Journal ArticleDOI
Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes
Reads0
Chats0
TLDR
The problem of detection and reconstruction of cyber-attacks corrupting states and/or outputs of a linear cyber-physical system is addressed and robust state/sensor attack observers are designed able to work as detection monitors with guaranteed performances, and to reconstruct the attacks within a finite-time.Abstract:
The problem of detection and reconstruction of cyber-attacks corrupting states and/or outputs of a linear cyber-physical system is addressed. Robust state/sensor attack observers are designed able both to work as detection monitors with guaranteed performances, and to reconstruct the attacks within a finite-time. Detection and reconstruction are performed robustly with respect to bounded modelling errors possibly affecting the state equation. Compensation of attacks is also addressed for square plants. An extensive simulation study using test-cases taken from the literature is shown to support the theoretical findings.read more
Citations
More filters
Journal ArticleDOI
Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT
TL;DR: A class of n-order nonlinear systems is considered as a model of CPS while it is in presence of cyber attacks only in the forward channel, and an intelligent-classic control system is developed to compensate cyber-attacks.
Journal ArticleDOI
Cyber Physical System (CPS)-Based Industry 4.0: A Survey
TL;DR: This review paper summarizes the current state-of-the-art CPS in Industry 4.0 from Web of Science (WoS) database and proposes a potential framework of CPS systematically, and identifies research trends and challenges.
Journal ArticleDOI
A survey on attack detection, estimation and control of industrial cyber-physical systems.
TL;DR: A survey on recent advances on security issues of industrial cyber-physical systems (ICPSs) is presented in this article, where two typical kinds of attacks, namely Denial-of-Service (DoS) attack and Deception attack, are discussed.
Journal ArticleDOI
Bibliographical review on cyber attacks from a control oriented perspective
Helem Sabina Sánchez,Damiano Rotondo,Damiano Rotondo,Teresa Escobet,Vicenç Puig,Vicenç Puig,Joseba Quevedo +6 more
TL;DR: A bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs) from a control-oriented perspective.
Journal ArticleDOI
Wide-Area Robust Sliding Mode Controller for Power Systems With False Data Injection Attacks
TL;DR: A wide-area robust sliding mode controller (WARSMC) is proposed to defense the hacker attacks and damp out the interarea oscillations in wide- area power systems with false data injection (FDI) attacks.
References
More filters
Journal ArticleDOI
MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education
TL;DR: The details of the network modeling and problem formulations used by MATPOWER, including its extensible OPF architecture, are presented, which are used internally to implement several extensions to the standard OPF problem, including piece-wise linear cost functions, dispatchable loads, generator capability curves, and branch angle difference limits.
Book
Sliding Modes in Control and Optimization
TL;DR: The theory and practical application of Lyapunov's Theorem, a method for the Study of Non-linear High-Gain Systems, are studied.
Book
Fault-Diagnosis Systems
TL;DR: In this paper, the authors present a comparison and combination of fault-detection methods for different types of fault detection methods: Fault detection with classification methods, fault detection with inference methods, and fault detection using Principal Component Analysis (PCA).
Journal ArticleDOI
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
TL;DR: A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Journal ArticleDOI
Kron Reduction of Graphs With Applications to Electrical Networks
Florian Dörfler,Francesco Bullo +1 more
TL;DR: This paper provides a comprehensive and detailed graph-theoretic analysis of Kron reduction encompassing topological, algebraic, spectral, resistive, and sensitivity analyses and leads to novel insights both on the mathematical and the physical side.