2019
DOI: 10.1109/tac.2019.2903429
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
28
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 86 publications
(29 citation statements)
references
References 29 publications
1
28
0
Order By: Relevance
“…Researchers are studying different aspects of securing the CPS against attacks on the physical layer. The primary research problems are the study of different attack strategies [8], [9], attack resilient state estimation [10]- [12], attack detection strategies [1], [3], [13]- [19], etc. In one approach of attack detection schemes, physical watermarking signals are added to the control inputs and the authenticity of the received observations is checked by various statistical tests.…”
Section: A Related Workmentioning
confidence: 99%
“…Researchers are studying different aspects of securing the CPS against attacks on the physical layer. The primary research problems are the study of different attack strategies [8], [9], attack resilient state estimation [10]- [12], attack detection strategies [1], [3], [13]- [19], etc. In one approach of attack detection schemes, physical watermarking signals are added to the control inputs and the authenticity of the received observations is checked by various statistical tests.…”
Section: A Related Workmentioning
confidence: 99%
“…The ZDA and PDA are typical system-theoretic stealthy cyber-physical attacks that corrupt control-related information in communication channels [11], [12]. These uni-directional attacks are relatively simple to implement in comparison to other attacks that invade both channels of the feedback control loop while maintaining their stealthiness.…”
Section: B Stealthy Attacks On Cpsmentioning
confidence: 99%
“…Although the state of the physical system x(k) diverges to infinity by ( 9), the residualr(k) does not exceed the threshold δ. In consequence, the attack alarm Γ(k) is not raised, which indicates that the PDA guarantees stealthiness from (11).…”
Section: Stealthiness Of the Pole-dynamics Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Assume that the attacker who has taken control of the network line knows the model information of the system and can add the attack signal a k to the controller output, as shown in Figure 4. Then, using the system model, the attacker can generate a sophisticated attack signal that enables the discrete-time output signal to pretend that the system is operating normally but make the internal state actually unbounded [51,52]. The mathematical explanation for the zero-dynamics attack is as follows: From (8), the dynamics of the wind turbine under ZDA becomes…”
Section: Zero-dynamics Attack On Wind Turbinementioning
confidence: 99%