Conference paper Open Access
Nicolaou, Nicolas; Eliades, Demetrios G.; Panayiotou, Christos; Polycarpou, Marios M.
<?xml version='1.0' encoding='UTF-8'?> <record xmlns="http://www.loc.gov/MARC21/slim"> <leader>00000nam##2200000uu#4500</leader> <datafield tag="041" ind1=" " ind2=" "> <subfield code="a">eng</subfield> </datafield> <datafield tag="653" ind1=" " ind2=" "> <subfield code="a">cyber-physical security, water distribution</subfield> </datafield> <controlfield tag="005">20200120164331.0</controlfield> <controlfield tag="001">1250406</controlfield> <datafield tag="711" ind1=" " ind2=" "> <subfield code="d">10-13 April 2018</subfield> <subfield code="g">CySWater</subfield> <subfield code="a">International Workshop on Cyber-Physical Systems for Smart Water Networks</subfield> <subfield code="c">Porto, Portugal</subfield> </datafield> <datafield tag="700" ind1=" " ind2=" "> <subfield code="a">Eliades, Demetrios G.</subfield> </datafield> <datafield tag="700" ind1=" " ind2=" "> <subfield code="a">Panayiotou, Christos</subfield> </datafield> <datafield tag="700" ind1=" " ind2=" "> <subfield code="a">Polycarpou, Marios M.</subfield> </datafield> <datafield tag="856" ind1="4" ind2=" "> <subfield code="s">393236</subfield> <subfield code="z">md5:d387b3462d241d6b8dc7575956321fe1</subfield> <subfield code="u">https://zenodo.org/record/1250406/files/cyber-physical-security.pdf</subfield> </datafield> <datafield tag="542" ind1=" " ind2=" "> <subfield code="l">open</subfield> </datafield> <datafield tag="260" ind1=" " ind2=" "> <subfield code="c">2018-05-21</subfield> </datafield> <datafield tag="909" ind1="C" ind2="O"> <subfield code="p">openaire</subfield> <subfield code="p">user-cyprus</subfield> <subfield code="p">user-kios-coe</subfield> <subfield code="p">user-smartwater-2020</subfield> <subfield code="o">oai:zenodo.org:1250406</subfield> </datafield> <datafield tag="100" ind1=" " ind2=" "> <subfield code="a">Nicolaou, Nicolas</subfield> </datafield> <datafield tag="245" ind1=" " ind2=" "> <subfield code="a">Reducing Vulnerability to Cyber-physical Attacks in Water Distribution Networks</subfield> </datafield> <datafield tag="980" ind1=" " ind2=" "> <subfield code="a">user-cyprus</subfield> </datafield> <datafield tag="980" ind1=" " ind2=" "> <subfield code="a">user-kios-coe</subfield> </datafield> <datafield tag="980" ind1=" " ind2=" "> <subfield code="a">user-smartwater-2020</subfield> </datafield> <datafield tag="536" ind1=" " ind2=" "> <subfield code="c">739551</subfield> <subfield code="a">KIOS Research and Innovation Centre of Excellence</subfield> </datafield> <datafield tag="540" ind1=" " ind2=" "> <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield> <subfield code="a">Creative Commons Attribution 4.0 International</subfield> </datafield> <datafield tag="650" ind1="1" ind2="7"> <subfield code="a">cc-by</subfield> <subfield code="2">opendefinition.org</subfield> </datafield> <datafield tag="520" ind1=" " ind2=" "> <subfield code="a"><p>Cyber-Physical Systems (CPS), such as Water Distribution Networks (WDNs), deploy digital devices to monitor and control the behavior of physical processes. These digital devices, however, are susceptible to cyber and physical attacks, that may alter their functionality, and therefore the integrity of their measurements/actions. In practice, industrial control systems utilize simple control laws, which rely on various sensor measurements and algorithms which are expected to operate normally. To reduce the impact of a potential failure, operators may deploy redundant components; this however may not be useful, e.g., when a cyber attack at a PLC component occurs. In this work, we address the problem of reducing vulnerability to cyber-physical attacks in water distribution networks. This is achieved by augmenting the graph which describes the information flow from sensors to actuators, by adding new connections and algorithms, to increase the number of redundant cyber components. These, in turn, increase the cyber-physical security level, which is defined in the present paper as the number of malicious attacks a CPS may sustain before becoming unable to satisfy the control requirements. A proof-of-concept of the approach is demonstrated over a simple WDN, with intuition on how this can be used to increase the cyber-physical security level of the system.</p> <p>&nbsp;</p> <p><em>This research is partially funded by the European Union Horizon 2020 programme under grant agreement no. 739551 (KIOS CoE), and by the Interreg V-A Greece-Cyprus 2014-2020 programme, co-financed by the European Union (ERDF) and National Funds of Greece and Cyprus, under the project SmartWater2020.</em></p></subfield> </datafield> <datafield tag="773" ind1=" " ind2=" "> <subfield code="n">doi</subfield> <subfield code="i">isVersionOf</subfield> <subfield code="a">10.5281/zenodo.1250405</subfield> </datafield> <datafield tag="024" ind1=" " ind2=" "> <subfield code="a">10.5281/zenodo.1250406</subfield> <subfield code="2">doi</subfield> </datafield> <datafield tag="980" ind1=" " ind2=" "> <subfield code="a">publication</subfield> <subfield code="b">conferencepaper</subfield> </datafield> </record>
All versions | This version | |
---|---|---|
Views | 152 | 153 |
Downloads | 215 | 215 |
Data volume | 84.5 MB | 84.5 MB |
Unique views | 151 | 152 |
Unique downloads | 198 | 198 |