Security Metrics and Tradeoff of Cyber-Physical Systems Subject to False Data Injection Attacks

Shiyong Zhu, Jie Chen*

*Corresponding author for this work

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

1 Citation (Scopus)

Abstract

This paper focuses on the vulnerable and stealthy regions of the intricate cyber attackers pertaining to state-of-the-art cyber-physical systems from the perspective of control-theoretic metrics. Using the minimum-energy attack signals and the L2-gain of output signals as vulnerability and stealthiness, respectively, these two predominant concerns of attackers and the corresponding vulnerable subspaces and stealthy subspaces are interpreted by the eigenvalues and eigenvectors of controllability Gramian matrix and observability Gramian matrix. It is also shown that the principal angles of these two subspaces indicate the tradeoff between the vulnerability and stealthiness of subspaces. A model of moving vehicles validates the effectiveness of theoretical results. © The Institution of Engineering & Technology 2023.
Original languageEnglish
Title of host publication3rd International Conference on Control Theory and Applications (ICoCTA 2023)
PublisherInstitution of Engineering and Technology
Pages141-145
ISBN (Electronic)978-1-83953-982-4
DOIs
Publication statusPublished - Oct 2023
Event3rd International Conference on Control Theory and Applications (ICoCTA 2023) - Xiamen, China
Duration: 20 Oct 202322 Oct 2023
https://www.icocta.org/his23

Publication series

NameIET Conference Proceedings
ISSN (Print)2732-4494

Conference

Conference3rd International Conference on Control Theory and Applications (ICoCTA 2023)
Country/TerritoryChina
CityXiamen
Period20/10/2322/10/23
Internet address

Funding

This research was supported in part by the Hong Kong RGC under Project CityU 11203321, CityU 11213322, and in part by City University of Hong Kong under Project 9380054.

Fingerprint

Dive into the research topics of 'Security Metrics and Tradeoff of Cyber-Physical Systems Subject to False Data Injection Attacks'. Together they form a unique fingerprint.

Cite this