2016 IEEE 55th Conference on Decision and Control (CDC) 2016
DOI: 10.1109/cdc.2016.7798418
|View full text |Cite
|
Sign up to set email alerts
|

Cyber physical attacks with control objectives and detection constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 17 publications
0
18
0
Order By: Relevance
“…Research on attack design includes developing conditions for undetectable FDI attack [10], design of a linear deception attack scheme to fool the popular χ 2 detector (see [6]), optimal attack design for noiseless systems [11], FDI design to penetrate AC-based bad data detection system [12], etc. The paper [13] designs an optimal attack to steer the state of a control system to a desired target under a constraint on the attack detection probability. Stealth attack design on a quantized networked control system has been solved in [14].…”
Section: A Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Research on attack design includes developing conditions for undetectable FDI attack [10], design of a linear deception attack scheme to fool the popular χ 2 detector (see [6]), optimal attack design for noiseless systems [11], FDI design to penetrate AC-based bad data detection system [12], etc. The paper [13] designs an optimal attack to steer the state of a control system to a desired target under a constraint on the attack detection probability. Stealth attack design on a quantized networked control system has been solved in [14].…”
Section: A Related Literaturementioning
confidence: 99%
“…) to solve (UP) at time t by using the set of linear equations ( 10), (11), (12), (13). Then it makes the following update:…”
Section: B Updating λ(T) Iteratively: Olaade-kktmentioning
confidence: 99%
“…The problem of FDI attack design and its detection has received significant attention in recent times; attack design: conditions for undetectable FDI attack [4], design of a linear deception attack scheme to fool the popular χ 2 detector (see [5]), optimal attack design for noiseless systems [6]. The paper [7] designs an optimal attack to steer the state of a control system to a desired target under a constraint on the attack detection probability. On the other hand, attempts on attack detection includes centralized (and decentralized as well) schemes for noiseless systems [8], coding of sensor output along with χ 2 detector [9], comparing the sensor observations with those coming from from a few known safe sensors [10], and the attack detection and secure estimation schemes based on innovation vectors in [11].…”
Section: A Related Literaturementioning
confidence: 99%
“…The problem of FDI attack design and its detection has received significant attention in recent times; attack design: conditions for undetectable FDI attack [5], design of a linear deception attack scheme to fool the popular χ 2 detector (see [6]), optimal attack design for noiseless systems [7]. The paper [8] designs an optimal attack to steer the state of a control system to a desired target under a constraint on the attack detection probability. On the other hand, attempts on attack detection includes centralized (and decentralized as well) schemes for noiseless systems [9], coding of sensor output along with χ 2 detector [10], comparing the sensor observations with those coming from from a few known safe sensors [11], and the attack detection and secure estimation schemes based on innovation vectors in [12].…”
Section: Introductionmentioning
confidence: 99%