kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Protecting Positive and Second-Order Systems against Undetectable Attacks
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0002-0170-0979
KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. University of California at Berkeley, United States.
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
Show others and affiliations
2017 (English)In: IFAC-PapersOnLine, E-ISSN 2405-8963, Vol. 50, no 1, p. 8373-8378Article in journal (Refereed) Published
Abstract [en]

Undetectable attacks in security studies of cyber-physical systems render the measurements of the system equal to a possible physical response. In this paper, we investigate defense strategies against the undetectable single-attack for positive systems and second-order systems, which both can be reinterpreted in terms of graphs with nodes and edges, while the undetectable attack is added through one of the nodes. We show that an arbitrary placement of a sensor prevents undetectable single-attack for these classes of systems. It is worth emphasising that we do not need to measure at the corrupted node to prevent the undetectable single-attack, but can measure at any node. The defense strategy is of a low complexity and can be readily implemented.

Place, publisher, year, edition, pages
Elsevier, 2017. Vol. 50, no 1, p. 8373-8378
Keywords [en]
defense strategy, positive systems, second-order systems, sensor placement, Undetectable attacks
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-223050DOI: 10.1016/j.ifacol.2017.08.1561ISI: 000423964900385Scopus ID: 2-s2.0-85031819807OAI: oai:DiVA.org:kth-223050DiVA, id: diva2:1182594
Funder
Swedish Research CouncilKnut and Alice Wallenberg FoundationSwedish Foundation for Strategic Research
Note

QC 20180214

Available from: 2018-02-14 Created: 2018-02-14 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Wei, JieqiangSandberg, HenrikJohansson, Karl Henrik

Search in DiVA

By author/editor
Wei, JieqiangChen, WeiSandberg, HenrikJohansson, Karl Henrik
By organisation
Automatic ControlACCESS Linnaeus Centre
In the same journal
IFAC-PapersOnLine
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 631 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf