arXiv Analytics

Sign in

arXiv:1202.6049 [math.OC]AbstractReferencesReviewsResources

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

Fabio Pasqualetti, Florian Dörfler, Francesco Bullo

Published 2012-02-27Version 1

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustrate the robustness of our monitors to system noise and unmodeled dynamics through a simulation study.

Related articles: Most relevant | Search more
arXiv:2109.09055 [math.OC] (Published 2021-09-19)
Analysis, Optimization, Control, and Learning of Cyber-Physical Systems
arXiv:2306.12516 [math.OC] (Published 2023-06-21)
Separability of State Trajectories and its Applications to Security of Cyber-Physical Systems
arXiv:2405.20209 [math.OC] (Published 2024-05-30)
Lasso-based state estimation for cyber-physical systems under sensor attacks