Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach
The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control syste...
Gespeichert in:
Veröffentlicht in: | IEEE systems journal 2020-06, Vol.14 (2), p.2054-2065 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2065 |
---|---|
container_issue | 2 |
container_start_page | 2054 |
container_title | IEEE systems journal |
container_volume | 14 |
creator | Khalid, Haris M. Muyeen, S. M. Peng, Jimmy C.-H. |
description | The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention. |
doi_str_mv | 10.1109/JSYST.2019.2941759 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2409378732</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8861290</ieee_id><sourcerecordid>2409378732</sourcerecordid><originalsourceid>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</originalsourceid><addsrcrecordid>eNo9kE1OwzAQhS0EEqVwAdhEYu3inyS22YWqQFFFFy0CVpbjTKClJMFOEL0NZ-FkmLZiNaOnee-NPoROKRlQStTF3ex5Nh8wQtWAqZiKRO2hHlVcYMV4vL_ZGZZUxofoyPslIYlMhOqhp-E6B4eztjX2zUeLKjLRpK4bKKJRBe5ljR9NCy66h6_OX0ZZ9fM9rmrbrYJaRLMux9Pcg_sMGVfGBylrGlcb-3qMDkqz8nCym330cD2aD2_xZHozHmYTbHkct1gJIQxnnJfKAs1pSgsRSyKN5JAXBRib2oIwXpaKclPyxAJTCajwPKTSKt5H59vcUPvRgW_1su5cFSo1i0kgIEWI7yO2vbKu9t5BqRu3eDdurSnRfwT1hqD-I6h3BIPpbGtaAMC_QcqUMkX4LwQDbVM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2409378732</pqid></control><display><type>article</type><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><source>IEEE Electronic Library (IEL)</source><creator>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</creator><creatorcontrib>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</creatorcontrib><description>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2941759</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Closed-loop systems ; Cogeneration ; Combined cycle power generation ; Computer crime ; Computer networks ; Control systems ; cool water basin ; Cooling ; Cooling towers ; cyber-physical systems ; cyberattacks ; Cybersecurity ; data fusion ; Delay effects ; Desalination ; energy-water nexus ; Exhaust systems ; Industrial electronics ; intrusion detection ; liquid-level control ; Performance evaluation ; Pollution measurement ; power and water desalination plant ; Power generation ; Power plants ; quadruple tank system ; security ; Sensors ; Stability analysis ; Stability criteria ; subobserver ; Subsystems ; time delay ; Utilities ; Water levels ; water utility</subject><ispartof>IEEE systems journal, 2020-06, Vol.14 (2), p.2054-2065</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</citedby><cites>FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</cites><orcidid>0000-0003-4955-6889 ; 0000-0002-8615-1592 ; 0000-0002-1136-6433</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8861290$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8861290$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Khalid, Haris M.</creatorcontrib><creatorcontrib>Muyeen, S. M.</creatorcontrib><creatorcontrib>Peng, Jimmy C.-H.</creatorcontrib><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</description><subject>Closed-loop systems</subject><subject>Cogeneration</subject><subject>Combined cycle power generation</subject><subject>Computer crime</subject><subject>Computer networks</subject><subject>Control systems</subject><subject>cool water basin</subject><subject>Cooling</subject><subject>Cooling towers</subject><subject>cyber-physical systems</subject><subject>cyberattacks</subject><subject>Cybersecurity</subject><subject>data fusion</subject><subject>Delay effects</subject><subject>Desalination</subject><subject>energy-water nexus</subject><subject>Exhaust systems</subject><subject>Industrial electronics</subject><subject>intrusion detection</subject><subject>liquid-level control</subject><subject>Performance evaluation</subject><subject>Pollution measurement</subject><subject>power and water desalination plant</subject><subject>Power generation</subject><subject>Power plants</subject><subject>quadruple tank system</subject><subject>security</subject><subject>Sensors</subject><subject>Stability analysis</subject><subject>Stability criteria</subject><subject>subobserver</subject><subject>Subsystems</subject><subject>time delay</subject><subject>Utilities</subject><subject>Water levels</subject><subject>water utility</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1OwzAQhS0EEqVwAdhEYu3inyS22YWqQFFFFy0CVpbjTKClJMFOEL0NZ-FkmLZiNaOnee-NPoROKRlQStTF3ex5Nh8wQtWAqZiKRO2hHlVcYMV4vL_ZGZZUxofoyPslIYlMhOqhp-E6B4eztjX2zUeLKjLRpK4bKKJRBe5ljR9NCy66h6_OX0ZZ9fM9rmrbrYJaRLMux9Pcg_sMGVfGBylrGlcb-3qMDkqz8nCym330cD2aD2_xZHozHmYTbHkct1gJIQxnnJfKAs1pSgsRSyKN5JAXBRib2oIwXpaKclPyxAJTCajwPKTSKt5H59vcUPvRgW_1su5cFSo1i0kgIEWI7yO2vbKu9t5BqRu3eDdurSnRfwT1hqD-I6h3BIPpbGtaAMC_QcqUMkX4LwQDbVM</recordid><startdate>202006</startdate><enddate>202006</enddate><creator>Khalid, Haris M.</creator><creator>Muyeen, S. M.</creator><creator>Peng, Jimmy C.-H.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4955-6889</orcidid><orcidid>https://orcid.org/0000-0002-8615-1592</orcidid><orcidid>https://orcid.org/0000-0002-1136-6433</orcidid></search><sort><creationdate>202006</creationdate><title>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</title><author>Khalid, Haris M. ; Muyeen, S. M. ; Peng, Jimmy C.-H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c344t-9777a3233f9ce1b161d74808a83ebddeac6cd023ff913af35ce295e9579e68c93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Closed-loop systems</topic><topic>Cogeneration</topic><topic>Combined cycle power generation</topic><topic>Computer crime</topic><topic>Computer networks</topic><topic>Control systems</topic><topic>cool water basin</topic><topic>Cooling</topic><topic>Cooling towers</topic><topic>cyber-physical systems</topic><topic>cyberattacks</topic><topic>Cybersecurity</topic><topic>data fusion</topic><topic>Delay effects</topic><topic>Desalination</topic><topic>energy-water nexus</topic><topic>Exhaust systems</topic><topic>Industrial electronics</topic><topic>intrusion detection</topic><topic>liquid-level control</topic><topic>Performance evaluation</topic><topic>Pollution measurement</topic><topic>power and water desalination plant</topic><topic>Power generation</topic><topic>Power plants</topic><topic>quadruple tank system</topic><topic>security</topic><topic>Sensors</topic><topic>Stability analysis</topic><topic>Stability criteria</topic><topic>subobserver</topic><topic>Subsystems</topic><topic>time delay</topic><topic>Utilities</topic><topic>Water levels</topic><topic>water utility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khalid, Haris M.</creatorcontrib><creatorcontrib>Muyeen, S. M.</creatorcontrib><creatorcontrib>Peng, Jimmy C.-H.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khalid, Haris M.</au><au>Muyeen, S. M.</au><au>Peng, Jimmy C.-H.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-06</date><risdate>2020</risdate><volume>14</volume><issue>2</issue><spage>2054</spage><epage>2065</epage><pages>2054-2065</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>The deployment of advanced sensors has strengthened the monitoring capability of power plants. In the context of the cogeneration process, the plant cooling is performed by the cooling towers using the condensation process on exhaust steam. However, the computer networks and industrial control systems built on this sensor-based digital layer may become vulnerable to cyberattacks. This may eventually raise a concern on the performance and security of these energy utilities. To resolve this issue, an inoculated subobserver-based fusion filter is proposed. It improves the resilience against malicious attacks in combined cycle power plants with desalination units, which are usually functioning in a closed-loop environment and infected with injected attacks. A time-delay-based state representation is considered for the system. To access latency in a closed-loop environment, a subsystem-based set of subobservers are introduced. Information from each sensor is then gathered using the interacting-multiple-model-based fusion process. The stability of the system has been proved and kept in-check at two different implementation levels of the procedure using functional equivalence and Lyapunov stability criteria, respectively. Performance evaluation is then conducted on a water-level system. Results show that the proposed scheme accurately extracted the system parameters from the contaminated measurements in the presence of multiple system disturbances and cyber intervention.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2941759</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-4955-6889</orcidid><orcidid>https://orcid.org/0000-0002-8615-1592</orcidid><orcidid>https://orcid.org/0000-0002-1136-6433</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-8184 |
ispartof | IEEE systems journal, 2020-06, Vol.14 (2), p.2054-2065 |
issn | 1932-8184 1937-9234 |
language | eng |
recordid | cdi_proquest_journals_2409378732 |
source | IEEE Electronic Library (IEL) |
subjects | Closed-loop systems Cogeneration Combined cycle power generation Computer crime Computer networks Control systems cool water basin Cooling Cooling towers cyber-physical systems cyberattacks Cybersecurity data fusion Delay effects Desalination energy-water nexus Exhaust systems Industrial electronics intrusion detection liquid-level control Performance evaluation Pollution measurement power and water desalination plant Power generation Power plants quadruple tank system security Sensors Stability analysis Stability criteria subobserver Subsystems time delay Utilities Water levels water utility |
title | Cyber-Attacks in a Looped Energy-Water Nexus: An Inoculated Sub-Observer-Based Approach |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T07%3A52%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cyber-Attacks%20in%20a%20Looped%20Energy-Water%20Nexus:%20An%C2%A0Inoculated%20Sub-Observer-Based%20Approach&rft.jtitle=IEEE%20systems%20journal&rft.au=Khalid,%20Haris%20M.&rft.date=2020-06&rft.volume=14&rft.issue=2&rft.spage=2054&rft.epage=2065&rft.pages=2054-2065&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2941759&rft_dat=%3Cproquest_RIE%3E2409378732%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2409378732&rft_id=info:pmid/&rft_ieee_id=8861290&rfr_iscdi=true |