Muutke küpsiste eelistusi

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop [Kõva köide]

Edited by , Edited by (Zhejiang University, Hangzhou, China), Edited by
  • Formaat: Hardback, 328 pages, kõrgus x laius: 234x156 mm, kaal: 589 g, 19 Tables, black and white; 95 Illustrations, black and white
  • Ilmumisaeg: 05-Apr-2016
  • Kirjastus: CRC Press Inc
  • ISBN-10: 1498734731
  • ISBN-13: 9781498734738
  • Formaat: Hardback, 328 pages, kõrgus x laius: 234x156 mm, kaal: 589 g, 19 Tables, black and white; 95 Illustrations, black and white
  • Ilmumisaeg: 05-Apr-2016
  • Kirjastus: CRC Press Inc
  • ISBN-10: 1498734731
  • ISBN-13: 9781498734738
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.

The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios.

The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.
Preface vii
Contributors ix
SECTION I SECURE STATE ESTIMATION
1(94)
1 A Game-Theoretic Approach to Jamming Attacks on Remote State Estimation in Cyber-Physical Systems
3(28)
Yuzhe Li
Ling Shi
Peng Cheng
Jiming Chen
Daniel E. Quevedo
2 Secure State Estimation against Stealthy Attack
31(26)
Yilin Mo
3 Secure State Estimation in Industrial Control Systems
57(38)
Arash Mohammadi
Konstantinos N. Plataniotis
SECTION II RESILIENT CONTROL THEORY
95(156)
4 Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems
97(22)
Heng Zhang
Peng Cheng
Ling Shi
Jiming Chen
5 Behavior Rule Specification-Based False Data Injection Detection Technique for Smart Grid
119(32)
Beibei Li
Rongxing Lu
Haiyong Bao
6 Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design Principles
151(32)
Quanyan Zhu
Dong Wei
Kun Ji
7 Topology Control in Secure Wireless Sensors Networks
183(42)
Jun Zhao
8 Resilient Distributed Control in Cyber-Physical Energy Systems
225(26)
Wente Zeng
Mo-Yuen Chow
SECTION III SECURITY ISSUES IN APPLICATION FIELDS
251(54)
9 Distributed Resilient Control of Operator-Vehicle Networks under Cyber Attacks
253(32)
Minghui Zhu
Sonia Martinez
10 Privacy-Preserving Data Access Control in the Smart Grid
285(20)
Kan Yang
Xiaohua Jia
Xuemin (Sherman) Shen
Index 305
Peng Cheng earned his BE degree in automation and his PhD degree in control science and engineering from Zhejiang University in 2004 and 2009, respectively. He was a research fellow at the National University of Singapore from 2010 to 2011 and at Singapore University of Technology and Design from 2012 to 2013. Currently, he is a full professor with the Department of Control Science and Engineering at Zhejiang University. He has served as associate editor of Wireless Networks and International Journal of Communication Systems, and as guest editor of IEEE Transactions on Control of Network Systems. His research interests include networked sensing and control, cyber-physical systems, control system security, and robust control theory and applications.

Heng Zhang earned his BSc degree in mathematics from Jiangsu Normal University in 2004, his masters degree in mathematics and PhD in control science and engineering from Zhejiang University in 2006 and 2015, respectively. He is a faculty member of Huaihai Institute of Technology, China. He was a visiting student in the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology in fall, 2012. He has served as a guest editor of Peer-to-Peer Networking and Applications. His research interests include security and privacy in cyber-physical systems, networked control systems, and optimization theory.

Jiming Chen earned his BSc degree and PhD degree in control science and engineering from Zhejiang University in 2000 and 2005, respectively. He was a visiting researcher at INRIA in 2006, National University of Singapore in 2007, and University of Waterloo from 2008 to 2010. Currently, he is a full professor with the Department of Control Science and Engineering, group coordinator of Networked Sensing and Control, vice director of the State Key Laboratory of Industrial Control Technology, and vice director of the Institute of Industrial Process Control at Zhejiang University, China.