52nd IEEE Conference on Decision and Control 2013
DOI: 10.1109/cdc.2013.6760152
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic game approach for replay attack detection

Abstract: Abstract-The existing tradeoff between control system performance and the detection rate for replay attacks highlights the need to provide an optimal control policy that balances the security overhead with control cost. We employ a finite horizon, zero-sum, nonstationary stochastic game approach to minimize the worst-case control and detection cost, and obtain an optimal control policy for switching between controlcost optimal (but nonsecure) and secure (but cost-suboptimal) controllers in presence of replay a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 109 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Hence, resilience is based on a general acceptance that it is virtually impossible to prevent or remediate all categories of risk simultaneously, and before they occur [173]. [65], [34], [66], [67], [68], [69], [70],…”
Section: Risk Management Vs Cyber-resiliencementioning
confidence: 99%
See 1 more Smart Citation
“…Hence, resilience is based on a general acceptance that it is virtually impossible to prevent or remediate all categories of risk simultaneously, and before they occur [173]. [65], [34], [66], [67], [68], [69], [70],…”
Section: Risk Management Vs Cyber-resiliencementioning
confidence: 99%
“…For example, Mo et al [33] propose the use of Kalman filters to detect cyber-physical replay attacks by adapting traditional failure detection mechanisms via watermarking. Miao et al [65] improve the performance of the aforementioned detection mechanism using a stochastic game approach. The work has also been improved by Rubio-Hernan et al [34] to incorporate more advanced adversaries capable of learning the physical model.…”
Section: Model-based Approachmentioning
confidence: 99%
“…Two special cases of the MITM attack have been studied extensively. The first case is the replay attack, in which the adversary observes and records the true system behavior for a given time period and then replays this recording periodically at the agent's input Zhu and Martínez, 2014;Miao et al, 2013). The second case is the statistical-duplicate attack, here the adversary is assumed to have perfect knowledge of the system dynamics therefore allowing the adversary to construct arbitrarily long trajectories that are statistically identical to the true system (Smith, 2011;Satchidanandan and Kumar, 2017;Hespanhol et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Some studies have been done about obtaining suitable conditions and countermeasure of replay attacks by Mo and Sinopoli (2009) and Mo et al (2014) for linear Gaussian systems. To analyse the interchange between control efficiency and system security, some studies were done under a random game frame (Miao et al, 2013). In the case of electric power grids, work was done to inject false data into the system versus state estimation at the remote estimation centre by Liu et al (2009).…”
Section: Introductionmentioning
confidence: 99%