Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Quantifying Cyber-Security for Networked Control Systems
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
Chalmers University of Technology and University of Gothenburg,. (Mathematical Sciences)
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering (EES), Automatic Control.ORCID iD: 0000-0001-9940-5929
2013 (English)In: Control of Cyber-Physical Systems: Workshop held at Johns Hopkins University, March 2013 / [ed] Danielle C. Tarraf, Switzerland: Springer International Publishing , 2013, 123-142 p.Chapter in book (Refereed)
Abstract [en]

In this paper we consider a typical architecture for a networked control system under false-data injection attacks. Under a previously proposed adversary modeling framework, various formulations for quantifying cyber-security of control systems are proposed and formulated as constrained optimization problems. These formulations capture trade-offs in terms of attack impact on the control performance, attack detectability, and adversarial resources. The formulations are then discussed and related to system theoretic concepts, followed by numerical examples illustrating the various trade-offs for a quadruple-tank process.

Place, publisher, year, edition, pages
Switzerland: Springer International Publishing , 2013. 123-142 p.
Series
Lecture Notes in Control and Information Sciences, ISSN 0170-8643 ; 449
Keyword [en]
Cyber Security, Networked Control Systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-127546DOI: 10.1007/978-3-319-01159-2_7Scopus ID: 2-s2.0-84904613587ISBN: 978-3-319-01158-5 (print)OAI: oai:DiVA.org:kth-127546DiVA: diva2:644671
Funder
Knut and Alice Wallenberg FoundationSwedish Research Council, 2009-4565Swedish Research Council, 2007-6350
Note

QC 20130916

Available from: 2013-09-01 Created: 2013-09-01 Last updated: 2013-09-16Bibliographically approved

Open Access in DiVA

tssj_CCPS_2013(236 kB)280 downloads
File information
File name FULLTEXT01.pdfFile size 236 kBChecksum SHA-512
93324de651ce75b9fa02a0db434ed85f4fbe2bd98d13d5390e3d3a2b4635df93fc26162073b36c2817733596e670a3dac7a5eafef3b0b0a94a55216dd80e0659
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusThe final publication is available at www.springerlink.com

Search in DiVA

By author/editor
Teixeira, AndréSandberg, HenrikJohansson, Karl H.
By organisation
Automatic ControlACCESS Linnaeus Centre
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 280 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 184 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf