2020
DOI: 10.1016/j.ifacol.2020.12.254
|View full text |Cite
|
Sign up to set email alerts
|

Input Design for Active Dectection of Integrity Attacks using Set-based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Passive methods are based on operating signals, while active methods require the introduction of an appropriate input signal and an analysis of its influence on the output signals of control systems. Active approaches were presented in [63][64][65]. In this paper, only passive approaches will be used.…”
Section: Detection Based On the Analysis Of Process Data And Indicato...mentioning
confidence: 99%
“…Passive methods are based on operating signals, while active methods require the introduction of an appropriate input signal and an analysis of its influence on the output signals of control systems. Active approaches were presented in [63][64][65]. In this paper, only passive approaches will be used.…”
Section: Detection Based On the Analysis Of Process Data And Indicato...mentioning
confidence: 99%
“…In particular, a set of finite N-step sequences to guarantee the attack detection until the Nth sample. As proposed in [45], the open-loop input sequences are designed by solving a mixed-integer quadratic program to guarantee the separability of the reachable zonotopic set of residuals considering the uncertainties bounded by (2). 1 The sequences are specifically devised to detect replay attacks and exploit the temporal mismatch between the record and replay phases in order to ensure that if under attack, the residual signal must satisfy r k +N / ∈ R H .…”
Section: A Attack Detectormentioning
confidence: 99%
“…Additionally, the sequences are designed to be within a preestablished set E. Notice that it is highly unlikely that the attacker's signal is similar to the watermark since the watermarking signal is inherently random, i.e., a random sequence of the set of designed signals is used every time. For more details on the watermarking design methodology, the reader may refer to [45].…”
Section: A Attack Detectormentioning
confidence: 99%