MURAL - Maynooth University Research Archive Library



    The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems


    Kung, Enoch and Dey, Subhrakanti and Shi, Ling (2017) The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems. IEEE Transactions on Automatic Control, 62 (2). pp. 941-947. ISSN 0018-9286

    [img]
    Preview
    Download (354kB) | Preview


    Share your research

    Twitter Facebook LinkedIn GooglePlus Email more...



    Add this article to your Mendeley library


    Abstract

    In a cyber-physical system, security problems are of vital importance as the failure of such system can have catastrophic effects. Detection methods can be employed to sense the existence of an attack. In a previous study of an attack on the controller while avoiding detection in scalar systems under a certain control assumption, the notion of e-stealthiness was introduced and the strength of e-stealthy attacks was fully characterized. We generalize to the vector system and prove the cases in which we show that the limitations of e-stealthy attack do not extend, in the sense that e-stealthy can inflict damage of arbitrary magnitude to a vector system.

    Item Type: Article
    Keywords: Cyber-physical systems; detection; security;
    Academic Unit: Faculty of Science and Engineering > Electronic Engineering
    Faculty of Science and Engineering > Research Institutes > Hamilton Institute
    Item ID: 11512
    Identification Number: https://doi.org/10.1109/TAC.2016.2565379
    Depositing User: Subhrakanti Dey
    Date Deposited: 25 Oct 2019 14:02
    Journal or Publication Title: IEEE Transactions on Automatic Control
    Publisher: IEEE
    Refereed: Yes
    URI:
    Use Licence: This item is available under a Creative Commons Attribution Non Commercial Share Alike Licence (CC BY-NC-SA). Details of this licence are available here

    Repository Staff Only(login required)

    View Item Item control page

    Downloads

    Downloads per month over past year

    Origin of downloads