Abstract
Distributed control systems (DCSs) are one of the founding technologies of the cyber-physical systems (CPSs), which are implemented in industries and grids. The DCSs are studies from the aspect of design, architecture, modeling, framework, management, security, and risk. From the findings, it was identified that the security of these systems is the most vital aspect among the modern issues. To address the security of DCSs, it is important to understand the bridging features between DCSs and the CPSs in order to protect them from cyberattacks against known and unknown vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alcaraz, C., Lopez, J., & Wolthusen, S. (2016). Policy enforcement system for secure interoperable control in distributed smart grid systems. Journal of Network and Computer Applications, 59, 301–314.
Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53–66.
Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1, 1–6.
Ansari, S., & Janghel, R. R. (2013). A dynamic approach to generate behavior patterns of virus and worms for intrusion detection system. International Journal of Advanced Research in Computer Science, 4.
Bae, K., Krisiloff, J., Meseguer, J., & Ölveczky, P. C. (2015). Designing and verifying distributed cyber-physical systems using Multirate PALS: An airplane turning control system case study. Science of Computer Programming, 103, 13–50.
Bologna, S., Fasani, M. A., & Martellini, M. (2013). The importance of securing industrial control systems of critical infrastructures. General Secretariat. Como, Italy: Landau Network. Retrieved January, 14, 2014.
Bolognani, S., Carli, R., Cavraro, G., & Zampieri, S. (2015). Distributed reactive power feedback control for voltage regulation and loss minimization. IEEE Transactions on Automatic Control, 60, 966–981.
Boyer, W., & Mcqueen, M. (2007). Ideal based cyber security technical metrics for control systems. In International Workshop on Critical Information Infrastructures Security (pp. 246–260). Springer.
Bradley, J. M., & Atkins, E. M. (2015). Coupled cyber-physical system modeling and coregulation of a cubesat. IEEE Transactions on Robotics, 31, 443–456.
Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. System, 1, a3.
Cárdenas, A. A., Amin, S., & Sastry, S. (2008). Research challenges for the security of control systems. In HotSec.
Cho, J.-H., Swami, A., & Chen, I.-R. (2011). A survey on trust management for mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 13, 562–583.
Colombo, A. W., Karnouskos, S., & Bangemann, T. (2014). Towards the next generation of industrial cyber-physical systems. In Industrial cloud-based cyber-physical systems. Springer.
Corporation, O. (2008). Risk Analysis Overview. http://www.oracle.com/us/products/middleware/bus-int/crystalball/risk-analysis-overview-404902.pdf, Date accessed: 6 /10/ 2015
Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., et al. (2014). Evolution of security engineering artifacts: A state of the art survey. International Journal of Secure Software Engineering (IJSSE), 5, 48–98.
Felker, J., & Edwards, M. (2015). NCCIC/ICS-CERT year in review. FY 2015.
Ge, X., Yang, F., & Han, Q.-L. (2015). Distributed networked control systems: A brief overview. Information Sciences.
Giordano, A., Spezzano, G., Vinci, A., Garofalo, G., & Piro, P. (2014). A cyber-physical system for distributed real-time control of urban drainage networks in smart cities. In International Conference on Internet and Distributed Computing Systems (pp. 87–98). Springer.
Govindarasu, M., Hann, A., & Sauer, P. (2012). Cyber-physical systems security for smart grid. In The future grid to enable sustainable energy systems. PSERC Publication.
Habash, R. W., Groza, V., & Burr, K. (2013). Risk management framework for the power grid cyber-physical security. British Journal of Applied Science & Technology, 3, 1070.
Haimes, Y. Y. (2015). Risk modeling, assessment, and management. Wiley.
Haimes, Y. Y., Kaplan, S., & Lambert, J. H. (2002). Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis, 22, 383–397.
Harrison, R., McLeod, C. S., Tavola, G., Taisch, M., Colombo, A. W., Karnouskos, S., et al. (2014). Next generation of engineering methods and tools for SOA-based large-scale and distributed process applications. In Industrial cloud-based cyber-physical systems. Springer.
Hieb, J., Graham, J., & Patel, S. (2007). Security enhancements for distributed control systems. In International Conference on Critical Infrastructure Protection (pp. 133–146). Springer.
House, T. W. (2014). Co-ordination of federal information security policy [Online]. The United States Government. Available: https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/coordination-of-federal-information-security-policy.pdf. Accessed July 15, 2016.
Ilic, M. D., Xie, L., Khan, U. A., & Moura, J. M. (2010). Modeling of future cyber–physical energy systems for distributed sensing and control. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40, 825–838.
Innovations, R.-T. (2014). Four keys to securing distributed control systems. California, US: Real-Time Innovations.
Jagadamba, G., Sharmila, S., & Gouda, T. (2014). A secured authentication system using an effective keystroke dynamics. In Emerging research in electronics, computer science and technology. Springer.
Jelasity, M., Montresor, A., & Babaoglu, O. (2005). Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems (TOCS), 23, 219–252.
Khan, U. A., Ili, M. D., & Moura, J. M. (2008). Cooperation for aggregating complex electric power networks to ensure system observability. In First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA) (pp. 1–6). IEEE.
Khan, U. A., Kar, S., & Moura, J. M. (2009). Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Transactions on Signal Processing, 57, 2000–2016.
Khan, U. A., & Moura, J. M. (2008). Distributed iterate-collapse inversion (DICI) algorithm for L-banded matrices. In IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 2529–2532). IEEE.
Kim, K.-D., & Kumar, P. R. (2012). Cyber–physical systems: A perspective at the centennial. Proceedings of the IEEE, 100, 1287–1308.
Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52–80.
Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. (2015). A survey of approaches combining safety and security for industrial control systems. Reliability Engineering & System Safety, 139, 156–178.
Li, B., Nie, L., Wu, C., Gonzalez, H., & Lu, C. (2015). Incorporating emergency alarms in reliable wireless process control. In Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (pp. 218–227). ACM.
Li, H., Han, Z., Dimitrovski, A. D., & Zhang, Z. (2014). Data traffic scheduling for cyber physical systems with application in voltage control of distributed generations: A hybrid system framework. IEEE Systems Journal, 8, 542–552.
Liu, M., & Xu, W. (2013). The approach for critical infrastructure sectors classification using the inoperability input-output model (IIM). In 6th International Conference on Information Management, Innovation Management and Industrial Engineering (pp. 7–10). IEEE.
Loos, S. M., Platzer, A., & Nistor, L. (2011) Adaptive cruise control: Hybrid, distributed, and now formally verified. In International Symposium on Formal Methods (pp. 42–56). Springer.
Mangharam, R., & Pajic, M. (2013). Distributed control for cyber-physical systems. Journal of the Indian Institute of Science, 93, 353–387.
Miller, C. (2010). Interoperability and cyber security plan. NRECA CRN smart grid regional demonstration. Arlington, Virginia, USA: Cigital Inc., Cornice Engineering Inc., Power Systems Engineering.
Mocci, S., Natale, N., Pilo, F., & Ruggeri, S. (2015). Demand side integration in LV smart grids with multi-agent control system. Electric Power Systems Research, 125, 23–33.
Morris, T., Vaughn, R., & Dandass, Y. S. (2011). A testbed for SCADA control system cybersecurity research and pedagogy. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (pp. 27). ACM.
Pajic, M., Sundaram, S., Pappas, G. J., & Mangharam, R. (2011). The wireless control network: A new approach for control over networks. IEEE Transactions on Automatic Control, 56, 2305–2318.
Pappas, V., Athanasopoulos, E., Ioannidis, S., & Markatos, E. P. (2008). Compromising anonymity using packet spinning. In International Conference on Information Security (pp. 161–174). Springer.
Posadas, J. L., Poza, J. L., Simó, J. E., Benet, G., & Blanes, F. (2008). Agent-based distributed architecture for mobile robot control. Engineering Applications of Artificial Intelligence, 21, 805–823.
Pricewaterhousecoopers. (2008). A practical guide to risk assessment.
Qian, F., Xu, G., Zhang, L., & Dong, H. (2015). Design of hybrid NC control system for automatic line. International Journal of Hybrid Information Technology, 8, 185–192.
Ralston, P. A., Graham, J. H., & Hieb, J. L. (2007). Cyber security risk assessment for SCADA and DCS networks. ISA Transactions, 46, 583–594.
Rauter, T. (2016). Integrity of distributed control systems. In Student Forum of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
Sandberg, H., Amin, S., & Johansson, K. (2015). Cyberphysical security in networked control systems: An introduction to the issue. Control Systems, IEEE, 35, 20–23.
Sinopoli, B., Sharp, C., Schenato, L., Schaffert, S., & Sastry, S. S. (2003). Distributed control applications within sensor networks. Proceedings of the IEEE, 91, 1235–1246.
Solomon, M. G., & Chapple, M. (2009). Information security illuminated. Jones & Bartlett Publishers.
Stehr, M.-O., Kim, M., & Talcott, C. (2010). Toward distributed declarative control of networked cyber-physical systems. In Ubiquitous intelligence and computing. Springer.
Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ICS) security. NIST Special Publication, 800, 16–16.
Teixeira, A., Pérez, D., Sandberg, H., & Johansson, K. H. (2012). Attack models and scenarios for networked control systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems (pp. 55–64). ACM.
UK. (2008). Good practice guide—Process control and SCADA security [Online]. London: Centre for the Protection of National Infrastructure. Available: http://www.cpni.gov.uk/documents/publications/2008/2008031-gpg_scada_security_good_practice.pdf?epslanguage=en-gb. Accessed May 11, 2016.
US. (2002). 21 steps to improve cyber security of SCADA networks [Online]. Washington: US Department of Energy. Available: http://www.energy.gov/sites/prod/files/oeprod/DocumentsandMedia/21_Steps_-_SCADA.pdf. Accessed May 11, 2016.
Weiss, J. (2010). Protecting industrial control systems from electronic threats. Momentum Press.
Zhang, X., Clark, M., Rattan, K., & Muse, J. (2015) Controller verification in adaptive learning systems towards trusted autonomy. In Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems (pp. 31–40). ACM.
Zhang, Z., & Chow, M.-Y. (2012). Convergence analysis of the incremental cost consensus algorithm under different communication network topologies in a smart grid. IEEE Transactions on Power Systems, 27, 1761–1768.
Zhong, H., & Nof, S. Y. (2015). The dynamic lines of collaboration model: Collaborative disruption response in cyber–physical systems. Computers & Industrial Engineering, 87, 370–382.
Zhu, Q., & Basar, T. (2015). Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Systems, 35, 46–65.
Zhu, Q., Bushnell, L., & Basar, T. (2013) Resilient distributed control of multi-agent cyber-physical systems. In D. C. Tarraf (Ed.), Lecture notes in control and information sciences (pp. 301–316). The Johns Hopkins University, Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K. (2018). Distributed Control Systems Security for CPS. In: Cyber Security for Cyber Physical Systems. Studies in Computational Intelligence, vol 768. Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-75880-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75879-4
Online ISBN: 978-3-319-75880-0
eBook Packages: EngineeringEngineering (R0)