信息物理系统
椭球体
计算机科学
探测器
计算
摄动(天文学)
控制理论(社会学)
线性系统
控制系统
算法
控制(管理)
数学
工程类
物理
人工智能
电信
操作系统
电气工程
数学分析
量子力学
天文
作者
Yilin Mo,Bruno Sinopoli
出处
期刊:IEEE Transactions on Automatic Control
[Institute of Electrical and Electronics Engineers]
日期:2015-11-09
卷期号:61 (9): 2618-2624
被引量:355
标识
DOI:10.1109/tac.2015.2498708
摘要
This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.
科研通智能强力驱动
Strongly Powered by AbleSci AI