2021
DOI: 10.1016/j.cherd.2021.03.024
|View full text |Cite
|
Sign up to set email alerts
|

Integrated cyberattack detection and handling for nonlinear systems with evolving process dynamics under Lyapunov-based economic model predictive control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…If the detection scheme would then be set up to compare expectations under the old and new process models, the change in process dynamics may be erroneously flagged as a cyberattack. In Rangan et al (2021), for example, we provide a two-fold control/ detection mechanism to prevent false attack detection when the variations in the process dynamics are considered. • Though methods for making cyberattacks discoverable might benefit from the knowledge of the distribution of the noise and disturbances (to better distinguish Eqs 76, 77), the various detection strategies developed in this work make no consideration for statistics; they look only at the bounds on disturbances and sensor measurements.…”
Section: Cyberattack Discoverability For Nonlinear Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…If the detection scheme would then be set up to compare expectations under the old and new process models, the change in process dynamics may be erroneously flagged as a cyberattack. In Rangan et al (2021), for example, we provide a two-fold control/ detection mechanism to prevent false attack detection when the variations in the process dynamics are considered. • Though methods for making cyberattacks discoverable might benefit from the knowledge of the distribution of the noise and disturbances (to better distinguish Eqs 76, 77), the various detection strategies developed in this work make no consideration for statistics; they look only at the bounds on disturbances and sensor measurements.…”
Section: Cyberattack Discoverability For Nonlinear Systemsmentioning
confidence: 99%
“…Prior work in our group has explored the interaction between cyberattack detection strategies, MPC/EMPC design, and stability guarantees. In particular, our prior works have primarily focused on studying and developing control/detection mechanisms for scenarios in which either actuators or sensors are attacked (Oyama and Durand, 2020;Rangan et al, 2021;Oyama et al, 2021;Durand and Wegener, 2020). For example, Oyama and Durand (2020) proposed three cyberattack detection concepts that are integrated with the control framework Lyapunov-based EMPC (Heidarinejad et al, 2012a).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the interconnected nature of a cyber-physical system like a PCS, a comprehensive solution to enhancing the cybersecurity of PCSs may involve adopting a multi-faceted approach that involves both information technology-based and operational technologybased approaches. The approaches proposed in the literature broadly include those that reinforce information technology-based infrastructure (e.g., firewalls [3] and network design-based approaches [4,5]), approaches that involve cybersecure architecture design (e.g., [6]), approaches for process equipment design to mitigate adverse impacts of a cyberattack (e.g., [7,8]), and the design of operational technology (OT)-based approaches for detecting, identifying, and successfully recovering from an ongoing cyberattack [6,[9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning-based approaches have also been used as methods for cyberattack detection [6,17]. Other examples include residual-based detection strategies that are designed to detect an attack if the attack causes the process states to leave a safe operating region [10][11][12]. Attack detection approaches that utilize random authentication signals to the manipulated input to add a perturbation to the process and reveal the presence of an attack [21][22][23][24][25] have also been proposed.…”
Section: Introductionmentioning
confidence: 99%