计算机科学
控制(管理)
计算机安全
资源(消歧)
分布式计算
计算机网络
人工智能
作者
André Teixeira,Iman Shames,Henrik Sandberg,Karl Henrik Johansson
出处
期刊:Automatica
[Elsevier]
日期:2014-11-19
卷期号:51: 135-148
被引量:973
标识
DOI:10.1016/j.automatica.2014.10.067
摘要
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space defined by the adversary's model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resources are modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service, replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework. Furthermore, the attack policy for each scenario is described and the attack's impact is characterized using the concept of safe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate the attack scenarios, their consequences, and potential counter-measures.
科研通智能强力驱动
Strongly Powered by AbleSci AI