ACS6106 Cybersecurity for Control Systems

Module Description (subject to confirmation)

The increase of sensing, computing, and communication technologies on control systems is enabling a host of new applications and services but it also opens the door to cybersecurity threats. Realizing the promise of secure control systems requires the development of analysis tools and design guidelines that integrate security guarantees in the performance characterization of the control system. This module aims to lay the theoretical foundations for secure control system design problems while explicitly teaching students how to account for the operational and practical constraints posed by real control systems.

Credits: 15 (Spring Semester)

Module Leader

IE
Dr Inaki Esnaola
Email: esnaola@sheffield.ac.uk
Amy Johnson Building

If you have any questions about the module please talk to me during the lectures or the labs in the first instance. It is likely that other students will learn from any questions you ask as well, so don’t be afraid to ask questions.

Outside of lectures please contact me via email, or drop in to see me.

Learning Outcomes

Learning Outcomes

By the end of the module students will:

  1. Explain the importance of and need for secure estimation and control systems in a wide range of industrial and research applications, such as cyberphysical systems, autonomous vehicles, and the internet of things [EA5m, ET5i, ET5p]
  2. Describe and explain the main components, architectures and design issues in attack and defence strategies of estimation and control systems and future technological challenges and opportunities [SM2fl, EA1fl, D2i]
  3. Select and use appropriate architectures, algorithmic, computational and experimental tools (including those from the research literature) to provide innovative solutions to complex, unfamiliar, open-ended secure estimation and control systems subject to a variety of technological constraints [SM5m, D4i, EP5i]
  4. Demonstrate creative and critical thinking in providing and evaluating solutions to complex secure estimation and control systems and effectively communicate and analyse such solutions [EA6m, D4m, D7m]
  5. Effectively present appropriate design methodology, analysis and critical evaluation of cybersecurity solutions and any limitations and constraints of such solutions in the form of a technical report to a standard that a suitably qualified person could follow and use to obtain similar findings [D6i]

This module satisfies the AHEP3 (Accreditation of Higher Education Programmes, Third Edition) Learning Outcomes that are listed in brackets after each learning outcome above. For further details on AHEP3 Learning Outcomes, see the downloads section of our accreditation webpage.

Syllabus

Syllabus

  • TBC
Teaching Methods

Learning and Teaching Methods

NOTE: This summary of teaching methods is representative of a normal Semester. Owing to the ongoing disruption from Covid-19, the exact method of delivery will be different in 2020/21.

Lectures - 30 hours

Tutorials - 6 hours

Laboratory Sessions - 4 hours

Independent Work - 106 hours

Teaching Materials

Learning and Teaching Materials

  • TBC
Assessment

Assessment

Formal Examination - 3 hours (100%)

Feedback

Feedback

Feedback is given to students during the module via the following:

  1. TBC
  2. TBC
Student Evaluation

Student Evaluation

Students are encouraged to provide feedback during the module direct to the lecturer. Students will also have the opportunity to provide formal feedback via the Faculty of Engineering Student Evaluation Survey at the end of the module.

You can view the latest Department response to the survey feedback here.

Recommended Reading

Recommended Reading

TBC
TBC