LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems

Photo by clemono from unsplash

This letter studies the properties and optimization of strictly stealthy attacks that cannot be detected by output and innovation-based detectors on cyber-physical systems. These attacks may target both the actuator… Click to show full abstract

This letter studies the properties and optimization of strictly stealthy attacks that cannot be detected by output and innovation-based detectors on cyber-physical systems. These attacks may target both the actuator and sensor communication channels with the goal of impairing the system’s performance. We provide a necessary and sufficient condition for a system to be susceptible to a strictly stealthy attack of any given length. Furthermore, we analytically derive the optimal attack out of all possible strictly stealthy attacks with a particular length based on an energy constraint and a summation-based quadratic objective function. A numerical example is used to illustrate the theoretical results.

Keywords: strictly stealthy; physical systems; stealthy deterministic; cyber physical; horizon strictly; finite horizon

Journal Title: IEEE Control Systems Letters
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.