kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Two-Way Coding in Control Systems Under Injection Attacks: From Attack Detection to Attack Correction
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.ORCID iD: 0000-0002-7926-5081
KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
Show others and affiliations
2019 (English)In: ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS / [ed] Ramachandran, GS Ortiz, J, Association for Computing Machinery (ACM) , 2019, p. 141-150Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as a consequence of two-way coding will facilitate detecting the attacks, or restricting what the attacker can do, or even correcting the attack effect. In the particular case of zero-dynamics attacks, if the attacks are to be designed according to the original plant, then they will be easily detected; while if the attacks are designed with respect to the equivalent plant as viewed by the attacker, then under the additional assumption that the plant is stabilizable by static output feedback, the attack effect may be corrected in steady state.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2019. p. 141-150
Series
ACM-IEEE International Conference on Cyber-Physical Systems, ISSN 2375-8317
Keywords [en]
Cyber-physical system, networked control system, cyber-physical security, two-way channel, two-way coding, zero-dynamics attack
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-255508DOI: 10.1145/3302509.3311047ISI: 000473800800014Scopus ID: 2-s2.0-85066616846OAI: oai:DiVA.org:kth-255508DiVA, id: diva2:1360294
Conference
10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), APR 16-18, 2019, Montreal, CANADA
Projects
CERCES
Note

Part of ISBN 978-1-4503-6285-6

QC 20191011

Available from: 2019-10-11 Created: 2019-10-11 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Fang, SongJohansson, Karl H.Skoglund, MikaelSandberg, Henrik

Search in DiVA

By author/editor
Fang, SongJohansson, Karl H.Skoglund, MikaelSandberg, Henrik
By organisation
Decision and Control Systems (Automatic Control)ACCESS Linnaeus CentreInformation Science and Engineering
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 235 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf