2019 18th European Control Conference (ECC) 2019
DOI: 10.23919/ecc.2019.8796117
|View full text |Cite
|
Sign up to set email alerts
|

A Tutorial on Detecting Security Attacks on Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 41 publications
0
17
0
Order By: Relevance
“…"Active" detection methods have been proposed to detect stealthy attacks. These methods involve the introduction of a probing signal (watermark) to reveal fake sensor measurement or actuation signals [21], [22]. Active methods can also be designed for attacks exploiting specific control-theoretic properties.…”
Section: Attack Detection In Icsmentioning
confidence: 99%
“…"Active" detection methods have been proposed to detect stealthy attacks. These methods involve the introduction of a probing signal (watermark) to reveal fake sensor measurement or actuation signals [21], [22]. Active methods can also be designed for attacks exploiting specific control-theoretic properties.…”
Section: Attack Detection In Icsmentioning
confidence: 99%
“…R. Romagnoli is with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA 15213 (Email: rromagno@andrew.cmu.edu). systems, and its performance has been studied extensively in the literature [14]- [16].…”
Section: Introductionmentioning
confidence: 99%
“…Among various types of cyber-attacks, integrity attacks are specially dedicated to automatic control systems (Dibaji et al, 2019;Griffioen et al, 2019). By injecting attack signals into system input and output channels, for instance, via I/O and network interfaces, integrity attacks can lead to remarkable system performance degradations and even catastrophic damages.…”
Section: Introductionmentioning
confidence: 99%
“…An early and reliable detection of integrity attacks is becoming a vitally important requirement on cyber-security of industrial CPSs, for instance, for power control systems (Mohan et al, 2020). Thanks to its intimate relations to control theory and theoretical framework well-established in the past three decades, observer-based fault detection technique (Ding, 2013) is widely accepted as an efficient method, among numerous ones, to deal with detection of integrity attacks on control systems (Dibaji et al, 2019;Griffioen et al, 2019;Tan et al, 2020). Unfortunately, different from technical faults, cyber-attacks are artificially created and can be designed and generated by an adversary.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation