Input design for active detection of integrity attacks using set-based approach

dc.contributor
Universitat Politècnica de Catalunya. Doctorat en Automàtica, Robòtica i Visió
dc.contributor
Universitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial
dc.contributor
Universitat Politècnica de Catalunya. SAC - Sistemes Avançats de Control
dc.contributor.author
Trapiello Fernández, Carlos
dc.contributor.author
Puig Cayuela, Vicenç
dc.date.issued
2020
dc.identifier
Trapiello, C.; Puig, V. Input design for active detection of integrity attacks using set-based approach. A: World Congress of the International Federation of Automatic Control. "21th World Congress of the International Federation of Automatic Control". 2020, p. 11094-11099. DOI 10.1016/j.ifacol.2020.12.254.
dc.identifier
https://hdl.handle.net/2117/347380
dc.identifier
10.1016/j.ifacol.2020.12.254
dc.description.abstract
© 2020. The Authors
dc.description.abstract
This paper presents the design of an input sequence in order to actively guarantee detectabilityof integrity attacks. The design of the input sequence is formulated as an optimization problemwhere the performance degradation imposed in the protected system is minimized whileguaranteeing attack detectability by separating the reachable sets of the system in healthyand attacked operation. By considering uncertainties bounded by zonotopes, the design of anoptimal open-loop input sequence such that guarantee the separability of the reachable zonotopicsets can be computed by solving a Mixed Integer Quadratic Program (MIQP). Following thisapproach, attack detection can be guaranteed by: I) forcing a distinct behavior of the systemoutputs; II) ensuring that residuals under attack will exit the healthy residual set. Furthermore,the present work also considers the imposition of residuals detectability for the specific replayattack scenario affecting an state estimate control system. The effectiveness of the proposals isvalidated in simulation by means of a numerical example.
dc.description.abstract
This work has been partially funded by AGAUR ACCIO RIS3CAT UTILITIES 4.0 – P7 SECUTIL
dc.description.abstract
Peer Reviewed
dc.description.abstract
Postprint (author's final draft)
dc.format
6 p.
dc.format
application/pdf
dc.language
eng
dc.relation
https://www.sciencedirect.com/science/article/pii/S2405896320305310
dc.relation
info:eu-repo/grantAgreement/ACCIO/RIS3CAT/SECUTIL
dc.rights
http://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.rights
Open Access
dc.rights
Attribution-NonCommercial-NoDerivs 3.0 Spain
dc.subject
Àrees temàtiques de la UPC::Informàtica::Automàtica i control
dc.subject
Attack detection
dc.subject
Classificació INSPEC::Automation
dc.title
Input design for active detection of integrity attacks using set-based approach
dc.type
Conference report


Fitxers en aquest element

FitxersGrandàriaFormatVisualització

No hi ha fitxers associats a aquest element.

Aquest element apareix en la col·lecció o col·leccions següent(s)

E-prints [72954]