WEB OF SCIENCE
SCOPUS
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Weerakkody, Sean | - |
| dc.contributor.author | Liu, Xiaofei | - |
| dc.contributor.author | Son, Sang Hyuk | - |
| dc.contributor.author | Sinopoli, Bruno | - |
| dc.date.available | 2017-08-10T08:21:01Z | - |
| dc.date.created | 2017-08-09 | - |
| dc.date.issued | 2017-03 | - |
| dc.identifier.issn | 2325-5870 | - |
| dc.identifier.uri | http://hdl.handle.net/20.500.11750/4290 | - |
| dc.description.abstract | This paper considers secure design in distributed control systems to ensure the detection of stealthy integrity attacks. Distributed control systems consist of many heterogeneous components, such as sensors, controllers, and actuators and may contain several independent agents. The presence of many components and agents in a system increases the attack surfaces for potential adversaries, making distributed control systems vulnerable to malicious behavior. The goal of this paper is to consider the design of distributed control systems to ensure the deterministic detection of attacks. To do this, we leverage existing results which relate the deterministic detection of a fixed set of malicious nodes to structural left invertibility. We extend the notion of structural left invertibility to consider attacks from all possible sets of malicious nodes using vertex separators. Vertex separators are then used to solve optimization problems which aim to minimize communication networks while also ensuring that a resource limited adversary cannot generate perfect attacks. Optimal bounds on communication and sensing are obtained and polynomial time design algorithms are provided. © 2016 IEEE. | - |
| dc.language | English | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1109/TCNS.2016.2573741 | - |
| dc.identifier.scopusid | 2-s2.0-85016283644 | - |
| dc.identifier.bibliographicCitation | Weerakkody, Sean. (2017-03). A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems. IEEE Transactions on Control of Network Systems, 4(1), 60–70. doi: 10.1109/TCNS.2016.2573741 | - |
| dc.description.isOpenAccess | TRUE | - |
| dc.subject.keywordAuthor | Cyberphysical systems | - |
| dc.subject.keywordAuthor | detectors | - |
| dc.subject.keywordAuthor | distributed control systems | - |
| dc.subject.keywordAuthor | multiagent systems | - |
| dc.subject.keywordAuthor | network design | - |
| dc.subject.keywordAuthor | robustness | - |
| dc.subject.keywordAuthor | security | - |
| dc.subject.keywordAuthor | supervisory control and data-acquisition (SCADA) systems | - |
| dc.subject.keywordPlus | SENSOR NETWORKS | - |
| dc.subject.keywordPlus | ATTACKS | - |
| dc.citation.endPage | 70 | - |
| dc.citation.number | 1 | - |
| dc.citation.startPage | 60 | - |
| dc.citation.title | IEEE Transactions on Control of Network Systems | - |
| dc.citation.volume | 4 | - |
Department of Information and Communication Engineering