A discrete-time min-max certainty equivalence principle
Systems & Control Letters
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
HSCC '09 Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control
Attacks against process control systems: risk assessment, detection, and response
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Attack models and scenarios for networked control systems
Proceedings of the 1st international conference on High Confidence Networked Systems
Optimal update with out-of-sequence measurements
IEEE Transactions on Signal Processing
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The control of physical systems is increasingly being done by resorting to networks to transmit information from sensors to controllers and from controllers to actuators. Unfortunately, this reliance on networks also brings new security vulnerabilities for control systems. We study the extent to which an adversary can attack a physical system by tampering with the temporal characteristics of the network, leading to time-varying delays and more importantly by changing the order in which packets are delivered. We show that such attack can destabilize a system if the controller was not designed to be robust with respect to an adversarial scheduling of messages. Although one can always store delayed messages in a buffer so as to present them to the control algorithm in the order they were sent and with a constant delay, such design is overly conservative. Instead, we design a controller that makes the best possible use of the received packets in a minimax sense. The proposed design has the same worst case performance as a controller based on a buffer but has better performance whenever there is no attack or the attacker does not play the optimal attack strategy.