kth.sePublications
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Geometrical Characterization Of Sensor Placement For Cone-Invariant And Multi-Agent Systems Against Undetectable Zero-Dynamics Attacks\Ast
City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0002-0170-0979
Peking Univ, Dept Mech & Engn Sci, Beijing, Peoples R China.;Peking Univ, Beijing Innovat Ctr Engn Sci & Adv Technol, Beijing, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0003-1835-2963
Show others and affiliations
2022 (English)In: SIAM Journal of Control and Optimization, ISSN 0363-0129, E-ISSN 1095-7138, Vol. 60, no 2, p. 890-916Article in journal (Refereed) Published
Abstract [en]

Undetectable attacks are an important class of malicious attacks threatening the security of cyber-physical systems, which can modify a system's state but leave the system output measurements unaffected and hence cannot be detected from the output. This paper studies undetectable attacks on cone-invariant systems and multi-agent systems. We first provide a general characterization of zero-dynamics attacks, which characterizes fully undetectable attacks targeting the nonminimum phase zeros of a system. This geometrical characterization makes it possible to develop a defense strategy seeking to place a minimal number of sensors to detect and counter the zero-dynamics attacks on the system's actuators. The detect and defense scheme amounts to computing a set containing potentially vulnerable actuator locations and nodes and a defense union for feasible placement of sensors based on the geometrical properties of the cones under consideration.

Place, publisher, year, edition, pages
Society for Industrial & Applied Mathematics (SIAM) , 2022. Vol. 60, no 2, p. 890-916
Keywords [en]
 , undetectable attacks, sensor placement, defense strategy, cone-invariant systems, multi-agent systems
National Category
Computer Engineering
Identifiers
URN: urn:nbn:se:kth:diva-312798DOI: 10.1137/21M1403618ISI: 000790477400013Scopus ID: 2-s2.0-85130719665OAI: oai:DiVA.org:kth-312798DiVA, id: diva2:1661072
Note

QC 20230222

Available from: 2022-05-25 Created: 2022-05-25 Last updated: 2023-02-22Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Wei, JieqiangSandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Wei, JieqiangSandberg, HenrikJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)ACCESS Linnaeus Centre
In the same journal
SIAM Journal of Control and Optimization
Computer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 90 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf