Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks
Citations
663 citations
427 citations
383 citations
Cites background from "Cyber Security of Water SCADA Syste..."
...[3, 4], the attacker launches physical attacks to the system (physically stealing water from water distribution systems), while at the same time it launches a cyber-attack (compromised sensors send false data masking the effects of the physical attack)....
[...]
365 citations
Cites background from "Cyber Security of Water SCADA Syste..."
...Accordingly, as highlighted in [8], [25], [27], and [30], the security challenges have recently become emerging topics of research and some preliminary results have been reported with regard to various cyber-attacks, for example, Denial of service (DoS) attacks [1], [22], deception attacks [2], [10], [27], and replay attacks [41]....
[...]
364 citations
Cites methods from "Cyber Security of Water SCADA Syste..."
...Furthermore, via the techniques of dynamic programming or Lyapunov stability theory, some preliminary results concerning security control problems have been reported in [1], [12], and [22] for the case of DoS attacks and [2], [26], and [34] for the case of deception attacks....
[...]
References
2,064 citations
1,592 citations
"Cyber Security of Water SCADA Syste..." refers background in this paper
...While recent efforts have focused on applying IT security solutions to NCS, these solutions do not directly address the risks due to an intelligent attacker who is capable of compromising sensor-control data [3],[4]....
[...]
780 citations
"Cyber Security of Water SCADA Syste..." refers methods in this paper
...We build on past results on the design of unknown input observers [13], [14], and utilize delay-dependent stability conditions for timedelay systems [15]....
[...]
749 citations
637 citations
"Cyber Security of Water SCADA Syste..." refers background in this paper
...Targeted attacks to NCS are the most serious class of attacks because the attackers tailor their strategies toward damaging NCS components [5],[6]....
[...]