Please use this identifier to cite or link to this item:
Title: A cyber attack model with bounded sensor reading alterations
Authors: Su, Rong
Keywords: Engineering::Electrical and electronic engineering
Issue Date: 2017
Source: Su, R. (2017). A cyber attack model with bounded sensor reading alterations. Proceedings of 2017 American Control Conference (ACC), 3200-3205. doi:10.23919/ACC.2017.7963440
Conference: 2017 American Control Conference (ACC)
Abstract: One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands improperly, driving the system to an undesirable state. We first consider the cyber attack problem from an attacker point of view, and formulate an attack with bounded sensor reading alterations (ABSRA) problem. We then show that the supremal (or least restrictive) ABSRA exists and can be synthesized, as long as the plant model and the supervisor model are regular, i.e., representable by finite-state automata.
ISSN: 9781509045839
Schools: School of Electrical and Electronic Engineering 
Rights: © 2017 AACC. All rights reserved. This paper was published by IEEE in Proceedings of 2017 American Control Conference and is made available with permission of AACC.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Conference Papers

Files in This Item:
File Description SizeFormat 
ACC2017-final.pdf415.5 kBAdobe PDFThumbnail

Page view(s)

Updated on May 18, 2024

Download(s) 50

Updated on May 18, 2024

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.