Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Kim, Jihan ko
dc.contributor.author Park, Gyunghoon ko
dc.contributor.author Shim, Hyungbo ko
dc.contributor.author Eun, Yongsoon ko
dc.date.accessioned 2019-10-16T13:41:11Z -
dc.date.available 2019-10-16T13:41:11Z -
dc.date.created 2019-09-22 -
dc.date.issued 2019-09 -
dc.identifier.citation IET Control Theory and Applications, v.13, no.14, pp.2300 - 2308 -
dc.identifier.issn 1751-8644 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/10806 -
dc.description.abstract This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences. © The Institution of Engineering and Technology 2019. -
dc.language English -
dc.publisher Institution of Engineering and Technology -
dc.title Masking attack for sampled-data systems via input redundancy -
dc.type Article -
dc.identifier.doi 10.1049/iet-cta.2018.6075 -
dc.identifier.wosid 000484962100016 -
dc.identifier.scopusid 2-s2.0-85072229790 -
dc.type.local Article(Overseas) -
dc.type.rims ART -
dc.description.journalClass 1 -
dc.contributor.nonIdAuthor Kim, Jihan -
dc.contributor.nonIdAuthor Park, Gyunghoon -
dc.contributor.nonIdAuthor Shim, Hyungbo -
dc.identifier.citationVolume 13 -
dc.identifier.citationNumber 14 -
dc.identifier.citationStartPage 2300 -
dc.identifier.citationEndPage 2308 -
dc.identifier.citationTitle IET Control Theory and Applications -
dc.type.journalArticle Article -
dc.description.isOpenAccess N -
dc.subject.keywordAuthor control system synthesis -
dc.subject.keywordAuthor sampled data systems -
dc.subject.keywordAuthor security of data -
dc.subject.keywordAuthor digital control -
dc.subject.keywordAuthor linear systems -
dc.subject.keywordAuthor discrete time systems -
dc.subject.keywordAuthor continuous time systems -
dc.subject.keywordAuthor masking attack -
dc.subject.keywordAuthor sampled-data system -
dc.subject.keywordAuthor input redundancy -
dc.subject.keywordAuthor cyber-physical systems -
dc.subject.keywordAuthor malicious attack -
dc.subject.keywordAuthor physical plant -
dc.subject.keywordAuthor continuous-time LTI system -
dc.subject.keywordAuthor digital controller -
dc.subject.keywordAuthor periodic sampling -
dc.subject.keywordAuthor discrete time instants -
dc.subject.keywordAuthor actuator attack -
dc.subject.keywordPlus SECURE CONTROL -
dc.subject.keywordPlus MULTIRATE -
dc.subject.keywordPlus DESIGN -
dc.contributor.affiliatedAuthor Eun, Yongsoon -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science DSC Lab(Dynamic Systems and Control Laboratory) 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE