Pregled bibliografske jedinice broj: 1199028
Minimum Robust Invariant Sets and Kalman Filtering in Cyber Attacking and Defending
Minimum Robust Invariant Sets and Kalman Filtering in Cyber Attacking and Defending // Proceedings of the 2022 American Control Conference
Atlanta (GA), Sjedinjene Američke Države, 2022. str. 2924-2931 doi:10.23919/ACC53348.2022.9867272 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1199028 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Minimum Robust Invariant Sets and Kalman Filtering
in Cyber Attacking and Defending
Autori
Leko, Dorijan ; Vašak, Mario
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the 2022 American Control Conference
/ - , 2022, 2924-2931
Skup
2022 American Control Conference
Mjesto i datum
Atlanta (GA), Sjedinjene Američke Države, 08.06.2022. - 10.06.2022
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
cyber attack, detection of data integrity cyber attack, minimum robust invariant set, Kalman filter, polytope, zonotope, automatic generation control
Sažetak
The paper provides a data integrity cyber-attack detection framework based on minimum robust positively invariant sets. A general linear control system with a Kalman filter is considered. The set localization of the state estimator error is taken into account for developing the attack detector. An intelligent attacker algorithm is developed that has access to a subset of signals from the sensor and actuator channel of the control system. It is assumed that the attacker possesses the entire control system model to perform the most proficient attack for a certain set-up of data availability and compromisation. The attacker compromises a set of measurement data under the constraint of remaining non-discovered by the detector. The presented methodology allows assessing the effectiveness of the control system defense achievable in various data integrity attack scenarios. The developed detector and attacker algorithm were implemented on an illustrative example of a power system with two control areas and automatic generation control.
Izvorni jezik
Engleski
Znanstvena područja
Elektrotehnika, Računarstvo, Temeljne tehničke znanosti
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike i računarstva, Zagreb