Cited 0 time in
Cited 1 time in
A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems
- A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems
- Weerakkody, Sean; Liu, Xiaofei; Son, Sang Hyuk; Sinopoli, Bruno
- DGIST Authors
- Son, Sang Hyuk
- Issue Date
- IEEE Transactions on Control of Network Systems, 4(1), 60-70
- Article Type
- Control Systems; Cyber Physical Systems (CPSs); Cyberphysical Systems; Data Acquisition; Detection of Attacks; Detectors; Detectors; Distributed Control Systems; Distributed Parameter Control Systems; Embedded Systems; Graph Theory; Heterogeneous Component; Independent Agents; Multi Agent Systems; Multiagent Systems; Network Design; Network Design; Network Security; Optimization; Optimization Problems; Polynomial Approximation; Robustness; Robustness (Control Systems); Scada Systems; Security; Separators; Supervisory Control and Data Acquisition (SCADA) Systems; Supervisory Control and Data Acquisition (SCADA) Systems
- This paper considers secure design in distributed control systems to ensure the detection of stealthy integrity attacks. Distributed control systems consist of many heterogeneous components, such as sensors, controllers, and actuators and may contain several independent agents. The presence of many components and agents in a system increases the attack surfaces for potential adversaries, making distributed control systems vulnerable to malicious behavior. The goal of this paper is to consider the design of distributed control systems to ensure the deterministic detection of attacks. To do this, we leverage existing results which relate the deterministic detection of a fixed set of malicious nodes to structural left invertibility. We extend the notion of structural left invertibility to consider attacks from all possible sets of malicious nodes using vertex separators. Vertex separators are then used to solve optimization problems which aim to minimize communication networks while also ensuring that a resource limited adversary cannot generate perfect attacks. Optimal bounds on communication and sensing are obtained and polynomial time design algorithms are provided. © 2016 IEEE.
- Institute of Electrical and Electronics Engineers Inc.
- Related Researcher
Son, Sang Hyuk
RTCPS(Real-Time Cyber-Physical Systems Research) Lab
There are no files associated with this item.
- ETC1. Journal Articles
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.