2013
DOI: 10.1109/tcst.2012.2211873
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
140
0
3

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 306 publications
(144 citation statements)
references
References 10 publications
1
140
0
3
Order By: Relevance
“…In their work, it is stated that the design of covert attacks requires a high level of knowledge about the model of the attacked system. In [6,11,21], examples of covert attacks that agree with the statement provided in [20] are proposed and analyzed. In [11,21], the attacker, acting as a man-in-the-middle (MitM), injects false data in the forward stream of the NCS to take control of the plant.…”
Section: Related Workmentioning
confidence: 94%
See 1 more Smart Citation
“…In their work, it is stated that the design of covert attacks requires a high level of knowledge about the model of the attacked system. In [6,11,21], examples of covert attacks that agree with the statement provided in [20] are proposed and analyzed. In [11,21], the attacker, acting as a man-in-the-middle (MitM), injects false data in the forward stream of the NCS to take control of the plant.…”
Section: Related Workmentioning
confidence: 94%
“…The integration of controllers and physical processes via communication networks aims to provide these systems with better operational and management capabilities, as well as reduce costs. By virtue of these advantages, the number of NCSs applied to industrial processes and critical infrastructure systems is increasing [1][2][3][4][5][6][7][8][9][10]. A diagram of an NCS is depicted in Networked control system (NCS) [12] plant's behavior are physically difficult to be perceived.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-Physical System Security There is extensive research on CPS and security [14,15] focusing on: Smart Power Grids [16,17], Industrial Control Systems (ICS) [18], and SCADA [19,20] systems. The majority of this research proposes defending attacks at the network or process level.…”
Section: Related Workmentioning
confidence: 99%
“…The former attempted to dissipate maximum amount of energy, and the latter attempted to inject the largest amount of energy. Amin et al [7] presented the block attack model and studied the effect of such attack on the proportional-integral (PI) control scheme in a water SCADA system. All these attacks we mentioned above have the requirement that attack values should lie within a predetermined range.…”
Section: Introductionmentioning
confidence: 99%