An internal model principle for the attacker in distributed control systems
2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017, Vol: 2018-January, Page: 6604-6609
2017
- 17Citations
- 19Usage
- 16Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Citations17
- Citation Indexes17
- 17
- CrossRef2
- Usage19
- Abstract Views19
- Captures16
- Readers16
- 16
Conference Paper Description
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is no rigorous mathematical analysis to characterize their worst effects in distributed multi-agent systems. Without characterizing these attacks, one cannot empower the agents with resilient functionalities to mitigate them. To this end, we will take the role of the attacker to show that in a distributed control system, an attacker can destabilize the whole synchronization process by injecting a state-independent attack signal into sensors or actuators of a single root node or to its outgoing communication links. This will be called the internal model principle for the attacker and will intensify the urgency of designing novel control protocols to mitigate these types of attacks.
Bibliographic Details
https://orc.library.atu.edu/faculty_pub_elec/56; https://scholarsmine.mst.edu/ele_comeng_facwork/3675
http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85046076487&origin=inward; http://dx.doi.org/10.1109/cdc.2017.8264655; http://ieeexplore.ieee.org/document/8264655/; http://xplorestaging.ieee.org/ielx7/8253407/8263624/08264655.pdf?arnumber=8264655; https://orc.library.atu.edu/faculty_pub_elec/56; https://orc.library.atu.edu/cgi/viewcontent.cgi?article=1055&context=faculty_pub_elec; https://scholarsmine.mst.edu/ele_comeng_facwork/3675; https://scholarsmine.mst.edu/cgi/viewcontent.cgi?article=4680&context=ele_comeng_facwork
Institute of Electrical and Electronics Engineers (IEEE)
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know