2013 American Control Conference 2013
DOI: 10.1109/acc.2013.6580348
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis for Cyber-Physical Systems against stealthy deception attacks

Abstract: Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Deception attacks (or false data injection attacks), which are performed by tampering with system components or data, are not of particular concern if they can be easily de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(14 citation statements)
references
References 13 publications
(21 reference statements)
0
14
0
Order By: Relevance
“…Cheolhyeon Kwon, et al, in [45] study the performance of stealthy deception attacks according to the attackers' ability to compromise the system from a system's perspective.…”
Section: Stealthy Deception Attackmentioning
confidence: 99%
“…Cheolhyeon Kwon, et al, in [45] study the performance of stealthy deception attacks according to the attackers' ability to compromise the system from a system's perspective.…”
Section: Stealthy Deception Attackmentioning
confidence: 99%
“…Furthermore, in Yang et al (2017), a distributed state estimator with an event-triggered scheme is formulated to defend against false data injection attacks in Wireless Sensor Networks. An approach Kwon et al (2013) has been made recently to investigate security problems against deception attacks. In this approach Kwon et al (2013), instead of defining a unique cyber-attack model, authors focussed on analysing the system's response during false data injection attacks.…”
Section: Introductionmentioning
confidence: 99%
“…An approach Kwon et al (2013) has been made recently to investigate security problems against deception attacks. In this approach Kwon et al (2013), instead of defining a unique cyber-attack model, authors focussed on analysing the system's response during false data injection attacks. Finally, they proposed the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected.…”
Section: Introductionmentioning
confidence: 99%
“…Common scenarios concern replay attacks [3], where the adversary records measurements for a certain period of time and then resends them, therefore replacing the real ones, denial of service attacks [4][5][6], where the adversary jams channels that transmit control commands or sensor measurements, and data corruption cyber-attacks, where the adversary injects system data with biased attack signals [7][8][9]. Stealthy attacks, that cause system malfunctions, while remaining undetected in the process, have also been extensively studied in [10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%