• Home
  • Venkata Reddy Palleti
Venkata Reddy Palleti

Venkata Reddy Palleti
Indian Institue of Petroleum and Energy · Chemical Engineering

PhD

About

29
Publications
4,774
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
373
Citations

Publications

Publications (29)
Article
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physical processes. In such systems physical processes are monitored and controlled by the combination of computation, communication, and control technologies. Examples of CPSs include process control systems, medical devices, robots, and critical infrastru...
Article
Full-text available
Modern critical infrastructure, such as a water treatment plant, water distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes are monitored and controlled in real time. One source of complexity in such systems is due to the intra-system interactions and inter-dependencies. Consequent...
Article
Full-text available
Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants , i.e. logical properties over sensor and actuator states that should always be true. Many approaches for identifying invariants attempt to do...
Chapter
Cyber-Physical Systems (CPS) are collections of physical and computer components that are integrated with each other to operate a process safely and efficiently. Examples of CPS include industrial control systems, water systems, robotics systems, smart grid, etc. However, the security aspect of CPS is still a concern that makes them vulnerable to c...
Article
Full-text available
Industrial Control Systems (ICS) monitor and control physical processes. ICS are found in, among others, critical infrastructures such as water treatment plants, water distribution systems, and the electric power grid. While the existence of cyber-components in an ICS leads to ease of operations and maintenance, it renders the system under control...
Chapter
A Cyber Physical System (CPS) consists of cyber components for computation and communication, and physical components such as sensors and actuators for process control. These components are networked and interact in a feedback loop. CPS are found in critical infrastructure such as water distribution, power grid, and mass transportation. Often these...
Preprint
The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal operation. Given the complexity of CPSs, several existing approaches focus on deriving invariants a...
Article
The manageability and resilience of critical infrastructures, such as power and water networks, is challenged by their increasing interdependence and interconnectivity. Power networks often experience cascading failures, i.e. blackouts, that have unprecedented economic and social impact. Al- though knowledge exists about how to control such complex...
Preprint
Full-text available
A Cyber Physical System (CPS) consists of cyber components for computation and communication, and physical components such as sensors and actuators for process control. These components are networked and interact in a feedback loop. CPS are found in critical infrastructure such as water distribution, power grid, and mass transportation. Often these...
Article
Critical infrastructure (CI), such as systems for water treatment, water distribution, power generation and distribution, is vital for the well being of a society. Such systems are typically large, complex, and interconnected. A cyber-attack on one such system could affect the other. In this work, a generic agent-based framework is proposed to aid...
Article
Water Distribution Networks (WDNs) are often susceptible to either accidental or deliberate contamination which can lead to poisoned water, many fatalities and large economic consequences. In order to protect against these intrusions or attacks, an efficient sensor network with a limited number of sensors should be placed in a WDN. In this paper, w...
Article
Critical infrastructures (CIs) such as water, power, and transportation etc. are pivotal as they play a significant role in a nation's economic prosperity and governance. These critical infrastructures are complex in nature and therefore they may be vulnerable to attacks. In order to have effective critical infrastructure protection, it is necessar...
Article
This paper seeks to understand and identify ways in which fault detection and isolation (FDI) methods can be utilized to enhance the cyber-security of cyber-physical systems (CPS). In this work, we have used state estimation to validate relations between process variables, termed invariants, thereby detect the onset of attacks. Multiple attack scen...
Article
Water Distribution Networks (WDNs) are vulnerable to accidental or deliberate contamination. Such contamination can be detected and identified by deploying a network of sensors. If the sensor network detects the presence of a contaminant, it is also very important to take corrective response actions to minimize the effects of contamination on the p...
Conference Paper
The architecture of a water distribution testbed (WADI), and on-going research in the design of secure water distribution system is presented. WADI consists of three stages controlled by Programmable Logic Controllers (PLCs) and two stages controlled via Remote Terminal Units (RTUs). Each PLC and RTU uses sensors to estimate the system state and th...
Article
Water Distribution Networks (WDNs) are an integral part of society. Deliberate introduction of chemical or biological agents through accessible sites of a WDN can spread through the entire system and cause widespread damage to public health. In order to protect against such deliberate attacks on a WDN, an effective and efficient online monitoring s...
Article
Water Distribution Networks (WDN) are vulnerable to either intentional or accidental contamination. In order to protect against such intrusions, effective and efficient online monitoring systems are needed. Due to cost and maintenance reasons, it is not possible to locate sensors at each and every potential intrusion point. In this work, we design...
Article
Water Distribution Networks (WDN) is often exposed to either intentional or accidental contamination. In order to protect against such intrusions, an effective and efficient online monitoring system through sensors is needed. Detection of contaminants in WDN is challenging and it is not possible to place sensors at each and every potential point of...

Network

Cited By