This paper introduces an attack generation framework for evaluating the vulnerability of nonlinear networked pipeline systems. The vulnerability analysis is formulated as determining the presence of feasible attack sets, defined by boundary functions …
This paper presents the development of an energy saving scheme via indirect field oriented control (IFOC) at the optimum operating region. A model based steady state power loss analysis is carried out to determine the optimal speed and the optimal …
We consider the problem of signal reconstruction for a system under sparse signal corruption by a malicious agent. The reconstruction problem follows the standard error coding problem that has been studied extensively in the literature. We include a …
Systematic attack design is essential to understanding the vulnerabilities of cyber–physical systems (CPSs), to better design for resiliency. In particular, false data injection attacks (FDIAs) are well-known and have been shown to be capable of …
In this brief, we develop a fault tolerant control (FTC) using a hierarchical-robust methodology with guaranteed stability for a wind turbine (WT), which is subject to an exogenous input, and an actuator fault. The high-level control is designed to …
This paper solves the problem of regulating the rotor speed tracking error for wind turbines in the full-load region by an effective robust-adaptive control strategy. The developed controller compensates for the uncertainty in the control input …
The past few decades have seen a tremendous increase in the volume and complexity of data generated in scientific discovery processes. Moreover, due to the rapid growth in internet and networking technology, it is now common for these experiments to …
Resilient observer design for Cyber-Physical Systems (CPS) in the presence of adversarial false data injection attacks (FDIA) is an active area of research. Existing state-of-the-art algorithms tend to break down as more and more knowledge of the …
In this paper, we present an algorithm design for resilient cyber-physical system, the resiliency is significantly improved by including the proposed automated attack generation in the training of attack detection algorithm. Unlike traditional GANbased FDI attack generation, the automated attack generator does not require the prepared attack samples. This work is supported by U.S. Department of Energy’s Office of Cybersecurity, Energy Security, AND Emergency Response (CESER) under the award number DE-CR0000005.
In current Medium Voltage DC (MVDC) Shipboard Power Systems (SPSs), multiple sources exist to supply power to a common dc bus. Conventionally, the power management of such systems is performed by controlling Power Generation Modules (PGMs) which …