2015 54th IEEE Conference on Decision and Control (CDC) 2015
DOI: 10.1109/cdc.2015.7403134
|View full text |Cite
|
Sign up to set email alerts
|

Detecting integrity attacks on control systems using a moving target approach

Abstract: Maintaining the security of control systems in the presence of integrity attacks is a significant challenge. In literature, several possible attacks against control systems have been formulated including replay, false data injection, and zero dynamics attacks. The detection and prevention of these attacks may require the defender to possess a particular subset of trusted communication channels. Alternatively, these attacks can be prevented by keeping the system model secret from the adversary. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
52
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 107 publications
(54 citation statements)
references
References 17 publications
0
52
0
Order By: Relevance
“…Theorem 19: Consider the estimator of x k defined by (20), (21), (23), (24). Then lim sup k→∞ ∆e * k = ∞ =⇒ lim sup k→∞ ∆z i k = ∞ for some i ∈ {1, · · · , m}.…”
Section: Robust Estimation and Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 19: Consider the estimator of x k defined by (20), (21), (23), (24). Then lim sup k→∞ ∆e * k = ∞ =⇒ lim sup k→∞ ∆z i k = ∞ for some i ∈ {1, · · · , m}.…”
Section: Robust Estimation and Identificationmentioning
confidence: 99%
“…To meet this objective, we propose changing the dynamics of the system model in a time varying fashion, unknown to the adversary. A similar scheme is considered for the detection of integrity attacks in [23]. The time varying dynamics act like a moving target, preventing an information constrained adversary from developing stealthy unidentifiable attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Secure strategies have been studied for replay attacks [3], [4] where the adversary first records and then replays the observed data, as well as for denial-of-service (DoS) attacks [5], [6] disrupting the flow of data. Moreover, active detection methods have been designed in order to detect stealthy attacks via manipulation of, e.g., control inputs [7] or dynamics [8]. Over the last few years, the problem of secure state estimation, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…Several authors have proposed MTD approaches for state estimation in the smart grid [3]- [5], where the main idea consists on changing the physical topology of the power grid in order to reveal false data injection attacks. Watermarking uses the addition of an external system with linear time-varying dynamics that depend on the system states and that is unknown to the attacker [6]. The detection strategy measures those external states, making it harder for an adversary to design stealthy attacks.…”
Section: Introductionmentioning
confidence: 99%