2022
DOI: 10.1109/access.2022.3164424
|View full text |Cite
|
Sign up to set email alerts
|

On the Stability of Cyber-Physical Control Systems With Sensor Multiplicative Attacks

Abstract: To understand the impact of cyber-attacks to sensors in control systems, we present a stability analysis of a wide range of systems in this paper. Based on Lyapunov stability analysis, we formulate an optimization problem with constraints in the form of a set of linear matrix inequalities to find conservative bounds of stability related to the attacks, which can be analyzed simultaneously or one at the time. When considering the attacks one at the time, with the proposed formulation, we can find the most vulne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…From ( 12), H 1 can be calculated. With H 1 , T 1 can be obtained from (14). In order to find F 1 using ( 13), observability must first be verified, or, at least, the detectability of the pair (A 1 1 , C 1 ).…”
Section: Uios Bank Designmentioning
confidence: 99%
See 1 more Smart Citation
“…From ( 12), H 1 can be calculated. With H 1 , T 1 can be obtained from (14). In order to find F 1 using ( 13), observability must first be verified, or, at least, the detectability of the pair (A 1 1 , C 1 ).…”
Section: Uios Bank Designmentioning
confidence: 99%
“…However, these works assume that there are low-level control loops that cannot be accessed by attackers, but, in cyber-security, it is well known that this feature is usually related to the available budget of the attacker (13). Besides, an attack on one sensor of a low-level controller is enough to cause changes in the stability of the overall system, which can have catastrophic consequences, as demonstrated in (14).…”
Section: Introductionmentioning
confidence: 99%
“…Due to the interconnected nature of a cyber-physical system like a PCS, a comprehensive solution to enhancing the cybersecurity of PCSs may involve adopting a multi-faceted approach that involves both information technology-based and operational technologybased approaches. The approaches proposed in the literature broadly include those that reinforce information technology-based infrastructure (e.g., firewalls [3] and network design-based approaches [4,5]), approaches that involve cybersecure architecture design (e.g., [6]), approaches for process equipment design to mitigate adverse impacts of a cyberattack (e.g., [7,8]), and the design of operational technology (OT)-based approaches for detecting, identifying, and successfully recovering from an ongoing cyberattack [6,[9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%