Attack Detection and Identification in Cyber-Physical Systems

作者: Fabio Pasqualetti , Florian Dorfler , Francesco Bullo

DOI: 10.1109/TAC.2013.2266831

关键词: Identification (information)Electric power systemEngineeringDistributed computingControl systemComputer securityCyber-physical system

摘要: … attacks. In this paper: (i) we propose a mathematical framework for cyber-physical systems, attacks, … (ii) we design centralized and distributed attack detection and identification monitors. …

参考文章(39)
J.P. Conti, The day the samba stopped [power blackouts] Engineering & Technology. ,vol. 5, pp. 46- 47 ,(2010) , 10.1049/ET.2010.0410
Jill Slay, Michael Miller, Lessons Learned from the Maroochy Water Breach international conference on critical infrastructure protection. pp. 73- 82 ,(2007) , 10.1007/978-0-387-75462-8_6
Saurabh Amin, Alvaro A. Cárdenas, S. Shankar Sastry, Safe and Secure Networked Control Systems under Denial-of-Service Attacks international conference on hybrid systems computation and control. pp. 31- 45 ,(2009) , 10.1007/978-3-642-00602-9_3
Ali Abur, Antonio Gómez Expósito, Power System State Estimation : Theory and Implementation CRC Press. ,(2004) , 10.1201/9780203913673
Jens Burgschweiger, Bernd Gnädig, Marc C. Steinbach, Optimization models for operative planning in drinking water networks Optimization and Engineering. ,vol. 10, pp. 43- 73 ,(2009) , 10.1007/S11081-008-9040-8
Jean-Michel Dion, Christian Commault, Jacob van der Woude, Survey Generic properties and control of linear structured systems: a survey Automatica. ,vol. 39, pp. 1125- 1144 ,(2003) , 10.1016/S0005-1098(03)00104-3
James P. Farwell, Rafal Rohozinski, Stuxnet and the Future of Cyber War Survival. ,vol. 53, pp. 23- 40 ,(2011) , 10.1080/00396338.2011.555586
Gyorgy Dan, Henrik Sandberg, Stealth Attacks and Protection Schemes for State Estimators in Power Systems 2010 First IEEE International Conference on Smart Grid Communications. pp. 214- 219 ,(2010) , 10.1109/SMARTGRID.2010.5622046
Fabio Pasqualetti, Florian Dorfler, Francesco Bullo, Cyber-physical security via geometric control: Distributed monitoring and malicious attacks conference on decision and control. pp. 3418- 3425 ,(2012) , 10.1109/CDC.2012.6426257