Protecting Positive and Second-Order Systems against Undetectable Attacks

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

5 Scopus Citations
View graph of relations

Author(s)

  • Jieqiang Wei
  • Wei Chen
  • Henrik Sandberg
  • Karl H. Johansson

Related Research Unit(s)

Detail(s)

Original languageEnglish
Pages (from-to)8373-8378
Journal / PublicationIFAC-PapersOnLine
Volume50
Issue number1
Publication statusPublished - Jul 2017

Abstract

Undetectable attacks in security studies of cyber-physical systems render the measurements of the system equal to a possible physical response. In this paper, we investigate defense strategies against the undetectable single-attack for positive systems and second-order systems, which both can be reinterpreted in terms of graphs with nodes and edges, while the undetectable attack is added through one of the nodes. We show that an arbitrary placement of a sensor prevents undetectable single-attack for these classes of systems. It is worth emphasising that we do not need to measure at the corrupted node to prevent the undetectable single-attack, but can measure at any node. The defense strategy is of a low complexity and can be readily implemented.

Research Area(s)

  • defense strategy, positive systems, second-order systems, sensor placement, Undetectable attacks

Citation Format(s)

Protecting Positive and Second-Order Systems against Undetectable Attacks. / Chen, Jianqi; Wei, Jieqiang; Chen, Wei et al.

In: IFAC-PapersOnLine, Vol. 50, No. 1, 07.2017, p. 8373-8378.

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review