kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Revealing Stealthy Attacks in Control Systems
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-5491-4068
University of Melbourne, Melbourne, Australia.
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2012 (English)In: 2012 50th Annual Allerton Conference On Communication, Control, And Computing (Allerton), IEEE conference proceedings, 2012, p. 1806-1813Conference paper, Published paper (Refereed)
Abstract [en]

In this paper the problem of revealing stealthy data-injection attacks on control systems is addressed. In particular we consider the scenario where the attacker performs zero-dynamics attacks on the system. First, we characterize and analyze the stealthiness properties of these attacks for linear time-invariant systems. Then we tackle the problem of detecting such attacks by modifying the system's structure. Our results provide necessary and sufficient conditions that the modifications should satisfy in order to detect the zero-dynamics attacks. The results and proposed detection methods are illustrated through numerical examples.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2012. p. 1806-1813
Keywords [en]
Detection methods, In-control, Linear time invariant systems, Numerical example, Sufficient conditions, Zero dynamics
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-103329DOI: 10.1109/Allerton.2012.6483441ISI: 000320654000250Scopus ID: 2-s2.0-84875701366ISBN: 978-1-4673-4539-2 (print)OAI: oai:DiVA.org:kth-103329DiVA, id: diva2:559754
Conference
50th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, USA, October 01-05, 2012
Projects
HYCON2
Funder
Swedish Research Council, 2007- 6350Swedish Research Council, 2009-4565Knut and Alice Wallenberg FoundationICT - The Next Generation
Note

QC 20121114

Available from: 2012-11-14 Created: 2012-10-10 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

fulltext(306 kB)1327 downloads
File information
File name FULLTEXT02.pdfFile size 306 kBChecksum SHA-512
220d33ab6a627ab42101cdfca198ce3af4843b826d3ff72f33e4ce8fb518c1b8c494288976e44ad72bfe06b0125130ad2cd97dff1404eb04bc2d571b95dd8778
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusConference website

Authority records

Teixeira, AndréSandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Teixeira, AndréShames, ImanSandberg, HenrikJohansson, Karl H.
By organisation
Automatic ControlACCESS Linnaeus Centre
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 1327 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 706 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf