 1, a3.

    Google Scholar 

  • Cárdenas, A. A., Amin, S., & Sastry, S. (2008). Research challenges for the security of control systems. In HotSec.

    Google Scholar 

  • Cho, J.-H., Swami, A., & Chen, I.-R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 13, 562–583.

    Article  Google Scholar 

  • Colombo, A. W., Karnouskos, S., & Bangemann, T. (2014). Towards the next generation of industrial cyber-physical systems. In Industrial cloud-based cyber-physical systems. Springer.

    Google Scholar 

  • Corporation, O. (2008). Risk Analysis Overview. http://www.oracle.com/us/products/middleware/bus-int/crystalball/risk-analysis-overview-404902.pdf, Date accessed: 6 /10/ 2015

  • Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., et al. (2014). Evolution of security engineering artifacts: A state of the art survey. International Journal of Secure Software Engineering (IJSSE), 5, 48–98.

    Article  Google Scholar 

  • Felker, J., & Edwards, M. (2015). NCCIC/ICS-CERT year in review. FY 2015.

    Google Scholar 

  • Ge, X., Yang, F., & Han, Q.-L. (2015). Distributed networked control systems: A brief overview. Information Sciences.

    Google Scholar 

  • Giordano, A., Spezzano, G., Vinci, A., Garofalo, G., & Piro, P. (2014). A cyber-physical system for distributed real-time control of urban drainage networks in smart cities. In International Conference on Internet and Distributed Computing Systems (pp. 87–98). Springer.

    Google Scholar 

  • Govindarasu, M., Hann, A., & Sauer, P. (2012). Cyber-physical systems security for smart grid. In The future grid to enable sustainable energy systems. PSERC Publication.

    Google Scholar 

  • Habash, R. W., Groza, V., & Burr, K. (2013). Risk management framework for the power grid cyber-physical security. British Journal of Applied Science & Technology, 3, 1070.

    Article  Google Scholar 

  • Haimes, Y. Y. (2015). Risk modeling, assessment, and management. Wiley.

    Google Scholar 

  • Haimes, Y. Y., Kaplan, S., & Lambert, J. H. (2002). Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis, 22, 383–397.

    Article  Google Scholar 

  • Harrison, R., McLeod, C. S., Tavola, G., Taisch, M., Colombo, A. W., Karnouskos, S., et al. (2014). Next generation of engineering methods and tools for SOA-based large-scale and distributed process applications. In Industrial cloud-based cyber-physical systems. Springer.

    Google Scholar 

  • Hieb, J., Graham, J., & Patel, S. (2007). Security enhancements for distributed control systems. In International Conference on Critical Infrastructure Protection (pp. 133–146). Springer.

    Google Scholar 

  • House, T. W. (2014). Co-ordination of federal information security policy [Online]. The United States Government. Available: https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/coordination-of-federal-information-security-policy.pdf. Accessed July 15, 2016.

  • Ilic, M. D., Xie, L., Khan, U. A., & Moura, J. M. (2010). Modeling of future cyber–physical energy systems for distributed sensing and control. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40, 825–838.

    Article  Google Scholar 

  • Innovations, R.-T. (2014). Four keys to securing distributed control systems. California, US: Real-Time Innovations.

    Google Scholar 

  • Jagadamba, G., Sharmila, S., & Gouda, T. (2014). A secured authentication system using an effective keystroke dynamics. In Emerging research in electronics, computer science and technology. Springer.

    Google Scholar 

  • Jelasity, M., Montresor, A., & Babaoglu, O. (2005). Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems (TOCS), 23, 219–252.

    Article  Google Scholar 

  • Khan, U. A., Ili, M. D., & Moura, J. M. (2008). Cooperation for aggregating complex electric power networks to ensure system observability. In First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA) (pp. 1–6). IEEE.

    Google Scholar 

  • Khan, U. A., Kar, S., & Moura, J. M. (2009). Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Transactions on Signal Processing, 57, 2000–2016.

    Article  MathSciNet  Google Scholar 

  • Khan, U. A., & Moura, J. M. (2008). Distributed iterate-collapse inversion (DICI) algorithm for L-banded matrices. In IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 2529–2532). IEEE.

    Google Scholar 

  • Kim, K.-D., & Kumar, P. R. (2012). Cyber–physical systems: A perspective at the centennial. Proceedings of the IEEE, 100, 1287–1308.

    Article  Google Scholar 

  • Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.

    Google Scholar 

  • Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80.

    Article  Google Scholar 

  • Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. (2015). A survey of approaches combining safety and security for industrial control systems. Reliability Engineering & System Safety, 139, 156–178.

    Article  Google Scholar 

  • Li, B., Nie, L., Wu, C., Gonzalez, H., & Lu, C. (2015). Incorporating emergency alarms in reliable wireless process control. In Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (pp. 218–227). ACM.

    Google Scholar 

  • Li, H., Han, Z., Dimitrovski, A. D., & Zhang, Z. (2014). Data traffic scheduling for cyber physical systems with application in voltage control of distributed generations: A hybrid system framework. IEEE Systems Journal, 8, 542–552.

    Article  Google Scholar 

  • Liu, M., & Xu, W. (2013). The approach for critical infrastructure sectors classification using the inoperability input-output model (IIM). In 6th International Conference on Information Management, Innovation Management and Industrial Engineering (pp. 7–10). IEEE.

    Google Scholar 

  • Loos, S. M., Platzer, A., & Nistor, L. (2011) Adaptive cruise control: Hybrid, distributed, and now formally verified. In International Symposium on Formal Methods (pp. 42–56). Springer.

    Google Scholar 

  • Mangharam, R., & Pajic, M. (2013). Distributed control for cyber-physical systems. Journal of the Indian Institute of Science, 93, 353–387.

    MathSciNet  Google Scholar 

  • Miller, C. (2010). Interoperability and cyber security plan. NRECA CRN smart grid regional demonstration. Arlington, Virginia, USA: Cigital Inc., Cornice Engineering Inc., Power Systems Engineering.

    Google Scholar 

  • Mocci, S., Natale, N., Pilo, F., & Ruggeri, S. (2015). Demand side integration in LV smart grids with multi-agent control system. Electric Power Systems Research, 125, 23–33.

    Article  Google Scholar 

  • Morris, T., Vaughn, R., & Dandass, Y. S. (2011). A testbed for SCADA control system cybersecurity research and pedagogy. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (pp. 27). ACM.

    Google Scholar 

  • Pajic, M., Sundaram, S., Pappas, G. J., & Mangharam, R. (2011). The wireless control network: A new approach for control over networks. IEEE Transactions on Automatic Control, 56, 2305–2318.

    Article  MathSciNet  MATH  Google Scholar 

  • Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E. P. (2008). Compromising anonymity using packet spinning. In International Conference on Information Security (pp. 161–174). Springer.

    Google Scholar 

  • Posadas, J. L., Poza, J. L., Simó, J. E., Benet, G., & Blanes, F. (2008). Agent-based distributed architecture for mobile robot control. Engineering Applications of Artificial Intelligence, 21, 805–823.

    Article  Google Scholar 

  • Pricewaterhousecoopers. (2008). A practical guide to risk assessment.

    Google Scholar 

  • Qian, F., Xu, G., Zhang, L., & Dong, H. (2015). Design of hybrid NC control system for automatic line. International Journal of Hybrid Information Technology, 8, 185–192.

    Article  Google Scholar 

  • Ralston, P. A., Graham, J. H., & Hieb, J. L. (2007). Cyber security risk assessment for SCADA and DCS networks. ISA Transactions, 46, 583–594.

    Article  Google Scholar 

  • Rauter, T. (2016). Integrity of distributed control systems. In Student Forum of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

    Google Scholar 

  • Sandberg, H., Amin, S., & Johansson, K. (2015). Cyberphysical security in networked control systems: An introduction to the issue. Control Systems, IEEE, 35, 20–23.

    Article  MathSciNet  Google Scholar 

  • Sinopoli, B., Sharp, C., Schenato, L., Schaffert, S., & Sastry, S. S. (2003). Distributed control applications within sensor networks. Proceedings of the IEEE, 91, 1235–1246.

    Article  Google Scholar 

  • Solomon, M. G., & Chapple, M. (2009). Information security illuminated. Jones & Bartlett Publishers.

    Google Scholar 

  • Stehr, M.-O., Kim, M., & Talcott, C. (2010). Toward distributed declarative control of networked cyber-physical systems. In Ubiquitous intelligence and computing. Springer.

    Google Scholar 

  • Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ICS) security. NIST Special Publication, 800, 16–16.

    Google Scholar 

  • Teixeira, A., Pérez, D., Sandberg, H., & Johansson, K. H. (2012). Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems (pp. 55–64). ACM.

    Google Scholar 

  • UK. (2008). Good practice guide—Process control and SCADA security [Online]. London: Centre for the Protection of National Infrastructure. Available: http://www.cpni.gov.uk/documents/publications/2008/2008031-gpg_scada_security_good_practice.pdf?epslanguage=en-gb. Accessed May 11, 2016.

  • US. (2002). 21 steps to improve cyber security of SCADA networks [Online]. Washington: US Department of Energy. Available: http://www.energy.gov/sites/prod/files/oeprod/DocumentsandMedia/21_Steps_-_SCADA.pdf. Accessed May 11, 2016.

  • Weiss, J. (2010). Protecting industrial control systems from electronic threats. Momentum Press.

    Google Scholar 

  • Zhang, X., Clark, M., Rattan, K., & Muse, J. (2015) Controller verification in adaptive learning systems towards trusted autonomy. In Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (pp. 31–40). ACM.

    Google Scholar 

  • Zhang, Z., & Chow, M.-Y. (2012). Convergence analysis of the incremental cost consensus algorithm under different communication network topologies in a smart grid. IEEE Transactions on Power Systems, 27, 1761–1768.

    Article  Google Scholar 

  • Zhong, H., & Nof, S. Y. (2015). The dynamic lines of collaboration model: Collaborative disruption response in cyber–physical systems. Computers & Industrial Engineering, 87, 370–382.

    Article  Google Scholar 

  • Zhu, Q., & Basar, T. (2015). Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Systems, 35, 46–65.

    Article  MathSciNet  Google Scholar 

  • Zhu, Q., Bushnell, L., & Basar, T. (2013) Resilient distributed control of multi-agent cyber-physical systems. In D. C. Tarraf (Ed.), Lecture notes in control and information sciences (pp. 301–316). The Johns Hopkins University, Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saqib Ali .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K. (2018). Distributed Control Systems Security for CPS. In: Cyber Security for Cyber Physical Systems. Studies in Computational Intelligence, vol 768. Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75880-0_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75879-4

  • Online ISBN: 978-3-319-75880-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics