scispace - formally typeset
Journal ArticleDOI

Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes

Maria Letizia Corradini, +1 more
- 01 Jul 2017 - 
- Vol. 11, Iss: 11, pp 1756-1766
Reads0
Chats0
TLDR
The problem of detection and reconstruction of cyber-attacks corrupting states and/or outputs of a linear cyber-physical system is addressed and robust state/sensor attack observers are designed able to work as detection monitors with guaranteed performances, and to reconstruct the attacks within a finite-time.
Abstract
The problem of detection and reconstruction of cyber-attacks corrupting states and/or outputs of a linear cyber-physical system is addressed. Robust state/sensor attack observers are designed able both to work as detection monitors with guaranteed performances, and to reconstruct the attacks within a finite-time. Detection and reconstruction are performed robustly with respect to bounded modelling errors possibly affecting the state equation. Compensation of attacks is also addressed for square plants. An extensive simulation study using test-cases taken from the literature is shown to support the theoretical findings.

read more

Citations
More filters
Journal ArticleDOI

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT

TL;DR: A class of n-order nonlinear systems is considered as a model of CPS while it is in presence of cyber attacks only in the forward channel, and an intelligent-classic control system is developed to compensate cyber-attacks.
Journal ArticleDOI

Cyber Physical System (CPS)-Based Industry 4.0: A Survey

TL;DR: This review paper summarizes the current state-of-the-art CPS in Industry 4.0 from Web of Science (WoS) database and proposes a potential framework of CPS systematically, and identifies research trends and challenges.
Journal ArticleDOI

A survey on attack detection, estimation and control of industrial cyber-physical systems.

TL;DR: A survey on recent advances on security issues of industrial cyber-physical systems (ICPSs) is presented in this article, where two typical kinds of attacks, namely Denial-of-Service (DoS) attack and Deception attack, are discussed.
Journal ArticleDOI

Bibliographical review on cyber attacks from a control oriented perspective

TL;DR: A bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs) from a control-oriented perspective.
Journal ArticleDOI

Wide-Area Robust Sliding Mode Controller for Power Systems With False Data Injection Attacks

TL;DR: A wide-area robust sliding mode controller (WARSMC) is proposed to defense the hacker attacks and damp out the interarea oscillations in wide- area power systems with false data injection (FDI) attacks.
References
More filters
Journal ArticleDOI

MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education

TL;DR: The details of the network modeling and problem formulations used by MATPOWER, including its extensible OPF architecture, are presented, which are used internally to implement several extensions to the standard OPF problem, including piece-wise linear cost functions, dispatchable loads, generator capability curves, and branch angle difference limits.
Book

Sliding Modes in Control and Optimization

TL;DR: The theory and practical application of Lyapunov's Theorem, a method for the Study of Non-linear High-Gain Systems, are studied.
Book

Fault-Diagnosis Systems

Rolf Isermann
TL;DR: In this paper, the authors present a comparison and combination of fault-detection methods for different types of fault detection methods: Fault detection with classification methods, fault detection with inference methods, and fault detection using Principal Component Analysis (PCA).
Journal ArticleDOI

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

TL;DR: A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Journal ArticleDOI

Kron Reduction of Graphs With Applications to Electrical Networks

TL;DR: This paper provides a comprehensive and detailed graph-theoretic analysis of Kron reduction encompassing topological, algebraic, spectral, resistive, and sensitivity analyses and leads to novel insights both on the mathematical and the physical side.
Related Papers (5)