Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach

The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control syste...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE systems journal 2020-06, Vol.14 (2), p.2054-2065
Hauptverfasser: Khalid, Haris M., Muyeen, S. M., Peng, Jimmy C.-H.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2065
container_issue 2
container_start_page 2054
container_title IEEE systems journal
container_volume 14
creator Khalid, Haris M.
Muyeen, S. M.
Peng, Jimmy C.-H.
description The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.
doi_str_mv 10.1109/JSYST.2019.2941759
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2409378732</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8861290</ieee_id><sourcerecordid>2409378732</sourcerecordid><originalsourceid>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</originalsourceid><addsrcrecordid>eNo9kE1OwzAQhS0EEqVwAdhEYu3inyS22YWqQFFFFy0CVpbjTKClJMFOEL0NZ-FkmLZiNaOnee-NPoROKRlQStTF3ex5Nh8wQtWAqZiKRO2hHlVcYMV4vL_ZGZZUxofoyPslIYlMhOqhp-E6B4eztjX2zUeLKjLRpK4bKKJRBe5ljR9NCy66h6_OX0ZZ9fM9rmrbrYJaRLMux9Pcg_sMGVfGBylrGlcb-3qMDkqz8nCym330cD2aD2_xZHozHmYTbHkct1gJIQxnnJfKAs1pSgsRSyKN5JAXBRib2oIwXpaKclPyxAJTCajwPKTSKt5H59vcUPvRgW_1su5cFSo1i0kgIEWI7yO2vbKu9t5BqRu3eDdurSnRfwT1hqD-I6h3BIPpbGtaAMC_QcqUMkX4LwQDbVM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2409378732</pqid></control><display><type>article</type><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><source>IEEE Electronic Library (IEL)</source><creator>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</creator><creatorcontrib>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</creatorcontrib><description>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2941759</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Closed-loop systems ; Cogeneration ; Combined cycle power generation ; Computer crime ; Computer networks ; Control systems ; cool water basin ; Cooling ; Cooling towers ; cyber-physical systems ; cyberattacks ; Cybersecurity ; data fusion ; Delay effects ; Desalination ; energy-water nexus ; Exhaust systems ; Industrial electronics ; intrusion detection ; liquid-level control ; Performance evaluation ; Pollution measurement ; power and water desalination plant ; Power generation ; Power plants ; quadruple tank system ; security ; Sensors ; Stability analysis ; Stability criteria ; subobserver ; Subsystems ; time delay ; Utilities ; Water levels ; water utility</subject><ispartof>IEEE systems journal, 2020-06, Vol.14 (2), p.2054-2065</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</citedby><cites>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</cites><orcidid>0000-0003-4955-6889 ; 0000-0002-8615-1592 ; 0000-0002-1136-6433</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8861290$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8861290$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Khalid, Haris M.</creatorcontrib><creatorcontrib>Muyeen, S. M.</creatorcontrib><creatorcontrib>Peng, Jimmy C.-H.</creatorcontrib><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</description><subject>Closed-loop systems</subject><subject>Cogeneration</subject><subject>Combined cycle power generation</subject><subject>Computer crime</subject><subject>Computer networks</subject><subject>Control systems</subject><subject>cool water basin</subject><subject>Cooling</subject><subject>Cooling towers</subject><subject>cyber-physical systems</subject><subject>cyberattacks</subject><subject>Cybersecurity</subject><subject>data fusion</subject><subject>Delay effects</subject><subject>Desalination</subject><subject>energy-water nexus</subject><subject>Exhaust systems</subject><subject>Industrial electronics</subject><subject>intrusion detection</subject><subject>liquid-level control</subject><subject>Performance evaluation</subject><subject>Pollution measurement</subject><subject>power and water desalination plant</subject><subject>Power generation</subject><subject>Power plants</subject><subject>quadruple tank system</subject><subject>security</subject><subject>Sensors</subject><subject>Stability analysis</subject><subject>Stability criteria</subject><subject>subobserver</subject><subject>Subsystems</subject><subject>time delay</subject><subject>Utilities</subject><subject>Water levels</subject><subject>water utility</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1OwzAQhS0EEqVwAdhEYu3inyS22YWqQFFFFy0CVpbjTKClJMFOEL0NZ-FkmLZiNaOnee-NPoROKRlQStTF3ex5Nh8wQtWAqZiKRO2hHlVcYMV4vL_ZGZZUxofoyPslIYlMhOqhp-E6B4eztjX2zUeLKjLRpK4bKKJRBe5ljR9NCy66h6_OX0ZZ9fM9rmrbrYJaRLMux9Pcg_sMGVfGBylrGlcb-3qMDkqz8nCym330cD2aD2_xZHozHmYTbHkct1gJIQxnnJfKAs1pSgsRSyKN5JAXBRib2oIwXpaKclPyxAJTCajwPKTSKt5H59vcUPvRgW_1su5cFSo1i0kgIEWI7yO2vbKu9t5BqRu3eDdurSnRfwT1hqD-I6h3BIPpbGtaAMC_QcqUMkX4LwQDbVM</recordid><startdate>202006</startdate><enddate>202006</enddate><creator>Khalid, Haris M.</creator><creator>Muyeen, S. M.</creator><creator>Peng, Jimmy C.-H.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4955-6889</orcidid><orcidid>https://orcid.org/0000-0002-8615-1592</orcidid><orcidid>https://orcid.org/0000-0002-1136-6433</orcidid></search><sort><creationdate>202006</creationdate><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><author>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Closed-loop systems</topic><topic>Cogeneration</topic><topic>Combined cycle power generation</topic><topic>Computer crime</topic><topic>Computer networks</topic><topic>Control systems</topic><topic>cool water basin</topic><topic>Cooling</topic><topic>Cooling towers</topic><topic>cyber-physical systems</topic><topic>cyberattacks</topic><topic>Cybersecurity</topic><topic>data fusion</topic><topic>Delay effects</topic><topic>Desalination</topic><topic>energy-water nexus</topic><topic>Exhaust systems</topic><topic>Industrial electronics</topic><topic>intrusion detection</topic><topic>liquid-level control</topic><topic>Performance evaluation</topic><topic>Pollution measurement</topic><topic>power and water desalination plant</topic><topic>Power generation</topic><topic>Power plants</topic><topic>quadruple tank system</topic><topic>security</topic><topic>Sensors</topic><topic>Stability analysis</topic><topic>Stability criteria</topic><topic>subobserver</topic><topic>Subsystems</topic><topic>time delay</topic><topic>Utilities</topic><topic>Water levels</topic><topic>water utility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khalid, Haris M.</creatorcontrib><creatorcontrib>Muyeen, S. M.</creatorcontrib><creatorcontrib>Peng, Jimmy C.-H.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khalid, Haris M.</au><au>Muyeen, S. M.</au><au>Peng, Jimmy C.-H.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-06</date><risdate>2020</risdate><volume>14</volume><issue>2</issue><spage>2054</spage><epage>2065</epage><pages>2054-2065</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2941759</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-4955-6889</orcidid><orcidid>https://orcid.org/0000-0002-8615-1592</orcidid><orcidid>https://orcid.org/0000-0002-1136-6433</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-8184
ispartof IEEE systems journal, 2020-06, Vol.14 (2), p.2054-2065
issn 1932-8184
1937-9234
language eng
recordid cdi_proquest_journals_2409378732
source IEEE Electronic Library (IEL)
subjects Closed-loop systems
Cogeneration
Combined cycle power generation
Computer crime
Computer networks
Control systems
cool water basin
Cooling
Cooling towers
cyber-physical systems
cyberattacks
Cybersecurity
data fusion
Delay effects
Desalination
energy-water nexus
Exhaust systems
Industrial electronics
intrusion detection
liquid-level control
Performance evaluation
Pollution measurement
power and water desalination plant
Power generation
Power plants
quadruple tank system
security
Sensors
Stability analysis
Stability criteria
subobserver
Subsystems
time delay
Utilities
Water levels
water utility
title Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T07%3A52%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cyber-Attacks%20in%20a%20Looped%20Energy-Water%20Nexus:%20An%C2%A0Inoculated%20Sub-Observer-Based%20Approach&rft.jtitle=IEEE%20systems%20journal&rft.au=Khalid,%20Haris%20M.&rft.date=2020-06&rft.volume=14&rft.issue=2&rft.spage=2054&rft.epage=2065&rft.pages=2054-2065&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2941759&rft_dat=%3Cproquest_RIE%3E2409378732%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2409378732&rft_id=info:pmid/&rft_ieee_id=8861290&rfr_iscdi=true