A review of cyber–physical security for photovoltaic systems

J Ye, A Giani, A Elasser, SK Mazumder… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
In this article, the challenges and a future vision of the cyber–physical security of
photovoltaic (PV) systems are discussed from a firmware, network, PV converter controls …

A tutorial introduction to security and privacy for cyber-physical systems

MS Chong, H Sandberg… - 2019 18th European …, 2019 - ieeexplore.ieee.org
This tutorial provides a high-level introduction to novel control-theoretic approaches for the
security and privacy of cyber-physical systems (CPS). It takes a risk-based approach to the …

Exploiting trust for resilient hypothesis testing with malicious robots

M Cavorsi, OE Akgün, M Yemini… - … on Robotics and …, 2023 - ieeexplore.ieee.org
We develop a resilient binary hypothesis testing frame-work for decision making in
adversarial multi-robot crowdsensing tasks. This framework exploits stochastic trust …

Secure state estimation with byzantine sensors: A probabilistic approach

X Ren, Y Mo, J Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article studies static state estimation in multisensor settings, with a caveat that an
unknown subset of the sensors are compromised by an adversary, whose measurements …

Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems

L Dong, H Xu, L Zhang, Z Li, Y Chen - Applied Mathematics and …, 2023 - Elsevier
This paper investigates the false data injection (FDI) attack dynamic reconstitution and
secure control problems for cyber-physical systems (CPSs) with disturbances. The FDI …

Event-triggered approximate Byzantine consensus with multi-hop communication

L Yuan, H Ishii - IEEE Transactions on Signal Processing, 2023 - ieeexplore.ieee.org
In this article, we consider a resilient consensus problem for the multi-agent network where
some of the agents are subject to Byzantine attacks and may transmit erroneous state values …

Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles

T Tabassum, MR Khalghani - Power Systems Cybersecurity: Methods …, 2023 - Springer
Power systems are shifting into a new paradigm of connectivity. This new paradigm
facilitates massive integrations of different energy resources and loads, eg, renewable …

Coordinated data-falsification attacks in consensus-based distributed Kalman filtering

A Moradi, NKD Venkategowda… - 2019 IEEE 8th …, 2019 - ieeexplore.ieee.org
This paper considers consensus-based distributed Kalman filtering subject to data-
falsification attack, where Byzantine agents share manipulated data with their neighboring …

Secure detection: Performance metric and sensor deployment strategy

X Ren, Y Mo - IEEE Transactions on Signal Processing, 2018 - ieeexplore.ieee.org
This paper studies how to deploy sensors in the context of detection in adversarial
environments. A fusion center is performing a binary hypothesis testing based on …

Distributed sequential hypothesis testing with Byzantine sensors

Z Li, Y Mo, F Hao - IEEE Transactions on Signal Processing, 2021 - ieeexplore.ieee.org
This paper considers the problem of sequential binary hypothesis testing based on
observations from a network of m sensors where a subset of the sensors is compromised by …