You are on page 1of 6

Cyber Attack and Fault Identification of HVAC

System in Building Management Systems


A. Sheikh, Student Member, IEEE, V. Kamuni, Student Member, IEEE, A. Patil, Student Member, IEEE,
S. Wagh, Senior Member, IEEE, and N. Singh, Member, IEEE
EED,VJTI, Mumbai, India

Abstract—In today’s modern life the smart buildings play boilers) operation is managed with the help of BMS, whereas
an important role in providing a luxurious environment with the operation of electrical components (e.g., combined heat
reduced energy consumption and environmental concern. For and power (CHP)) is managed by SCADA. However, the
managing every smart equipment according to the requirement
and comfort, the centralized management system called the control and management of such smart buildings require an
Building Management System (BMS) performs an essential extensive exchange of information and data as well as the
part. The operations of BMS is majorly coordinated with the integration of physical and cyber systems. With this integra-
communication layer or a cyber layer. Thus, the BMS is very tion, there is a major concern over the optimal sharing of both
much prone to cyber attacks and can lead to malfunctioning of digital (relevant data) and natural resources (such as water or
major components in BMS. Another important aspect is electrical
faults in the system irrespective of any cyber attacks. The energy) in smart buildings [2]. Hence such smart buildings are
paper focuses, firstly, to identify the electrical fault and attack subjected to high risk of vulnerabilities and cyber-attacks in
with proposed Boolean Identification Strategy (BIS). Secondly, the coming years.
after the identification of attack, the paper analyzes the type The most well-known case of cyber-attack on buildings is
of attacks with pattern recognition using Machine Learning an attack on Google Australia office in Sydney (May 2013)
classifier. The results show the effectiveness of proposed strategies
by recognizing the pattern of the two most familiar cyber attacks. [3], in which the complete BMS system was hacked by the
attackers. According to [4], hackers broke into intranet of
Index Terms—Building Management System, Cyber Attacks, Target Corporation by stealing network credentials from a
Faults, Machine Learning service provider of HVAC which resulted in the exposure of
around 40 million credit and debit accounts within a span
I. I NTRODUCTION of 3 weeks. As described in [5], with the advancement in
the HVAC market, there is a simultaneous increase in the
I N buildings, the automatic control of different electrical
components has resulted in trends of smart buildings and
building management system (BMS). With the era of smart
number of smart buildings. The increase in the number of
components getting integrated into buildings results in BMS
buildings, various systems such as telecommunications, user becoming more accessible online [6]. This recent development
systems, life safety, building automation, and facility manage- in connection of SCADA to the internet resulted in the
ment system are integrated under one roof. There are primarily integration of a new system with old system leading to more
two main reasons because of which concept of smart buildings exposure of the system to cyber-attacks.
appears to be almost inevitable. Firstly, the need for high effi- There has been a tremendous increase in the area of control
cient output of employees inside a building is important as the systems security research, resilient control design and attacks
user spends 90% of time indoors [1]. Secondly, the building estimation algorithms. [7]–[12]. In [7] an intelligent adversary
consumes approximately 40% of total energy consumption and was considered which increases the system operation cost in
is also responsible for 30% of greenhouse gas emissions [2]. contrast to controller objective of reducing the same cost. The
limitations of identifying and detecting attack were analyzed
For controlling various components such as building heating
by [8] with the help of linear systems in the power grid.
demand, fire alarming system, security system, etc. a BMS is
In [9] the authors first characterize the nodes which are
used in smart buildings. The users comfort is most affected
infected but can be tolerated and then proposes a way to
by the operation of heating, ventilation and air conditioning
deal with the consequences of malicious agents present in the
(HVAC) and it is also considered to be one of the highest
system. The linear system estimation and control in presence
sources of energy consumption while the building is in op-
of attack on some of sensors and actuators were studied in
eration. The efficient operation of an HVAC system depends
[10]. Further, the authors presented an efficient algorithm
significantly on BMS as well as supervisory control and data
based on compressed sensing techniques for estimating plant
acquisition (SCADA) system. The thermal components (e.g.,
state in spite of the attack. In addition, [11] proposed a general
A. Sheikh, V. Kamuni, A. Patil, S. Wagh and N. Singh are framework for modeling and analyzing the impact of attacks.
with the Department of Electrical Engineering, VJTI, Mumbai, India The authors designed a control technique in [12], which uses
masheikh_p17@ee.vjti.ac.in a recursive filtering algorithm for estimating system states.
978-1-7281-2658-6/19/$31.00 © 2019 IEEE This technique has the advantage of resiliency against certain

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.
attack on the sensor. From the aforementioned literature, it can by them. However, being an important link for data exchange
be said that the detection of attack as well as identification and communication it is more prone to cyber attacks.
of attack is quite challenging. As in the present situation In the worst case, the attack on the central system may lead
with an era of critical infrastructures the major concern is to to complete failure of the system. However, for the attacker to
distinguish between an electrical fault and cyber attack. Once attack centralized computer it has to pass different layers of
the difference between attack and fault is build, the next major BMS which is quite difficult on a real-time basis. The different
task is to detect the type of cyber attack. When the cyber attack operating layers of the BMS system is shown in Fig. 1. It
is detected, different control policies for maintaining system consists of four layers physical layer, communication layer, a
resiliency should be triggered. In the case of smart buildings as protection layer, and a centralized control center as seen in
different component layers are integrated with each other the Fig. 1. The details of each layer are as follows
complexity of handling the overall operation become tedious.
In such case, if some malfunctioning occurs in any of the
layers then it may affect the overall operation of the BMS
system.
In this paper different scenarios of cyber attack and fault in
an HVAC system of a smart building is considered. The major
contribution of the paper is as follows:
i) For identifying cyber attack and fault in case of smart
building a mechanism employing Boolean logic is pro-
posed in this paper
ii) The proposed Boolean logic is used for training the ma-
chine learning algorithm to differentiate between normal
mode, fault, and attack.
iii) After the identification of attack, a process control chart
and day ahead predicted logic is used to observe the
temperature profile pattern from which the type of attack
is recognized. Fig. 1. Four operating layers of the BMS
iv) To show the effectiveness of proposed Boolean logic and
machine learning algorithm, the two most familiar attacks 1) Physical Layer: This layer consist of a physical set
are introduced in the system and the proposed strategy of units present in the building. Each unit will have
successfully detects the suspicious operating conditions different sensing as well as display components such
as well as the type of cyber attack present in the system. as temperature sensor, temperature display. Any attack
The rest of paper is organized as follows: Section II focuses on this layer will result in the complete failure of the
on the model of BMS. Section III introduces different types unit.
of attacks on BMS. Section IV presents the mathematical 2) Communication Layer: Communication layer connects
formulation of the proposed strategy for differentiating attacks all the sensors and measuring units attached to devices
and faults. Section V provides supporting case studies and in the physical layer with protection layers through com-
results to confirm the claim and Section VI concludes with munication links. These links transfer the actual state of
the possible future extension of the work. the sensors and measurement units to the protection unit,
which makes protection equipment respond well in time
II. M ODEL OF BMS
to protect the system.
Smart buildings have various systems like HVAC, fire alarm 3) Protection layer: Protection layer consists of a relay,
and detection system, illumination system, and access control circuit breakers, current and voltage measurements. This
system interconnected to each other with the help of a central layer performs a crucial role at the time of electrical
system i.e. BMS. The BMS coordinates with different com- faults to protect the system from damage.
ponents of buildings through a communication network. The 4) Control Center: Control center is the brain of the system
important consideration in case of BMS is the user comfort and ensures the healthy performance of the system by
for which the control strategy is manipulated based on the continuously monitoring the system. The communica-
user requirements. For effective operation of the BMS, various tion links act as the nerves of the system and bring
sensors are implemented at different components layers. The data from sensors and measurement units. If the control
major role of the sensor is to continuously monitor the state center finds some unusual behavior it will take the
of the system and send different measured data to the central corresponding corrective action.
system. With the help of these measurements, the system state
is estimated and accordingly the control actions are initiated. III. ATTACKS ON BMS
The communication network plays a significant role in BMS The BMS is centralized computer-based control of actuators
as all exchange of data between different layers is coordinated operating across the building. To make it smart the BMS

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.
is integrated with other systems via open protocols such as where n is the number of states at time t Suppose, if
C-Bus and Profibus or internet protocols [2]. The BMS is some part of T emp1 (t) is eavesdropped by an attacker,
integrated with temperature control, access control, lighting, that is T emp1 (tp ) = {αr , ...., αk }, where r, k < n. In
security, power, fire control, elevator and escalator controls, a replay attack, the attacker tries to replicate this data
smart whiteboards, and clinical systems. This characteristic is in the next 24hours time interval from r to k. Let say
making smart building increasingly susceptible to the cyber T emp2 (t) be the set of temperature data for a second
attack. Most of the BMS has Internet-accessible controls. The day.
connection with the internet makes the system more prone to T emp2 (t) = {β1 , β2 , ...., βn } (3)
cyber attacks. By hacking the BMS, the attacker may gain
access over the system control. The attacker might enable to The part of temperature values of T emp2 (k) is replaced
change temperature setpoint of the HVAC system. by {αr , ...., αk }. Thus,
The role of cyber attacks in BMS is explained in this section. T emp2 (t) = {β1 , β2 , ..., αr , ...., αk , ..., βn } (4)
Nowadays the cyber attacks are continuously increasing. Thus,
it is important to understand the behavior of different attacks With this the attacker succeeds in manipulating the
on the system model. Cyber attacks severity is identified using temperature data, which affects the BMS control over
adversary’s resources and model knowledge of the system. HVAC, affecting the operational status.
The adversary’s resources include disclosure resources and
IV. M ATHEMATICAL F ORMULATION FOR
disruptive resources [11]. Considering a few types of attacks
DIFFERENTIATING ATTACKS AND FAULTS
such as Denial of Service (DoS), and Replay Attack the
temperature behavior is observed. The attack scenarios on A. Boolean Identification Strategy (BIS) for different operating
HVAC in BMS is as follows, conditions
1) DoS Attack: The DoS attack is the cyber attack in which The thermodynamics of a closed room is seen at the
the malicious attacker aims to disrupt the target system thermostat and its internal temperature equipped with Air
by temporarily jamming the data signals. Unfortunately, conditioning (AC) unit can be modeled using thermostat
modern critical infrastructures have experienced many parameters using hybrid state model [13]. The dynamics of
DoS attacks. The DoS attack may flood the SCADA internal temperature T emp(t)is given as,
system or any Remote Terminal Unit (RTU). This may 1
lead to a delay in data transfer. This type of attack has ˙
T emp(t) = [T emp(t) − T empa (t) − Sf P R] (5)
τ
knowledge of both disclosure and disruptive resources.
In an HVAC system, where the temperature of the room where T empa (t) is ambient temperature, Sf is a scaling factor
is maintained with BMS control. If the attacker intrudes of switching device, P is average energy transfer rate of the
into the system, it may disturb the temperature set- AC unit, R is the thermal resistance and τ is the time constant.
point, which cause a delay in monitoring temperature This dynamics of temperature is sensed by sensors con-
information. Thus, at the time of DoS, the temperature nected at the field level or the physical layer. The internal
at time t0 will be the same as at time tn . The temperature temperature T emp(t) is sensed by sensor S1 and ambient
at the time of DoS is given as, temperature T empa (t) by sensor S2 as shown in Fig. 2. As
discussed in Section III, the HVAC system of the particular
T emp(tn ) = T emp(tn+1 ) (1) building has the possibility of being attacked or the occurrence
2) Replay Attack: In a replay attack, the adversary aims of electric faults. The operating status of HVAC for the
to manipulate the system by misleading the data signals. proposed system is classified into three, i.e. normal, fault and
The data signals are tampered by maliciously repeated or attack scenarios. To identify the operating status of centralized
delayed data. The replay attack may interrupt the system BMS controlled HVAC, the paper proposes the identification
by stealing the data of a particular meter and using strategy called Boolean Identification Strategy (BIS), which
the same data repetitively to duplicate the identity. It determines the status of HVAC using logic explained in Fig.
has knowledge of both the disclosure and disruptive re- 3. The electrical faults in the sensor are secured by protection
sources, with which the attacker can read the information layer using the relay actuation system. However, BMS can be
and use for later disrupt of the system. Coming to HVAC misled by manipulating the status of sensors by an attacker.
systems, the replay attack may occur by eavesdropping Thus, the operating status of HVAC should be continuously
the temperature profile for a particular time period. By monitored and respective action should be taken.
doing this the attacker knows how the profile is varying. The logic involves two sections i.e. sensor status and energy
This data may be replayed to fool the BMS at different status, depending upon which the relay actuation status R is
time periods to exploit the system. operated. The status of sensors S1 and S2 are continuously
Let T emp1 (t) be the set of temperature profile data monitored using backup sensor Sb . The Sb goes high only
for a day (24hours), if both the sensors are on active status. Whenever anyone of
sensor or both sensors are inactive because of fault or attack,
T emp1 (t) = {α1 , α2 , ...., αn } (2) the Sb goes low. All the sensors S1 , S2 and Sb status is

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.
TABLE II
FAULT OPERATING CONDITION OF HVAC

S1 S2 Sb Sstatus VS1 VS2 P Pstatus R


0 0 0 1 0 0 1 1 1
0 1 0 1 0 1 1 1 1
1 0 0 1 1 0 1 1 1

operator, but the corresponding sensor voltage remains


Fig. 2. The structural layout of floor map equipped with AC units high. In such case even though the manipulated status
of the sensor is low the corresponding voltage sensor
remains high as shown in Table III. It is highly desired
that during an attack the system should remain intact
and there is no malfunctioning in the protection circuit.
Even though there is no electrical fault in the sensor, the
manipulated status of sensor shows the output to be low
which is equivalent to an electrical fault. In the case of
Fig. 3. Logical representation of BIS the low output of the sensor, the relay circuit should not
get active.
monitored by Sstatus , only if all three sensors goes high the
TABLE III
output Sstatus goes low. In case of any fault, the sensor status ATTACK OPERATING CONDITION OF HVAC
goes inactive and the corresponding sensor voltage also goes
low. According to the condition of Sstatus and Pstatus the S1 S2 Sb Sstatus VS1 VS2 P Pstatus R
0 0 0 1 1 1 1 0 0
relay R is activated. 0 1 0 1 1 1 1 0 0
The three possible scenarios of operation are discussed us- 1 0 0 1 1 1 1 0 0
ing the BIS method to identify and distinguish the fault/attack.
1) Normal: When the BMS system is operating at the
normal condition it means all the sensors at field level B. General description of Process Control Chart
are working in their healthy state. It defines that sensor Process Control Chart is a graphical representation of qual-
S1 and S2 are an active state, which also keeps Sb active. ity characteristics that have been measured from sample versus
Thus, it does not affect the status of VS1 , VS2 , and P the sample number or time. As seen in Fig. 4 it contains
keeping all at active state which indicates relay actuation a centerline (CL) that represents the average value of the
to be inactive. The normal condition is summarized in quality characteristic corresponding to the control state. The
Table I, inner two horizontal lines represent warning limits called an
upper warning limit (UWL) and lower warning limits (LWL).
TABLE I The outer lines correspond to the upper control limit (UCL)
N ORMAL OPERATING CONDITION OF HVAC and lower control limit (LCL). If nearly all process samples
S1 S2 Sb Sstatus VS1 VS2 P Pstatus R fall between warning limits then the process is assumed to
1 1 1 0 1 1 1 0 0 be in control. If the process sample falls between warning and
control limit for a small duration and returns back to normal as
2) Faults:The sensor faults may occur due to various rea- seen from the red plot in Fig. 4 then system shows suspicious
sons, one of which is direct exposure to the environment, behavior but adjust itself to get back into normal mode. Such
which may reduce the reliability and accuracy of the a system is adaptive and is able to manage small disturbances.
sensor reading. At such conditions the sensor status goes If the process crosses the control line as shown by the yellow
inactive, which also reflects on the status of the backup plot then there is a need for corrective actions as soon as
sensor. As the sensor goes inactive, the corresponding possible.
sensor voltage goes low. Thus, the relay actuation system Even if all the points plotted inside the control limits behave
goes active in case of various sensor fault such as a fault systematically or randomly represented by a green plot in Fig.
in any one sensor or fault in both the sensor, which are 4 then this could be an indication of malicious behavior of
summarized in Table II. the system and verification of process is needed. From Fig. 4
3) Attack: To mislead the BMS the attacker may manipu- it can be seen that even though the green plot lies between
late the HVAC field sensors to interrupt the operation of the warning limits the pattern is continuously constant with
BMS. At the time of the attack, the attacker changes the reference to CL. If this pattern of the sample increases above
status of the sensor from active to inactive or vice-versa. a threshold value then an alarm circuit should be triggered for
If the attacker succeeds in accessing or controlling the suspicious activity. Similarly, if the threshold of a number of
status of the sensor, by indicating the wrong signal to the suspicious samples is defined and if the number of samples

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.
Fig. 4. General control chart showing different operating limits

falling between warning limit and control limit is more than


this threshold as shown by the yellow plot in Fig. 4 then the
system is not able to withstand disturbances and the warning
alarm for taking corrective actions will be alerted.

C. Identification of Attack using a day ahead prediction


As described in Section IV-B the process control chart iden-
tifies any malicious behavior in the system by using control Fig. 5. Flowchart for proposed methods to classify and identify the attacks
limits. The threshold value of δ for variation in temperature
is considered to be 8 number of samples. If the temperature
DoS or Replay attack is identified using the machine learning
samples show malicious behavior for more than 8 samples then
algorithm.
necessary action should be initiated. However, considering the
complexity of the BMS system another backup mechanism is A. Classification of Normal, Fault, and Attack mode
adapted for re-verification of the number of samples deviated A system must be able to identify and differentiate between
based on the day ahead predicted values. In the day ahead pre- different operating modes. It must be able to detect whether the
diction generally the next day temperature profile is predicted system is working in normal mode or fault has occurred. In this
based on the daily consumption and occupants patterns. The paper, a classifier algorithm is used for differentiating attack
day ahead predicted value will be compared with the present- and fault. In the case of a bilinear classifier for training the
day value and any major deviation in the number of samples network, two different classes are used. A data set is formed
will result in the activation of an alarm circuit. showing the states of the sensors and relays for the different
As seen in Fig. 5, initially the machine learning algorithm scenarios shown in Table I, Table II and Table III. The given
is trained using BIS for classifying the modes of operation. data set has three scenarios of an HVAC system operation
Once the mode is classified as fault then the protection layer which are normal mode, fault, and attack. For training the
circuit is activated. However, when the mode is classified as bilinear classifier instead of considering all scenarios together
attack the data set of the temperature profile is checked for only two of them are considered at a time. Four different cases
any deviation or malicious activity. If the value in temperature for considering the different combinations of two scenarios are
profile deviation is less than the threshold value then the shown in Table IV. In case 1 network is trained with classes
alarm circuit is activated and the complete system is checked normal mode and attack, case 2 considers attack and fault,
for malicious activity. For the deviation value greater than case 3 considers normal and fault and case 4 considers fault
the threshold value, the next step is to compare the day- and attack together and normal operation.
ahead predicted profile and current profile. If there is a
major deviation in profile then the machine learning algorithm TABLE IV
is adopted for identifying the type of attack. The machine D IFFERENT CASES FOR CLASSIFICATION
learning algorithm for identify the attack is trained using (1), Case Class A Class B
(2), (3), and (4). case1 Normal Attack
case2 Attack Fault
V. R EPRESENTATIVE C ASE S TUDY AND R ESULTS case3 Normal Fault
case4 Fault and Attack Normal
The proposed BIS logic is used to train the machine learning
algorithm. The representative case study is carried out in two
parts. In the first part, the modes of operation are classified B. Attack identification: DoS or Replay attack
as a normal, fault, and attack with the help of BIS trained Once the classification between fault and attack is built the
machine learning algorithm. Secondly, the types of attack i.e. next major step is to identify the type of attack on the system.

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.
This attack detection is carried out using a machine learning
algorithm. This paper uses the Support Vector Machine (SVM)
algorithm which finds a hyperplane in N-dimensional space
that distinctly classifies the data points. To separate two classes
of data points, there are many possible hyperplanes available,
SVM produces a hyperplane which provides maximum margin
between two classes. This margin helps in providing some
reinforcements so that future data points can be classified
with more confidence. The machine learning classifiers are
trained such that any presence of malicious data will be Fig. 7. Temperature profile under the influence of Replay Attack
detected. Firstly, the number of samples in the presence of
attack is verified using the process control chart and day-
ahead predicted logic. Secondly, the samples are compared the system is working in normal mode, or is under attack, or
with standard cyber-attacks patterns using (1), (2), (3), and has experienced an electrical fault. Secondly, after the classi-
(4). This information of cyber-attack pattern is fed to SVM fication, using process control chart and day ahead predicted
algorithm for training. After the occurrence of attack, the logic two famous cyber attacks i.e. DoS and replay attack
machine learning classifier starts recognizing the patterns of is identified. The Machine Learning algorithms are used to
temperature profile and depending on the pattern it classifies identify whether it is attack or fault and also to classify
the type of attack. From Fig. 6 it can be seen that the the types of attacks in the system. From the result, it is
temperature profile remains constant after 45 hours till 90 claimed that the proposed strategy successfully differentiate
hours this activity is similar to the DoS attack as described between attack and fault and also successfully classify the
in (1) where the previous value keeps on repeating in the next types of attacks in the BMS. In the future, the different types
value. Thus, the identified attack can introduce the latency in of cyber attacks like flooding, false data injection, etc. will
BMS communication network. be considered for testing the effectiveness of the proposed
strategy.
R EFERENCES
[1] J. A. Leech, W. C. Nelson, R. T Burnett, S. Aaron, and M. E.
Raizenne, “It’s about time: a comparison of canadian and american
time–activity patterns,” Journal of Exposure Science and Environmental
Epidemiology, vol. 12, no. 6, p. 427, 2002.
[2] S. Wendzel, J. Tonejc, J. Kaur, and A. Kobekova, Cyber security of
smart buildings. Wiley, 2017.
[3] K. Zetter, “Researchers hack building control system at google
australia office,” Wired. com, available at https://www. wired.
com/2013/05/googles-control-system-hacked (accessed 9th June, 2017),
2013.
[4] B. Krebs, “Target hackers broke in via hvac company,” Krebs on
Fig. 6. Temperature profile under the influence of DOS Attack Security, 2014.
[5] Markets and Markets, “Smart hvac controls market by product type,
Similarly in Fig 7 it can be seen that the temperature components, application, operation & geography-analysis and forecast
to 2014-2020,” 2014.
profile is manipulated with false data in a periodic manner as [6] J. Vijayan, “With the internet of things, smart buildings pose big risk,”
explained in Section III. In Fig. 7 it can be observed that for Computer World, 2014.
around every 20 hours the data is repeated because of attack. [7] A. Gupta, C. Langbort, and T. Başar, “Optimal control in the presence
of an intelligent jammer with limited actions,” in 49th IEEE Conference
This situation is similar to replay attack in which as per (2), (3) on Decision and Control (CDC). IEEE, 2010, pp. 1096–1101.
and (4) the temperature data of the first day is repeated again in [8] F. Pasqualetti, F. Dörfler, and F. Bullo, “Attack detection and identifica-
second-day temperature profile for a particular period of time. tion in cyber-physical systems,” IEEE transactions on automatic control,
vol. 58, no. 11, pp. 2715–2729, 2013.
Thus by considering different pattern recognition techniques, [9] S. Sundaram and C. N. Hadjicostis, “Distributed function calculation
the SVM algorithm classifies whether the attack is a DoS via linear iterative strategies in the presence of malicious agents,” IEEE
attack or a replay attack. However, in the case of a DoS attack, Transactions on Automatic Control, vol. 56, no. 7, pp. 1495–1508, 2010.
[10] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for
there is no major loss or system damage, whereas the replay cyber-physical systems under adversarial attacks,” IEEE Transactions on
attack can cause considerable damages or losses to the system. Automatic control, vol. 59, no. 6, pp. 1454–1467, 2014.
Thus, knowing the faults or attacks of the system prior to any [11] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A se-
cure control framework for resource-limited adversaries,” Automatica,
casualty and taking the necessary measurements to deal with vol. 51, pp. 135–148, 2015.
it, is always the priority in critical infrastructure. [12] N. Bezzo, J. Weimer, M. Pajic, O. Sokolsky, G. J. Pappas, and I. Lee,
“Attack resilient state estimation for autonomous robotic systems,” in
VI. C ONCLUSION 2014 IEEE/RSJ International Conference on Intelligent Robots and
Systems. IEEE, 2014, pp. 3692–3698.
The paper proposed a BIS strategy for differentiating fault [13] S. Ihara and F. C. Schweppe, “Physically based modeling of cold load
and cyber attacks in a BMS. The proposed strategy first pickup,” IEEE Transactions on Power Apparatus and Systems, no. 9,
classifies the different operating mode of the system whether pp. 4142–4150, 1981.

Authorized licensed use limited to: University of Exeter. Downloaded on June 14,2020 at 13:37:56 UTC from IEEE Xplore. Restrictions apply.

You might also like