Input Design for Active Dectection of Integrity Attacks using Set-based Approach
Autor: | Vicenç Puig, Carlos Trapiello |
---|---|
Přispěvatelé: | Universitat Politècnica de Catalunya. Doctorat en Automàtica, Robòtica i Visió, Universitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial, Universitat Politècnica de Catalunya. SAC - Sistemes Avançats de Control |
Rok vydání: | 2020 |
Předmět: |
0209 industrial biotechnology
Sequence Forcing (recursion theory) Optimization problem Informàtica::Automàtica i control [Àrees temàtiques de la UPC] Computer science Attack detection 020208 electrical & electronic engineering 02 engineering and technology Residual Set (abstract data type) 020901 industrial engineering & automation Control and Systems Engineering Control theory Bounded function 0202 electrical engineering electronic engineering information engineering Automation [Classificació INSPEC] Quadratic programming Replay attack |
Zdroj: | UPCommons. Portal del coneixement obert de la UPC Universitat Politècnica de Catalunya (UPC) Digital.CSIC. Repositorio Institucional del CSIC instname |
ISSN: | 2405-8963 |
DOI: | 10.1016/j.ifacol.2020.12.254 |
Popis: | Trabajo presentado en el 21st IFAC World Congress, celebrado de forma virtual del 11 al 17 de julio de 2020 This paper presents the design of an input sequence in order to actively guarantee detectability of integrity attacks. The design of the input sequence is formulated as an optimization problem where the performance degradation imposed in the protected system is minimized while guaranteeing attack detectability by separating the reachable sets of the system in healthy and attacked operation. By considering uncertainties bounded by zonotopes, the design of an optimal open-loop input sequence such that guarantee the separability of the reachable zonotopic sets can be computed by solving a Mixed Integer Quadratic Program (MIQP). Following this approach, attack detection can be guaranteed by: I) forcing a distinct behavior of the system outputs; II) ensuring that residuals under attack will exit the healthy residual set. Furthermore, the present work also considers the imposition of residuals detectability for the specific replay attack scenario affecting an state estimate control system. The effectiveness of the proposals is validated in simulation by means of a numerical example. |
Databáze: | OpenAIRE |
Externí odkaz: |