Loading [a11y]/accessibility-menu.js
Cyber physical attacks with control objectives and detection constraints | IEEE Conference Publication | IEEE Xplore

Cyber physical attacks with control objectives and detection constraints


Abstract:

This paper studies attackers with control objectives and explicit detection constraints against cyber-physical systems. The cyber-physical system is equipped with a Kalma...Show More

Abstract:

This paper studies attackers with control objectives and explicit detection constraints against cyber-physical systems. The cyber-physical system is equipped with a Kalman filter and an attack detector that uses the innovations process of the Kalman filter. The attacker performs an integrity attack on the actuators and sensors of the system with the aim of moving the system to a target state under the constraint that the probability of him or her being detected is equal to the false alarm probability of the attack detector. We formulate and solve a constrained optimization problem that gives the optimal sequence of attacks and demonstrate our attack strategy in a numerical example.
Date of Conference: 12-14 December 2016
Date Added to IEEE Xplore: 29 December 2016
ISBN Information:
Conference Location: Las Vegas, NV, USA

Contact IEEE to Subscribe

References

References is not available for this document.