Conference paper

file

Visible to the public Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model

The supervisory control and data acquisition (SCADA) network in a smart grid must be reliable and efficient to transmit real-time data to the controller, especially when the system is under contingencies or cyberattacks. Introducing the features of software-defined networks (SDN) into a SCADA network helps in better management of communication and deployment of novel grid control operations.

file

Visible to the public Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission

A smart grid is a widely distributed engineering system with overhead transmission lines. Physical damage to these power lines, from natural calamities or technical failures, will disrupt the functional integrity of the grid. To ensure the continuation of the grid's operational flow when those phenomena happen, the grid operator must immediately take steps to nullify the impacts and repair the problems, even if those occur in hardly-reachable remote areas.

file

Visible to the public DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems

Cyber-physical systems (CPSs) and the Internet of Things (IoT) are converging towards a hybrid platform that is becoming ubiquitous in all modern infrastructures. The massive deployment of CPS requires comprehensive, secure, and reliable communication. The integration of complex and heterogeneous systems makes enormous space for the adversaries to get into the network and inject malicious data. To obfuscate and mislead the attackers, we propose DDAF, a deception defense-based data acquisition framework for a hierarchical communication network of CPSs.

file

Visible to the public Control Synthesis for Cyber-Physical Systems to Satisfy MITL Objectives under Timing and Actuator Atta

This paper studies the synthesis of controllers for

cyber-physical systems (CPSs) that are required to carry out

complex tasks that are time-sensitive, in the presence of an

adversary. The task is specified as a formula in metric interval

temporal logic (MITL). The adversary is assumed to have the

ability to tamper with the control input to the CPS and also

manipulate timing information perceived by the CPS. In order

to model the interaction between the CPS and the adversary, and