Full metadata record

DC Field Value Language
dc.contributor.authorKim, Jihanko
dc.contributor.authorPark, Gyunghoonko
dc.contributor.authorShim, Hyungboko
dc.contributor.authorEun, Yongsoonko
dc.date.accessioned2018-01-25T01:17:05Z-
dc.date.available2018-01-25T01:17:05Z-
dc.date.created2017-05-08-
dc.date.issued2016-
dc.identifier.citation55th IEEE Conference on Decision and Control, CDC 2016, pp.5956 - 5961-
dc.identifier.isbn9780000000000-
dc.identifier.urihttp://hdl.handle.net/20.500.11750/5451-
dc.description.abstractIn this paper, we introduce a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical system, that is modeled as a continuous-time LTI system, is controlled by a digital controller, i.e., the output is measured only at discrete sensing times. Since the anomaly detector monitors the output signal, nothing abnormal can be detected through the output if the output looks normal at sensing times. This implies that if an (actuator) attack drives the internal states passing through the kernel of the output matrix at each sensing time, then the attack compromises the system while it remains stealthy. We show that this type of attack is feasible when the control system uses multi-rate sampling, and the sampling rate for input signal is higher than that for output measurements. Simulation results for the X-38 vehicle illustrate this new attack strategy possibly brings disastrous consequences. © 2016 IEEE.-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleZero-stealthy attack for sampled-data control systems: The case of faster actuation than sensing-
dc.typeConference-
dc.identifier.doi10.1109/CDC.2016.7799183-
dc.identifier.scopusid2-s2.0-85010809720-
dc.type.rimsCONF-
dc.contributor.localauthorEun, Yongsoon-
dc.contributor.nonIdAuthorKim, Jihan-
dc.contributor.nonIdAuthorPark, Gyunghoon-
dc.contributor.nonIdAuthorShim, Hyungbo-
dc.identifier.citationStartPage5956-
dc.identifier.citationEndPage5961-
dc.identifier.citationTitle55th IEEE Conference on Decision and Control, CDC 2016-
dc.type.journalArticleConference Paper-
dc.identifier.conferencecountryUS-


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE