2018
DOI: 10.1016/j.automatica.2018.07.017
|View full text |Cite
|
Sign up to set email alerts
|

Detection and mitigation of classes of attacks in supervisory control systems

Abstract: The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 147 publications
(85 citation statements)
references
References 26 publications
0
77
1
Order By: Relevance
“…Intuitively, the attacker determines at state y the set of enabled compromised controllable events to be η(y). For each σ ∈ Σ a , we write σ = (σ [1], σ [2]).…”
Section: System Setup and Problem Formulation A System Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…Intuitively, the attacker determines at state y the set of enabled compromised controllable events to be η(y). For each σ ∈ Σ a , we write σ = (σ [1], σ [2]).…”
Section: System Setup and Problem Formulation A System Setupmentioning
confidence: 99%
“…We write δ (q,σ )! to mean δ (q,σ ) is defined 2. For example, if σ ∈ Σ 1 \Σ 2 and δ 1 (q 1 ,σ ) is undefined, we treat δ (q,σ ) as undefined.…”
mentioning
confidence: 99%
“…We study the problem of synthesis of a supervisor that guarantees a safe controlled behavior even in the presence of an attacker with the previously described deceptive capabilities. In other words, the goal is to synthesize a supervisor that In this work, we use an approach similar to that in [2], [7]. The conceptual diagram of sensor deception attacks, as shown in Figure 2, is transformed into an attacked controlled system, which is constructed based on the original controlled system and attacker assumptions.…”
Section: Preliminariesmentioning
confidence: 99%
“…Inspired by the technique used in [2], the model G a defined in Section III becomes the system at the center of our study. Since the attacked plant G a captures the behavior of plant G under a sensor deception attack over Σ a , our solution technique poses a supervisory control problem directly at the attacked plant G a .…”
Section: Supervisor Robust Against Sensor Deception Attacksmentioning
confidence: 99%
See 1 more Smart Citation