scispace - formally typeset
Open AccessPosted Content

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

Reads0
Chats0
TLDR
In this article, the authors proposed centralized and distributed monitors for attack detection and identification in cyber-physical systems and showed that the attack identification problem is computationally hard and designed a sub-optimal distributed attack identification procedure with performance guarantees.
Abstract
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustrate the robustness of our monitors to system noise and unmodeled dynamics through a simulation study.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

TL;DR: A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Posted Content

Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations

TL;DR: This paper proposes a mathematical framework for cyber-physical systems, attacks, and monitors, and describes fundamental monitoring limitations from system-theoretic and graph- theoretic perspectives and designs centralized and distributed attack detection and identification monitors.
Journal ArticleDOI

An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems

TL;DR: An adaptive controller is developed that guarantees uniform ultimate boundedness of the closed-loop dynamical system in the face of adversarial sensor and actuator attacks that are time-varying and partial asymptotic stability when the sensors and actuators attacks areTime-invariant.
Journal ArticleDOI

A Distributed Networked Approach for Fault Detection of Large-Scale Systems

TL;DR: This paper proposes a novel distributed networked fault detection methodology for large-scale interconnected systems that incorporates a synchronization methodology with a filtering approach in order to reduce the effect of measurement noise and time delays on the fault detection performance.
Proceedings ArticleDOI

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant

TL;DR: Using the flow properties of water from one stage to the other, a neighboring controller was found effective in detecting single stage multi-point (SSMP) attacks on a Cyber Physical System (CPS).
References
More filters
Journal ArticleDOI

Decoding by linear programming

TL;DR: F can be recovered exactly by solving a simple convex optimization problem (which one can recast as a linear program) and numerical experiments suggest that this recovery procedure works unreasonably well; f is recovered exactly even in situations where a significant fraction of the output is corrupted.
Book

Multivariable Feedback Control: Analysis and Design

TL;DR: This book presents a rigorous, yet easily readable, introduction to the analysis and design of robust multivariable control systems and provides the reader with insights into the opportunities and limitations of feedback control.
Journal ArticleDOI

MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education

TL;DR: The details of the network modeling and problem formulations used by MATPOWER, including its extensible OPF architecture, are presented, which are used internally to implement several extensions to the standard OPF problem, including piece-wise linear cost functions, dispatchable loads, generator capability curves, and branch angle difference limits.
Journal ArticleDOI

Detection of abrupt changes: theory and application

TL;DR: A unified framework for the design and the performance analysis of the algorithms for solving change detection problems and links with the analytical redundancy approach to fault detection in linear systems are established.
Journal ArticleDOI

The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee

TL;DR: In this article, an enhanced test system (RTS-96) is described for use in bulk power system reliability evaluation studies, which will permit comparative and benchmark studies to be performed on new and existing reliability evaluation techniques.
Related Papers (5)