2021
DOI: 10.1109/access.2021.3095713
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems

Abstract: Modern technologies empower water distribution systems (WDS) for better services in the processes of water supply, storage, distribution, and recycling. They improve real-time monitoring, automating, and managing. However, the limitations of these technologies introduce cyber-physical attacks to the WDS. The main goals of cyber-physical attacks include disrupting normal operations and tampering the critical data, which have negative impacts on the WDS. Therefore, it is vital to develop and implement solutions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…The authors in [55] propose to handle this issue as an anomaly detection problem. Anomaly detection often adopts a data mining method that detects unusual data [73]. Therefore, the authors in [55] propose training a convolutional autoencoder on only benign URLs.…”
Section: B Unsupervised Learning Algorithmsmentioning
confidence: 99%
“…The authors in [55] propose to handle this issue as an anomaly detection problem. Anomaly detection often adopts a data mining method that detects unusual data [73]. Therefore, the authors in [55] propose training a convolutional autoencoder on only benign URLs.…”
Section: B Unsupervised Learning Algorithmsmentioning
confidence: 99%
“…Cyberattack mitigation in an ICS environment has been studied in [ 46 ]. The authors of [ 47 ] presented a review of cyber attacks and detection methods in water purification plants. The survey is based on general cyber attacks and common attack detection methods and it does not cover the latest research and incidents in water purification plants.…”
Section: Previous Surveysmentioning
confidence: 99%
“…Vulnerabilities can be due to physical elements such as reservoirs, valves, pipes, motors, PLCs, distillation, tankers, etc. There can be faults or errors in any physical element which may lead to losses [ 47 ].…”
Section: Vulnerabilities Challenges and Future Prospective In The Iio...mentioning
confidence: 99%
“…Therefore, it is crucial to design and implement solutions to enhance WDS security by detecting and mitigating cyber-physical intrusions. Hajar Hammed Asseen et al [7] compare attacks and detection approaches with an emphasis on ideas, methodologies, evaluation findings, benefits, limitations, etc. In the expectation that this work may motivate additional WDS-related research, the authors propose a future research direction and identify fewer research efforts in this field.…”
Section: Related Workmentioning
confidence: 99%