Cited time in webofscience Cited time in scopus

Performance Limitation of UIO based Attack Detectors

Title
Performance Limitation of UIO based Attack Detectors
Alternative Title
UIO 기반 공격 탐지기 성능 한계 분석
Author(s)
YeeHee Han
DGIST Authors
YeeHee HanYongsoon EunYongjune Kim
Advisor
은용순
Co-Advisor(s)
Yongjune Kim
Issued Date
2023
Awarded Date
2023-02-01
Type
Thesis
Description
CPS vulnerability, attack detection, cyber-physical system, unknown input observer
Table Of Contents
1 Introduction 1
1.1 Background 1
1.2 Motivation 2
1.3 Problem Addressed 3
1.4 Existing Research 4
1.5 Contribution 5
1.6 Thesis Outline 5
2 Main Idea of Attack Detector 7
2.1 UIO based Actuator Attack Detector 7
2.2 Partial UIO based Actuator Attack Detector 9
3 Zero Dynamics Attacks on UIO based Actuator Attack Detector 11
3.1 Transmission Zero of System and Attack Detector 11
3.2 Zero Dynamics Attacks for System And Attack Detector 12
3.3 Numerical Example of Relationship between Z{J,S}, Z{J,UIO}, Z{J,pUIO} 13
3.3.1 Tennessee-Eastman Process 13
3.3.2 Toy example 17
4 Simulation 21
4.1 Tennessee-Eastman Process 21
4.1.1 ZDA on Tennessee-Eastman process model 23
4.1.2 ZDA on UIO based a ctuator attack detector of Tennessee-Eastman process model 25
4.2 Quadruple-Tank Process 27
4.2.1 ZDA on Quadruple-Tank Process 28
4.2.2 ZDA on UIO based actuator attack detector of Quadruple-Tank process 29
5 Discussion and Conclusion 55
URI
http://hdl.handle.net/20.500.11750/45766

http://dgist.dcollection.net/common/orgView/200000654926
DOI
10.22677/THESIS.200000654926
Degree
Master
Department
Department of Electrical Engineering and Computer Science
Publisher
DGIST
Related Researcher
  • 은용순 Eun, Yongsoon
  • Research Interests Resilient control systems; Control systems with nonlinear sensors and actuators; Quasi-linear control systems; Intelligent transportation systems; Networked control systems
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science Theses Master

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE