2021
DOI: 10.1109/tac.2020.3005686
|View full text |Cite
|
Sign up to set email alerts
|

A Moving Target Defense for Securing Cyber-Physical Systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(37 citation statements)
references
References 27 publications
0
31
0
Order By: Relevance
“…Assuming the parameters of these elements are changed fast enough, the dynamics of the plant becomes a moving target for the adversary [13], [14]. In other words, the adversary does not have enough time to learn properly, makes errors and perpetrates attacks that are not covert [8], [9]. Next, we discuss in more details the concepts of challenge-response and auxiliary state.…”
Section: Related Workmentioning
confidence: 99%
“…Assuming the parameters of these elements are changed fast enough, the dynamics of the plant becomes a moving target for the adversary [13], [14]. In other words, the adversary does not have enough time to learn properly, makes errors and perpetrates attacks that are not covert [8], [9]. Next, we discuss in more details the concepts of challenge-response and auxiliary state.…”
Section: Related Workmentioning
confidence: 99%
“…Constraint (15) ensures that any node without an active selfloop will be connected to a node with an active selfloop (either directly or via an intermediary node). Constraint (16) ensures that every node has either an active self-loop or has a path to exactly one node with an active self-loop. Finally, a solver solveSM T M odel(.)…”
Section: Control Layer Design Framework: Cybersecuritymentioning
confidence: 99%
“…Such a moving target defense concept recently has attracted interest in the control systems community. We refer to [16] and [17] for single dynamical systems. In particular, focusing on a control design problem, [17] relies on the redundancy in the physical components of the underlying system and its moving target defense idea is based on an average dwell time condition, which would be conservative (see the previous paragraph).…”
Section: Introductionmentioning
confidence: 99%
“…This approach uses switched control systems that allow to detect sensor compromise and to minimize the impact of falsedata injection attacks. Griffioen et al [33] proposes a MTD approach for recognizing and isolating CPS integrity attacks on a set of sensors and actuators by introducing stochastic time-varying parameters in the control system. The underlying random dynamics of the system limits the attacker's knowledge of the model.…”
Section: Iii1 Network Mtd Approaches -mentioning
confidence: 99%