Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4999837 | Automatica | 2017 | 10 Pages |
Abstract
Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quantifies the performance degradation that an attacker that seeks to be undetected or stealthy can introduce.
Related Topics
Physical Sciences and Engineering
Engineering
Control and Systems Engineering
Authors
Cheng-Zong Bai, Fabio Pasqualetti, Vijay Gupta,