Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

Mathematics – Optimization and Control

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustrate the robustness of our monitors to system noise and unmodeled dynamics through a simulation study.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-605050

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.