2018
DOI: 10.3390/app8050768
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment of Electrical Cyber-Physical Systems against Cyber Attacks

Abstract: In this special issue, we proposed a MATLAB-based platform for offline simulation and analysis of the vulnerability of electrical cyber-physical systems with the advantages of easy programming, fast calculation, and the lack of damage to systems. The study is of significance to decision-makers as they can get specific advice and defence strategies about a special power system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…The different parts of the physical system are connected through a network system. The CPS consists of a computational control system, a communication network, and a physical environment, forming a complex system involving real‐time sensing, dynamic control and information decision‐making [4]. The CPPS is an extension of the CPS in the field of power systems.…”
Section: Background and Motivationmentioning
confidence: 99%
“…The different parts of the physical system are connected through a network system. The CPS consists of a computational control system, a communication network, and a physical environment, forming a complex system involving real‐time sensing, dynamic control and information decision‐making [4]. The CPPS is an extension of the CPS in the field of power systems.…”
Section: Background and Motivationmentioning
confidence: 99%
“…The corresponding output matrix C is C = 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 In the meantime, we obtain F and B f0 by the condition equations ( 15) and ( 16) The initial conditions of the system and the observer are set to x(0) = ½À0:045, À 0:058, À 0:07, 0, 0:1, 0:01, x(0) = 0, 0, 0, 0, 0, 0 ½ . Since the vulnerability of each load in the power system is different, 37 in the next section, we will select different values of D-LAA to attack each load and complete the attack location.…”
Section: System Setupmentioning
confidence: 99%
“…Although, this transformation has many advantages, it has resulted in systems that are traditionally configured to operate in an air gap environment (i.e. a server cluster without access to the internet) to be exposed to new threats which originate in the cyber domain [18], [19], [22], [25], [29]. The perceived threat of a large impact cyber-attack on control systems proved to be a reality in 2010 with the launch of the Stuxnet worm [9], prompting plant owners, engineers, technicians, and researchers to feel the need to design and develop algorithms, tools, and techniques to protect the security of control systems.…”
Section: Introductionmentioning
confidence: 99%