A secure control framework for resource-limited adversaries
Reads0
Chats0
TLDR
In this paper, an attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced, and an attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets.About:
This article is published in Automatica.The article was published on 2015-01-01 and is currently open access. It has received 839 citations till now. The article focuses on the topics: Networked control system.read more
Citations
More filters
Journal ArticleDOI
Networked control systems: a survey of trends and techniques
TL;DR: A survey of trends and techniques in networked control systems from the perspective of ‘ control over networks ’ is presented, providing a snapshot of five control issues: sampled-data control, quantization control, networking control, event-triggered control, and security control.
Journal ArticleDOI
A Systems and Control Perspective of CPS Security
Seyed Mehran Dibaji,Mohammad Pirani,David Bezalel Flamholz,Anuradha M. Annaswamy,Karl Henrik Johansson,Aranya Chakrabortty +5 more
TL;DR: A survey of systems and control methods proposed for the security of Cyber-Physical Systems, a field that has recently garnered increased attention, classifies these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation.
Proceedings ArticleDOI
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
David I. Urbina,Jairo Giraldo,Alvaro A. Cardenas,Nils Ole Tippenhauer,Junia Valente,Mustafa Amir Faisal,Justin Ruths,Richard Candell,Henrik Sandberg +8 more
TL;DR: The impact of stealthy attacks can be mitigated in several cases by the proper combination and configuration of detection schemes, and a new metric is proposed to measure the impact of Stealthy attacks.
Journal ArticleDOI
Resilient Event-Triggering $H_{\infty }$ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks
Chen Peng,Jicai Li,Minrui Fei +2 more
TL;DR: In this paper, a resilient event-triggering load frequency control (LFC) for multi-area power systems with energy-limited Denial-of-Service (DoS) attacks is investigated.
Journal ArticleDOI
Resilient control under Denial-of-Service: Robust design
Shuai Feng,Pietro Tesi +1 more
TL;DR: Networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network, are studied to maximize frequency and duration of the DoS attacks.
References
More filters
Book
Linear Matrix Inequalities in System and Control Theory
TL;DR: In this paper, the authors present a brief history of LMIs in control theory and discuss some of the standard problems involved in LMIs, such as linear matrix inequalities, linear differential inequalities, and matrix problems with analytic solutions.
Book
Nonlinear Control Systems
Alberto Isidori,M. Thoma,Eduardo D. Sontag,B. W. Dickinson,A. Fettweis,J. L. Massey,J. W. Modestino +6 more
TL;DR: In this paper, a systematic feedback design theory for solving the problems of asymptotic tracking and disturbance rejection for linear distributed parameter systems is presented, which is intended to support the development of flight controllers for increasing the high angle of attack or high agility capabilities of existing and future generations of aircraft.
Book
Robust and Optimal Control
TL;DR: This paper reviewed the history of the relationship between robust control and optimal control and H-infinity theory and concluded that robust control has become thoroughly mainstream, and robust control methods permeate robust control theory.