journal article Jan 01, 2015

A secure control framework for resource-limited adversaries

Automatica Vol. 51 pp. 135-148 · Elsevier BV
View at Publisher Save 10.1016/j.automatica.2014.10.067
Topics

No keywords indexed for this article. Browse by subject →

References
41
[1]
Amin "Safe and secure networked control systems under denial-of-service attacks" (2009)
[2]
Amin "Stealthy deception attacks on water SCADA systems" (2010)
[3]
Bishop (2002)
[4]
Boyd (1994)
[5]
Cárdenas "Attacks against process control systems: risk assessment, detection, and response" (2011)
[6]
Cárdenas, A.A., Amin, S., & Sastry, S.S. (2008). Research challenges for the security of control systems. In Proc. 3rd USENIX workshop on hot topics in security, San Jose, CA, USA, July.
[7]
Chen (1999)
[8]
Ding (2008)
[9]
Esfahani, P., Vrakopoulou, M., Margellos, K., Lygeros, J., & Andersson, G. (2010). Cyber attack in a two-area power system: Impact identification using reachability. In American control conference, 2010, July (pp. 962–967). 10.1109/acc.2010.5530460
[10]
Falliere, N., Murchu, L., & Chien, E. (2011). W32.Stuxnet dossier, February.
[11]
Frank "Survey of robust residual generation and evaluation methods in observer-based fault detection systems" Journal of Process Control (1997) 10.1016/s0959-1524(97)00016-4
[12]
Giani, A., Sastry, S., Johansson, K.H., & Sandberg, H. (2009). The VIKING project: an initiative on resilient control of power networks. In Proc. 2nd int. symp. on resilient control systems, Idaho Falls, ID, USA, August. 10.1109/isrcs.2009.5251361
[13]
Gorman "Electricity grid in US penetrated by spies" The Wall Street Journal (2009)
[14]
Gupta, A., Langbort, C., & Başar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In Proc. of the 49th IEEE conf. on decision and control, Atlanta, GA, USA, December. 10.1109/cdc.2010.5717544
[15]
Hiriart-Urruty "Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints" Journal of Global Optimization (2001) 10.1023/a:1012752110010
[16]
Hwang "A survey of fault detection, isolation, and reconfiguration methods" IEEE Transactions on Control Systems Technology (2010) 10.1109/tcst.2009.2026285
[17]
Isermann (2006)
[18]
Isidori (1995)
[19]
Johansson "The quadruple-tank process: a multivariable laboratory process with an adjustable zero" IEEE Transactions on Control Systems Technology (2000) 10.1109/87.845876
[20]
Khanafer, A., Touri, B., & Başar, T. (2012). Consensus in the presence of an adversary. In Proc. 3rd IFAC workshop on estimation and control of networked systems, NecSys’12, Santa Barbara, CA, USA, September. 10.3182/20120914-2-us-4030.00065
[21]
Kosut, O., Jia, L., Thomas, R., & Tong, L. (2010). Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In Proceedings of the first IEEE international conference on smart grid communications, Gaithersburg, MD, USA, October. 10.1109/smartgrid.2010.5622045
[22]
Liu, Y., Reiter, M. K., & Ning, P. (2009). False data injection attacks against state estimation in electric power grids. In Proc. 16th ACM conf. on computer and communications security, Chicago, IL, USA, November. 10.1145/1653662.1653666
[23]
Mo, Y., & Sinopoli, B. (2009). Secure control against replay attack. In Proceedings of the 47th annual Allerton conference on communication, control, and computing, Allerton, IL, USA, October. 10.1109/allerton.2009.5394956
[24]
Mo, Y., & Sinopoli, B. (2012). Integrity attacks on cyber-physical systems. In Proc. 1st international conference on high confidence networked systems, CPSWeek 2012, Beijing, China (pp. 47–54). 10.1145/2185505.2185514
[25]
Pang "Design and implementation of secure networked predictive control systems under deception attacks" IEEE Transactions on Control Systems Technology (2012) 10.1109/tcst.2011.2160543
[26]
Pasqualetti, F., Dorfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: models, fundamental limitations and monitor design. In Proc. of the 50th IEEE conf. on decision and control and European control conference, Orlando, FL, USA, December. 10.1109/cdc.2011.6160641
[27]
Rid "Cyber war will not take place" Journal of Strategic Studies (2011) 10.1080/01402390.2011.608939
[28]
Sandberg, H., Teixeira, A., & Johansson, K.H. (2010). On security indices for state estimators in power networks. In Preprints of the first workshop on secure control systems, CPSWEEK 2010, Stockholm, Sweden, April.
[29]
To Zero or to Hold Control Inputs With Lossy Links?

L. Schenato

IEEE Transactions on Automatic Control 2009 10.1109/tac.2008.2010999
[30]
Schenato "Foundations of control and estimation over lossy networks" Proceedings of the IEEE (2007) 10.1109/jproc.2006.887306
[31]
Smith, R. (2011). A decoupled feedback structure for covertly appropriating networked control systems. In Proc. of the 18th IFAC world congress, Milano, Italy, August–September. 10.3182/20110828-6-it-1002.01721
[32]
Cyber–Physical System Security for the Electric Power Grid

Siddharth Sridhar, Adam Hahn, Manimaran Govindarasu

Proceedings of the IEEE 2012 10.1109/jproc.2011.2165269
[33]
Sundaram "A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks" Automatica (2012) 10.1016/j.automatica.2012.06.072
[34]
Teixeira, A., Dán, G., Sandberg, H., & Johansson, K.H. (2011). Cyber security study of a SCADA energy management system: stealthy deception attacks on the state estimator. In Proc. of the 18th IFAC world congress, Milano, Italy, August–September. 10.3182/20110828-6-it-1002.02210
[35]
Teixeira, A., Pérez, D., Sandberg, H., & Johansson, K. H. (2012). Attack models and scenarios for networked control systems. In Proc. 1st international conference on high confidence networked systems, CPSWeek 2012, Beijing, China. 10.1145/2185505.2185515
[36]
Teixeira, A., Sandberg, H., Dán, G., & Johansson, K. H. (2012). Optimal power flow: closing the loop over corrupted data. In Proc. American control conference, Montreal, Canada, June. 10.1109/acc.2012.6315557
[37]
Teixeira, A., Shames, I., Sandberg, H., & Johansson, K. H. (2012). Revealing stealthy attacks in control systems. In Proceedings of the 50th annual Allerton conference on communication, control, and computing, Allerton, IL, USA, October. 10.1109/allerton.2012.6483441
[38]
Xie, L., Mo, Y., & Sinopoli, B. (2010). False data injection attacks in electricity markets. In Proceedings of the first IEEE international conference on smart grid communications, Gaithersburg, MD, USA, October. 10.1109/smartgrid.2010.5622048
[39]
Zhang "Stability of networked control systems" IEEE Control Systems Magazine (2001) 10.1109/37.898794
[40]
Zhang "A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems" IEEE Transactions on Automatic Control (2002) 10.1109/9.995036
[41]
Zhou (1996)
Cited By
1,062
IEEE Internet of Things Journal
IEEE Transactions on Control of Net...
IEEE Transactions on Cybernetics
IEEE Transactions on Automatic Cont...
Metrics
1,062
Citations
41
References
Details
Published
Jan 01, 2015
Vol/Issue
51
Pages
135-148
License
View
Funding
Swedish Research council Award: 2009-4565
European Union Seventh Framework Programme Award: 608224
Knut and Alice Wallenberg Foundation
Cite This Article
Andre Teixeira, Iman Shames, Henrik Sandberg, et al. (2015). A secure control framework for resource-limited adversaries. Automatica, 51, 135-148. https://doi.org/10.1016/j.automatica.2014.10.067
Related

You May Also Like

Constrained model predictive control: Stability and optimality

D.Q. Mayne, J.B. Rawlings · 2000

7,004 citations

Modeling by shortest data description

J. Rissanen · 1978

4,154 citations

Model predictive control: Theory and practice—A survey

Carlos E. García, David M. Prett · 1989

2,874 citations