kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Strategic stealthy attacks: The output-to-output ℓ2-gain
KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0001-5491-4068
KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0001-9940-5929
2016 (English)In: Proceedings of the IEEE Conference on Decision and Control, IEEE conference proceedings, 2016, p. 2582-2587Conference paper, Published paper (Refereed)
Resource type
Text
Abstract [en]

In this paper, we characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems. In particular, the threat scenarios tackled in the paper consider adversaries that aim at deteriorating the system's performance by maximizing the corresponding quadratic cost function, while remaining stealthy with respect to anomaly detectors. As opposed to other work in the literature, the effect of the adversary's actions on the anomaly detector's output is not constrained to be zero at all times. Moreover, scenarios where the adversary has uncertain model knowledge are also addressed. The set of strategic attack policies is formulated as a non-convex constrained optimization problem, leading to a sensitivity metric denoted as the output-to-output ℓ2-gain. Using the framework of dissipative systems, the output-to-output gain is computed through an equivalent convex optimization problem. Additionally, we derive necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2016. p. 2582-2587
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-188288DOI: 10.1109/CDC.2015.7402605ISI: 000381554502131Scopus ID: 2-s2.0-84962010138ISBN: 9781479978861 (print)OAI: oai:DiVA.org:kth-188288DiVA, id: diva2:936292
Conference
54th IEEE Conference on Decision and Control, CDC 2015, 15 December 2015 through 18 December 2015
Note

QC 20160613

Available from: 2016-06-13 Created: 2016-06-09 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopushttp://cdc2015.ieeecss.org/

Authority records

Herdeiro Teixeira, AndréSandberg, HenrikJohansson, Karl Henrik

Search in DiVA

By author/editor
Herdeiro Teixeira, AndréSandberg, HenrikJohansson, Karl Henrik
By organisation
Automatic Control
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 609 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf