Cyber-Physical Distributed Systems. Min XieЧитать онлайн книгу.
dynamic game between the network defender and attacker at the system level. For current utility CPSs, cyber threats from supervisory control and data acquisition (SCADA) systems, and spear‐phishing attacks on the accounts of internal employees to gain access to dedicated communication networks are investigated in Chapters 6 and 7. In addition, these chapters focus on how to modify the basic modeling techniques presented in Chapter 2 to describe cyber vulnerabilities, such as seizing the SCADA system under control, disabling/destroying IT infrastructure components, and denial‐of‐service (DoS) attacks on the control center in smart grids. Based on historical data for IT security spending, the cost of launching distributed DoS attacks, and the occurrence probability of cyber event losses, the contest intensity between the attacker and defender can be accurately predicted for the next period to guide the design of an effective network protection plan, that is, a game‐theoretic protection plan and a Bayesian‐based cyberteam deployment.
Chapter 7 investigates sequential control problems (i.e., sequential cyberteam deployment) in modern CPSs by introducing an adversarial cost sequence with a variation constraint. Chapter 6 reviews the data‐driven vulnerability model, and Chapter 7 deals with the dataset of the arrival time of cyberattacks, which uncovers the statistical pattern of attackers. To solve such problems, a fundamental idea is to first obtain sampled parameters for the arrival model of cyberattacks from the posterior distribution of realistic cyberattack arrival records. The reinforcement learning model for estimating parameters is formulated as a partly parameterized Bayesian model. As a result, the sampled parameters are used instead of the true parameters. The paradigm of this framework can also be applied to other classical models, although specific models are used here for illustration purposes. Next, a Bayesian multi‐node bandit is built to cope with the problem, and an online learning algorithm (the Thompson‐Hedge algorithm) is forwarded to retain a converging regret function that is a function of the cyberteam deployment. By comparison with the existing algorithm, the convergence rate of the regret function in the proposed algorithm is found to be superior.
Each of Chapters 3–7 can be read independently when one is interested in a specific type of application or further research, making the book attractive to readers from different areas or positions. This book has the following distinct features:
It is the first book to systematically focus on CPSs with respect to modeling and reliability analysis.
It provides a comprehensive treatment of imperfect fault coverage (single level/multi‐level or modular), functional dependence, common cause failures (deterministic and probabilistic), competing failures (deterministic and probabilistic), and dynamic standby sparing.
It includes abundant illustrative examples and case studies based on real‐world systems.
It covers recent advances in combinatorial models and algorithms for CPS modeling and analysis.
It has a rich set of references, providing helpful resources for readers to pursue further research and study of the topics.
The target audience of the book is undergraduate (senior level) and graduate students, engineers, and researchers in system science and related disciplines, including those in computers, telecommunications, transportation, and other industries. Readers should have some knowledge of basic probability theory, control theory, computer science, optimization, game theory, and stochastic processes. However, the book includes a chapter reviewing the fundamentals that readers need to know for understanding the content of the other chapters covering advanced topics in CPSs and case studies. The book can provide readers with knowledge and insight of CPS behaviors, as well as the skills of modeling and analyzing these behaviors to guide the resilient design of real‐world critical systems. Thus, the book includes necessary background information, making it self‐contained. For some detailed topics, selected for their importance and application potential, references are provided for those interested in further details.
We would like to express our sincere appreciation to the many researchers who have proposed some underlying concepts, frameworks, and methods used in this book, or who have co‐authored with us some topics of the book and provided their insights; to name a few, Professor Enrico Zio from Politecnico di Milano, Professor Yanfu Li from Tsinghua University, Dr. Gregory Levitin from the Israel Electric Corporation, Professor David W. Coit from Rutgers University, and Professor Junlin Xiong from the University of Science and Technology of China. Though there are many other researchers to mention, and we have tried to recognize their significant contributions in the bibliographical references of the book.
Finally, it was our huge pleasure to work with Juliet Booker, managing editor of Electrical & Computer Engineering, John Wiley & Sons Ltd., and her team, who have assisted in the publication of this book. We deeply appreciate their efforts and support.
December 15, 2020
Huadong Mo Min Xie Giovanni Sansavini
Acronyms and Abbreviations
ACE | Area Control Error |
AERs | All‐Electric Ranges |
AGC | Automatic Generation Control |
AGC' | Actual Global Cost |
B | Biomass Power |
BESS | Battery Energy Storage System |
CBM | Condition‐Based Maintenance |
CC | Control Center |
CCC | Centralized Control Centers |
CCF | Cross‐Correlation Factor |
CPS | Cyber‐Physical System |
CSMA/AMP | Carrier Sense Multiple Access with Arbitration on Message Priority |
CSMA/CD | Carrier Sense Multiple Access with Collision Detection |
CTMC | Continuous‐Time Markov Chains |
DC | Direct Current |
DEG | Diesel Engine Generator |
DERs | Distributed Energy Resources |
DG | Distributed Generation |
DGS | Distributed Generation Systems |
DHMM | Discrete HMM |
DoS | Denial of Service |