Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems 2013
DOI: 10.1145/2461446.2461460
|View full text |Cite
|
Sign up to set email alerts
|

Minimax control for cyber-physical systems under network packet scheduling attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
36
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(36 citation statements)
references
References 17 publications
0
36
0
Order By: Relevance
“…to controllers and from controllers to actuators, as shown in Fig. 1 and similarly considered in [10]. Each controller (implemented as a control task) collects the sensed information, processes it on a shared computation unit (e.g., a single-core CPU), 1 and sends commands to various actuators.…”
Section: General Codesign Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…to controllers and from controllers to actuators, as shown in Fig. 1 and similarly considered in [10]. Each controller (implemented as a control task) collects the sensed information, processes it on a shared computation unit (e.g., a single-core CPU), 1 and sends commands to various actuators.…”
Section: General Codesign Frameworkmentioning
confidence: 99%
“…In the literature for cyber-physical system security, researchers have proposed various control-oriented approaches for attacks on cyber-physical systems [7]- [10]. Pasqualetti et al [7] designed attack detection and identification monitors from a control-theoretic perspective.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Recent high-profile attacks, e.g., the Maroochy water This work was partially supported by the ONR under grants N00014-14-1-0554 and N00014-10-10952 and by the NSF under grant NSF CNS-1035588. Some material from this paper was presented at the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014) and at the 53rd IEEE Conference on Decision and Control (CDC 2014 breach [29] and the control system malware Stuxnet [12], highlight the need to understand system security [23], [27], [30]. In [27], a packet delay attack is considered, in which, by accessing and then delaying the sensor data, the adversary can harm the physical components of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Some material from this paper was presented at the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014) and at the 53rd IEEE Conference on Decision and Control (CDC 2014 breach [29] and the control system malware Stuxnet [12], highlight the need to understand system security [23], [27], [30]. In [27], a packet delay attack is considered, in which, by accessing and then delaying the sensor data, the adversary can harm the physical components of the system. In [23] and [30], more general issues such as detectability and identifiability for a wide range of attacks are investigated.…”
Section: Introductionmentioning
confidence: 99%