PlumX Metrics
Embed PlumX Metrics

Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems

IEEE Transactions on Automatic Control, ISSN: 1558-2523, Vol: 69, Issue: 12, Page: 8234-8246
2024
  • 0
    Citations
  • 21
    Usage
  • 9
    Captures
  • 0
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

Article Description

This article provides a tool for analyzing mechanisms that aim to achieve resilience against stealthy, or undetectable, attacks on cyber-physical systems. We consider attackers who are able to corrupt all of the inputs and outputs of the system. To counter such attackers, a response scheme must be implemented that keeps the attacker from corrupting the inputs and outputs of the system for certain periods of time. To aid in the design of such a response scheme, our tool provides sufficient lengths for these periods of time in order to ensure safety with a particular probability. We provide an upper bound on how long the system can remain under stealthy attack before the safety constraints are violated. Furthermore, we show how a detector limits the set of biases an attacker can exert on the system while still remaining stealthy, aiding a system operator in the design of the detector. Our contributions are demonstrated with an illustrative example.

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know