2009 2nd Conference on Human System Interactions 2009
DOI: 10.1109/hsi.2009.5091051
|View full text |Cite
|
Sign up to set email alerts
|

Resilient control systems: Next generation design research

Abstract: -Since digital control systems were introduced to the market more than 30 years ago, the operational efficiency and stability gained through their use have fueled our migration and ultimate dependence on them for the monitoring and control of critical infrastructure. While these systems have been designed for functionality and reliability, a hostile cyber environment and uncertainties in complex networks and human interactions have placed additional parameters on the design expectations for control systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
109
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 176 publications
(109 citation statements)
references
References 2 publications
(1 reference statement)
0
109
0
Order By: Relevance
“…Some application areas of CPSs include automated factories, smart and energy efficient buildings, the smart grid, and self-driving cars; (Kim and Kumar, 2012;Khaitan and McCalley, 2014) provide additional application areas. As the domain of applicability of CPSs expands into security-sensitive areas, such as automated highways, water and electricity distribution systems, and military command and control, it is critical to develop novel design and control paradigms that go beyond the traditional notions of robustness, reliability, and stability (Rieger et al, 2009). These novel paradigms -or elements of resilience -include cyber-security and privacy [e.g., Liu et al (2012)], control system and information network robustness, and the ability to maintain normalcy and restore function following a failure or a malicious attack.…”
Section: Context and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Some application areas of CPSs include automated factories, smart and energy efficient buildings, the smart grid, and self-driving cars; (Kim and Kumar, 2012;Khaitan and McCalley, 2014) provide additional application areas. As the domain of applicability of CPSs expands into security-sensitive areas, such as automated highways, water and electricity distribution systems, and military command and control, it is critical to develop novel design and control paradigms that go beyond the traditional notions of robustness, reliability, and stability (Rieger et al, 2009). These novel paradigms -or elements of resilience -include cyber-security and privacy [e.g., Liu et al (2012)], control system and information network robustness, and the ability to maintain normalcy and restore function following a failure or a malicious attack.…”
Section: Context and Motivationmentioning
confidence: 99%
“…One way to approach this problem (Rieger et al, 2009) is by decomposing it into two broad research thrusts. One of them is State Awareness, which is related to efficient and timely monitoring for the purpose of ensuring normalcy.…”
Section: Context and Motivationmentioning
confidence: 99%
“…While one might say that resilient designs are built upon dependable computing research, these research philosophies do not characterize the aspects of the design that involve the implementation of advanced control theory for feedback control functionality [1]. Dependable computing research considers the malicious faults as a source of failure but does not consider these faults or the associated consequences in terms of impact on the unique design considerations of a control system.…”
Section: Introductionmentioning
confidence: 99%
“…Before discussing the philosophy of resilient control systems, however, one must first consider its definition. A resilient control system is defined as one that maintains state awareness and an accepted level of operational normalcy in response to disturbances, including threats of an unexpected and malicious nature [1]. The notional architecture of such a system is defined in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…Regarding the vulnerabilities of these networked systems, the cyber-intrusion is of major importance, as malignant actors can mask the system's degradation or provide fake data to higher management levels, with respect to the current system's status [2]. In this work, a resilient system is regarded as a system that maintains state awareness and an acceptable level of operational normalcy in response to disturbances, including threats of an unexpected and malicious nature [3] [4]. In the case of heterogeneous monitoring systems, this resilience provides the system with security and trust mechanism, thus fixing, mitigating or coping with the aforementioned vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%