The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- 9 May 2016
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Automatic Control
- Vol. 62 (2), 941-947
- https://doi.org/10.1109/tac.2016.2565379
Abstract
In a cyber-physical system, security problems are of vital importance as the failure of such system can have catastrophic effects. Detection methods can be employed to sense the existence of an attack. In a previous study of an attack on the controller while avoiding detection in scalar systems under a certain control assumption, the notion of e-stealthiness was introduced and the strength of e-stealthy attacks was fully characterized. We generalize to the vector system and prove the cases in which we show that the limitations of e-stealthy attack do not extend, in the sense that e-stealthy can inflict damage of arbitrary magnitude to a vector system.Keywords
Funding Information
- RGC General Research Fund (16210015)
This publication has 7 references indexed in Scilit:
- Security in stochastic control systems: Fundamental limitations and performance boundsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Cyber Physical System: Architecture, applications and research challengesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- False data injection attacks against state estimation in electric power gridsPublished by Association for Computing Machinery (ACM) ,2009
- Safe and Secure Networked Control Systems under Denial-of-Service AttacksLecture Notes in Computer Science, 2009
- Lessons Learned from the Maroochy Water BreachPublished by Springer Science and Business Media LLC ,2007
- Distinguishing Data Transience from False Injection in Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A Matrix Trace InequalityJournal of Mathematical Analysis and Applications, 2001