Advanced Cybersecurity Strategies for Cyber-Physical Systems: Case Studies in EV Charging Stations, Connected & Automated Vehicles, and Digital Substations
dc.contributor.author | Girdhar, Mansi | |
dc.contributor.advisor | Hong, Junho | |
dc.date.accessioned | 2025-01-27T15:55:49Z | |
dc.date.issued | 2025-04-26 | |
dc.date.submitted | 2025-01-07 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/196335 | |
dc.description.abstract | The rapid advancement of electric mobility, smart transportation, and digital infrastructures highlights the pressing need for robust cybersecurity mechanisms to protect cyber-physical systems (CPSs) from emerging threats. This dissertation presents a comprehensive study on enhancing cybersecurity measures across three critical applications: electric vehicle (EV) charging stations, connected and automated vehicles (CAVs), and digital substations. For CAVs, we address the complexity of post-accident cyber-attack event analysis, which is crucial for smart mobility in urban environments. A novel investigation framework using the 5Ws and 1H approach is introduced to handle CAV-related cyber-attack accidents. This study also proposes a stochastic anomaly detection system to recognize abnormal activities within the automated driving system (ADS) functions, ensuring real-time decision-making accuracy amidst cyber threats. In the context of EV charging stations (EVCSs), we employ STRIDE-based threat modeling and develop a Hidden Markov Model (HMM) to identify and mitigate potential cyber threats. A weighted attack-defense tree is utilized to generate various attack scenarios, allowing the analysis of security impacts and suggesting appropriate defense strategies. The proposed model significantly improves the overall charging efficiency and cyber-physical security of the charging network. Finally, we focus on cybersecurity enhancement in digital substations, presenting a sophisticated framework to safeguard IEC 61850-based substations. Integrating software-defined networking (SDN) and digital twin (DT) technologies, our approach features smart cyber switching (SCS) and adaptive port controller (APC) to dynamically manage threats. An advanced intrusion detection system (IDS) is also proposed to protect against attacks on substation communication networks. Rigorous simulations and hardware-in-the-loop (HIL) testbeds validate the framework’s effectiveness in sustaining operations during cyber-attacks. Overall, this dissertation provides a multi-faceted exploration of cybersecurity strategies tailored to distinct CPSs, contributing significantly to the field of smart infrastructure protection and resilience. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | IDS | en_US |
dc.subject | Cyber-attacks | en_US |
dc.subject | AVs | en_US |
dc.subject | Crashes | en_US |
dc.subject | Post-Accident Investigation | en_US |
dc.subject | EVCS | en_US |
dc.subject | HMM | en_US |
dc.subject | Digital Substation | en_US |
dc.subject | IEC 61850 | en_US |
dc.subject | Digital Twin | en_US |
dc.subject | SDN | en_US |
dc.subject | HIL Testbed | en_US |
dc.subject.other | Engineering | en_US |
dc.subject.other | Electrical and Computer Engineering | en_US |
dc.title | Advanced Cybersecurity Strategies for Cyber-Physical Systems: Case Studies in EV Charging Stations, Connected & Automated Vehicles, and Digital Substations | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Su, Wencong | |
dc.contributor.committeemember | Kim, Youngki | |
dc.contributor.committeemember | Lee, Hyojong | |
dc.identifier.uniqname | gmansi | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/196335/1/Girdhar_Dissertation_Advanced_Cybersecurity_Strategies.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/25171 | |
dc.description.mapping | 4747e415-ebc0-42de-9b6b-96a7df57693f | en_US |
dc.identifier.orcid | 0000-0002-3672-8955 | en_US |
dc.description.filedescription | Description of Girdhar_Dissertation_Advanced_Cybersecurity_Strategies.pdf : Dissertation | |
dc.identifier.name-orcid | Girdhar, Mansi; 0000-0002-3672-8955 | en_US |
dc.working.doi | 10.7302/25171 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.