MURAL - Maynooth University Research Archive Library

    The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems

    Kung, Enoch and Dey, Subhrakanti and Shi, Ling (2017) The Performance and Limitations of ϵ- Stealthy Attacks on Higher Order Systems. IEEE Transactions on Automatic Control, 62 (2). pp. 941-947. ISSN 0018-9286

    Download (354kB) | Preview

    Share your research

    Twitter Facebook LinkedIn GooglePlus Email more...

    Add this article to your Mendeley library


    In a cyber-physical system, security problems are of vital importance as the failure of such system can have catastrophic effects. Detection methods can be employed to sense the existence of an attack. In a previous study of an attack on the controller while avoiding detection in scalar systems under a certain control assumption, the notion of e-stealthiness was introduced and the strength of e-stealthy attacks was fully characterized. We generalize to the vector system and prove the cases in which we show that the limitations of e-stealthy attack do not extend, in the sense that e-stealthy can inflict damage of arbitrary magnitude to a vector system.

    Item Type: Article
    Keywords: Cyber-physical systems; detection; security;
    Academic Unit: Faculty of Science and Engineering > Electronic Engineering
    Faculty of Science and Engineering > Research Institutes > Hamilton Institute
    Item ID: 11512
    Identification Number:
    Depositing User: Subhrakanti Dey
    Date Deposited: 25 Oct 2019 14:02
    Journal or Publication Title: IEEE Transactions on Automatic Control
    Publisher: IEEE
    Refereed: Yes
    Use Licence: This item is available under a Creative Commons Attribution Non Commercial Share Alike Licence (CC BY-NC-SA). Details of this licence are available here

    Repository Staff Only(login required)

    View Item Item control page


    Downloads per month over past year

    Origin of downloads