MURAL - Maynooth University Research Archive Library



    The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems


    Kung, Enoch, Dey, Subhrakanti and Shi, Ling (2017) The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems. IEEE Transactions on Automatic Control, 62 (2). pp. 941-947. ISSN 0018-9286

    [thumbnail of SD-Performance-2017.pdf]
    Preview
    Text
    SD-Performance-2017.pdf

    Download (354kB) | Preview

    Abstract

    In a cyber-physical system, security problems are of vital importance as the failure of such system can have catastrophic effects. Detection methods can be employed to sense the existence of an attack. In a previous study of an attack on the controller while avoiding detection in scalar systems under a certain control assumption, the notion of e-stealthiness was introduced and the strength of e-stealthy attacks was fully characterized. We generalize to the vector system and prove the cases in which we show that the limitations of e-stealthy attack do not extend, in the sense that e-stealthy can inflict damage of arbitrary magnitude to a vector system.
    Item Type: Article
    Keywords: Cyber-physical systems; detection; security;
    Academic Unit: Faculty of Science and Engineering > Electronic Engineering
    Faculty of Science and Engineering > Research Institutes > Hamilton Institute
    Item ID: 11512
    Identification Number: 10.1109/TAC.2016.2565379
    Depositing User: Subhrakanti Dey
    Date Deposited: 25 Oct 2019 14:02
    Journal or Publication Title: IEEE Transactions on Automatic Control
    Publisher: IEEE
    Refereed: Yes
    Related URLs:
    URI: https://mu.eprints-hosting.org/id/eprint/11512
    Use Licence: This item is available under a Creative Commons Attribution Non Commercial Share Alike Licence (CC BY-NC-SA). Details of this licence are available here

    Repository Staff Only (login required)

    Item control page
    Item control page

    Downloads

    Downloads per month over past year

    Origin of downloads