Received: 2025-06-18  |  Accepted: 2025-08-29  |  Published: 2025-09-30

Title

Revealing resilience: AI anomaly detection driven design considerations for Cyber Physical Systems supporting critical infrastructures in Small Island Developing States


Abstract

Ensuring the resilience of Cyber Physical Systems (CPSs) has emerged as a critical priority, particularly for small island developing states (SIDS) and low-resource regions such as the Caribbean. These systems, which tightly couple sensing, computation, and control, are increasingly vulnerable to operational disruptions such as cyber-attacks and sensor faults. In this context, resilience must go beyond disturbance tolerance to encompass real-time anomaly detection (AD), system adaptation, and recovery, ensuring sustained operational safety, reliability, and continuity. This paper uses a machine learning based AD case study to examine the resilience of a Vehicular Cyber-Physical System (VCPS) configured for platooning. Rather than proposing a novel detection method, the study leverages an established framework to extract deeper insights into the resilience needs of VCPSs operating under constrained conditions. For regions with limited redundancy and prolonged recovery times, such as SIDS, the findings emphasise the importance of integrated detection mechanisms that identify threats and support timely and adaptive system responses. This work positions anomaly detection as a diagnostic lens for resilience, contributing to sustainable, secure, and trustworthy transportation infrastructure aligned with broader development goals for CPSs.


Keywords

resilience, anomaly detection, cyber physical systems, cyber attacks, Small Island Developing States


JEL classifications

C88 , C89


URI

http://jssidoi.org/ird/article/212


DOI


Pages

148-169


Funding


This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Mohammed, Amir
University of the West Indies, St. Augustine, Trinidad and Tobago https://sta.uwi.edu
Articles by this author in: CrossRef |  Google Scholar

Goitia, Daniel
University of the West Indies, St. Augustine, Trinidad and Tobago https://sta.uwi.edu
Articles by this author in: CrossRef |  Google Scholar

Ahmad, Sheikh Ahad
University of Western Ontario, London, Canada https://www.uwo.ca
Articles by this author in: CrossRef |  Google Scholar

Ramlal, Craig
University of the West Indies, St. Augustine, Trinidad and Tobago https://sta.uwi.edu
Articles by this author in: CrossRef |  Google Scholar

Journal title

Insights into Regional Development

Volume

7


Number

3


Issue date

September 2025


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 557  |  PDF downloads: 311

References


Abu Al-Haija, Q., & Zein-Sabatto, S. (2020). An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics, 9(12), 2152. https://doi.org/10.3390/electronics9122152

Search via ReFindit


Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms. Complexity, 2021(1), 5579851. https://doi.org/10.1155/2021/5579851

Search via ReFindit


Almasoud, A.S., Eisa, T.A.E., Al-Wesabi, F.N., Elsafi, A., Duhayyim, M.A., Yaseen, I., Hamza, M.A., Motwakel, A. (2022). Parkinson's Detection Using RNN-Graph-LSTM with OptimizationOptimization Based on Speech Signals. Computers, Materials and Continua, 72(1), 871-886. https://doi.org/10.32604/cmc.2022.024596

Search via ReFindit


Alsaade, F. W., & Al-Adhaileh, M. H. (2023). Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. Sensors, 23(8), 4086. https://doi.org/10.3390/s23084086

Search via ReFindit


Alsulami, A. A., Abu Al-Haija, Q., Alqahtani, A., & Alsini, R. (2022). Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model. Symmetry, 14(7), 1450. https://doi.org/10.3390/sym14071450

Search via ReFindit


Biddle, L., & Fallah, S. (2021). A Novel Fault Detection, Identification and Prediction Approach for Autonomous Vehicle Controllers Using SVM. Automotive Innovation, 4(3), 301-314. https://doi.org/10.1007/s42154-021-00138-0

Search via ReFindit


Bogdoll, D., Hamdard, I., Rößler, L. N., Geisler, F., Bayram, M., Wang, F., … Zöllner, J. M. (2024, September 26). AnoVox: A Benchmark for Multimodal Anomaly Detection in Autonomous Driving. arXiv. https://doi.org/10.48550/arXiv.2405.07865

Search via ReFindit


Bonzanini, A. D., Mesbah, A., & Di Cairano, S. (2024). Perception-aware model predictive control for constrained control in unknown environments. Automatica, 160, 111418. https://doi.org/10.1016/j.automatica.2023.111418

Search via ReFindit


Brain, S., & Oyadeyi, O. (2023). Funding Crime Online: Cybercrime and its Links to OrganizedOrganized Crime in the Caribbean. The Commonwealth Cybercrime Journal, 1(3), 84-110.

Search via ReFindit


CAR 2 CAR Communication Consortium. (2021). White Paper on Misbehaviour Detection and Reporting to Misbehaviour Authority. CAR 2 CAR Communication Consortium.

Search via ReFindit


Check Point Team. (2024, July 16). Check Point Research Reports Highest Increase of Global Cyber Attacks seen in last two years – a 30% Increase in Q2 2024 Global Cyber Attacks. Retrieved August 25, 2025, from Check Point Blog website: https://blog.checkpoint.com/research/check-point-research-reports-highest-increase-of-global-cyber-attacks-seen-in-last-two-years-a-30-increase-in-q2-2024-global-cyber-attacks/

Search via ReFindit


Chen, C.-Y., Shin, K. G., & Dadras, S. (2024). Context-Aware Anomaly Detection Using Vehicle Dynamics. Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses, 531-545. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3678890.3678895

Search via ReFindit


Cobos, E., & Diao, H. (2024, November 28). From fiction to reality: How Latin America became the world’s most critical cyber battleground. Retrieved August 24, 2025, from World Bank Blogs website: https://blogs.worldbank.org/en/latinamerica/seguridad-cibernetica-en-america-latina-y-el-caribe

Search via ReFindit


CrowdStrike. (2025). 2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises. CrowdStrike. Retrieved from https://ir.crowdstrike.com/node/14226/pdf

Search via ReFindit


CSIS. (2025, May). Significant Cyber Incidents. Retrieved August 24, 2025, from https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

Search via ReFindit


Fails, J. A., & Olsen, D. R. (2003). Interactive machine learning. Proceedings of the 8th International Conference on Intelligent User Interfaces, 39-45. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/604045.604056

Search via ReFindit


FortiGuard Labs. (2025). 2025 Global Threat Landscape Report. Retrieved from https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-landscape-report-2025.pdf

Search via ReFindit


Griffor, E. R., Greer, C., Wollman, D. A., & Burns, M. J. (2017). Framework for cyber-physical systems: Volume 2, working group reports (No. NIST SP 1500-202; p. NIST SP 1500-202). Gaithersburg, MD: National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.1500-202

Search via ReFindit


Guo, H., Sun, J., & Pang, Z.-H. (2023). Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems. IEEE/CAA Journal of Automatica Sinica, 10(5), 1181-1191. https://doi.org/10.1109/JAS.2023.123441

Search via ReFindit


Hamza, M., Ben, S., Larabi-Marie-Sainte, S., Nour, M., Al-Wesabi, F., Motwakel, A., … Duhayyim, M. (2022). Optimal Bidirectional LSTM for Modulation Signal Classification in Communication Systems. Computers, Materials & Continua, 72(2), 3055-3071. https://doi.org/10.32604/cmc.2022.024490

Search via ReFindit


Hao, W., Yang, T., & Yang, Q. (2023). Hybrid Statistical-Machine Learning for Real-Time Anomaly Detection in Industrial Cyber–Physical Systems. IEEE Transactions on Automation Science and Engineering, 20(1), 32-46. https://doi.org/10.1109/TASE.2021.3073396

Search via ReFindit


Haq, I. U., Khan, T. A., & Akhunzada, A. (2021). A Dynamic Robust DL-Based Model for Android Malware Detection. IEEE Access, 9, 74510-74521. https://doi.org/10.1109/ACCESS.2021.3079370

Search via ReFindit


Hermann, A., Trkulja, N., Lucena, A. R. F. D., Kiening, A., Petrovska, A., & Kargl, F. (2024). WIP: A Trust Assessment Method for In-Vehicular Networks using Vehicle Risk Assessment. Proceedings Symposium on Vehicle Security & Privacy. Presented at the Symposium on Vehicle Security & Privacy, San Diego, CA, USA. San Diego, CA, USA: Internet Society. https://doi.org/10.14722/vehiclesec.2024.23016

Search via ReFindit


Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal, 4(6), 1802-1831. https://doi.org/10.1109/JIOT.2017.2703172

Search via ReFindit


Internet Crime Complaint Center. (2025). Federal Bureau of Investigation’s Internet Crime Report. Federal Bureau of Investigation. Retrieved from Federal Bureau of Investigation website: https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf

Search via ReFindit


Kalogiannis, K., Khodaei, M., Bayaa, W. M. N. M., & Papadimitratos, P. (2022). Attack Impact and Misbehavior Detection in Vehicular Platoons. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 45-59. New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3507657.3528552

Search via ReFindit


Kaspersky Lab. (2025). Threat landscape for industrial automation systems. Q1 2025. Kaspersky Lab. Retrieved from https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-Threat-landscape-for-industrial-automation-systems-Q1-2025-En.pdf

Search via ReFindit


Khalil, S. M., Bahsi, H., Dola, H. O., Korõtko, T., McLaughlin, K., & Kotkas, V. (2023). Threat Modeling of Cyber-Physical Systems—A Case Study of a Microgrid System. Computers & Security, 124, 102950. https://doi.org/10.1016/j.cose.2022.102950

Search via ReFindit


Khan, S., Sivaraman, E., & Honnavalli, P. B. (2020). Performance Evaluation of Advanced Machine Learning Algorithms for Network Intrusion Detection System. In M. Dutta, C. R. Krishna, R. Kumar, & M. Kalra (Eds.), Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India (pp. 51-59). Singapore: Springer. https://doi.org/10.1007/978-981-15-3020-3_6

Search via ReFindit


Khraisat, A., Alazab, A., Singh, S., Jan, T., & Jr. Gomez, A. (2024). Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions. ACM Comput. Surv., 57(1), 7:1-7:38. https://doi.org/10.1145/3687124

Search via ReFindit


KnowBe4. (2024). Cyber Attacks on Infrastructure: The New Geopolitical Weapon. KnowBe4,. Retrieved from https://www.knowbe4.com/hubfs/Global-Infrastructure-Report-2024_EN_US.pdf

Search via ReFindit


Li, J., Yang, Y., Zhang, R., & Lee, Y. (2024, April 17). Overconfident and Unconfident AI Hinder Human-AI Collaboration. arXiv. https://doi.org/10.48550/arXiv.2402.07632

Search via ReFindit


Liu, Y., & Wang, W. (2021). A Safety Reinforced Cooperative Adaptive Cruise Control Strategy Accounting for Dynamic Vehicle-to-Vehicle Communication Failure. Sensors, 21(18), 6158. https://doi.org/10.3390/s21186158

Search via ReFindit


Malik, M. I., Ibrahim, A., Hannay, P., & Sikos, L. F. (2023). Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions. Computers, 12(4), 79. https://doi.org/10.3390/computers12040079

Search via ReFindit


Mohammed, A., Marine, L., Ramlal, C., & Muddeen, F. (2025). A Vehicular Cyber-Physical Framework for Studying the Effects of Multiple Disturbances with Application to Connected Autonomous Vehicles. Transport and Telecommunication Journal, 26(3), 250-265. https://doi.org/10.2478/ttj-2025-0019

Search via ReFindit


Mohammed, A., Ramlal, C., Marine, L., & Muddeen, F. (2024). Resilient Event Triggered Interval Type-2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks. Journal of Advanced Transportation, 2024(1), 2790548. https://doi.org/10.1155/2024/2790548

Search via ReFindit


Nelson, A., Rekhi, S., Souppaya, M., & Scarfone, K. (2025). Incident response recommendations and considerations for cybersecurity risk management: A CSF 2.0 community profile (No. NIST SP 800-61r3; p. NIST SP 800-61r3). Gaithersburg, MD: National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.SP.800-61r3

Search via ReFindit


Oucheikh, R., Fri, M., Fedouaki, F., & Hain, M. (2020). Deep Real-Time Anomaly Detection for Connected Autonomous Vehicles. Procedia Computer Science, 177, 456-461. https://doi.org/10.1016/j.procs.2020.10.062

Search via ReFindit


Palleti, V. R., Adepu, S., Mishra, V. K., & Mathur, A. (2021). Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity, 4(1), 8. https://doi.org/10.1186/s42400-021-00071-z

Search via ReFindit


Park, G. (2024). Optimal vehicle position estimation using adaptive unscented Kalman filter based on sensor fusion. Mechatronics, 99, 103144. https://doi.org/10.1016/j.mechatronics.2024.103144

Search via ReFindit


Positive Technologies. (2023, December 21). Cybersecurity threatscape for Latin America and the Caribbean: 2022–2023. Retrieved August 25, 2025, from Positive Technologies website: https://global.ptsecurity.com/en/research/analytics/latam-cybersecurity-threatscape-2022-2023/#Navigation-6

Search via ReFindit


Puig, V., Escobet, T., Sarrate, R., & Quevedo, J. (2016). Fault Detection and Isolation in Critical Infrastructure Systems. In C. G. Panayiotou, G. Ellinas, E. Kyriakides, & M. M. Polycarpou (Eds.), Critical Information Infrastructures Security (pp. 3-12). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-31664-2_1

Search via ReFindit


Rajapaksha, S., Kalutarage, H., Al-Kadri, M. O., Petrovski, A., & Madzudzo, G. (2023). Improving In-vehicle Networks Intrusion Detection Using On-Device Transfer Learning. Proceedings Inaugural International Symposium on Vehicle Security & Privacy. Presented at the Inaugural International Symposium on Vehicle Security & Privacy, San Diego, CA, USA. San Diego, CA, USA: Internet Society. https://doi.org/10.14722/vehiclesec.2023.23088

Search via ReFindit


Rendall, K., Mylonas, A., Vidalis, S., & Gritzalis, D. (2025). MIDAS: Multi-layered attack detection architecture with decision optimizationoptimization. Computers & Security, 148, 104154. https://doi.org/10.1016/j.cose.2024.104154

Search via ReFindit


Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., … Sarwat, A. I. (2023). Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors, 23(8), 4060. https://doi.org/10.3390/s23084060

Search via ReFindit


Roh, H., Oh, S., Song, H., Han, J., & Lim, S. (2022). Deep Learning-based Wireless Signal Classification in the IoT Environment. Computers, Materials & Continua, 71(3), 5717–5732. https://doi.org/10.32604/cmc.2022.024135

Search via ReFindit


Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., & McQuaid, R. (2021). Developing cyber-resilient systems: A systems security engineering approach (No. NIST SP 800-160v2r1; p. NIST SP 800-160v2r1). Gaithersburg, MD: National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.SP.800-160v2r1

Search via ReFindit


Roy, T., & Dey, S. (2023, November 15). On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks. arXiv. https://doi.org/10.48550/arXiv.2311.09342

Search via ReFindit


Sajjadi, P., Dinmohammadi, F., & Shafiee, M. (2025). Fault Detection of Cyber-Physical Systems Using a Transfer Learning Method Based on Pre-Trained Transformers. Sensors (Basel, Switzerland), 25(13), 4164. https://doi.org/10.3390/s25134164

Search via ReFindit


Sarwar, A., Hasan, S., Khan, W. U., Ahmed, S., & Marwat, S. N. K. (2022). Design of an Advance Intrusion Detection System for IoT Networks. 2022 2nd International Conference on Artificial Intelligence (ICAI), 46-51. https://doi.org/10.1109/ICAI55435.2022.9773747

Search via ReFindit


Schaberreiter, T., Andriessen, J., Cappiello, C., Papanikolaou, A., & Pardijs, M. (2024). Human-in-the-loop Anomaly Detection and Contextual Intelligence for Enhancing Cybersecurity Management. In R. Mitkov, S. Ezzini, T. Ranasinghe, I. Ezeani, N. Khallaf, C. Acarturk, … P. Rayson (Eds.), Proceedings of the First International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security (pp. 127-136). Lancaster, UK: International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security. Retrieved from https://aclanthology.org/2024.nlpaics-1.15/

Search via ReFindit


Song, Y., Hyun, S., & Cheong, Y.-G. (2021). Analysis of Autoencoders for Network Intrusion Detection. Sensors, 21(13), 4294. https://doi.org/10.3390/s21134294

Search via ReFindit


UNDP. (2022). United Nations Development Programme Digital Strategy 2022-2025. Retrieved from https://digitalstrategy.undp.org/documents/Digital-Strategy-2022-2025-Full-Document_ENG_Interactive.pdf

Search via ReFindit


Yang, T., Murguia, C., & Lv, C. (2023). Risk Assessment for Connected Vehicles Under Stealthy Attacks on Vehicle-to-Vehicle Networks. IEEE Transactions on Intelligent Transportation Systems, 24(12), 13627-13638. https://doi.org/10.1109/TITS.2023.3292188

Search via ReFindit


Zhu, X., Shen, Y., Zhang, Z., & Yan, M. (2023). Stability Analysis of the Vehicular Platoon with Sensing Delay and Communication Delay: CTCR Paradigm via Dixon Resultant. Applied Sciences, 13(21), 11807. https://doi.org/10.3390/app132111807

Search via ReFindit