Reference : An application of linear algebra theory in networked control systems: stochastic cybe...
Scientific journals : Article
Engineering, computing & technology : Electrical & electronics engineering
http://hdl.handle.net/10993/21816
An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach
English
Li, Yumei [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Voos, Holger mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Engineering Research Unit > ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)]
Darouach, Mohamed [Universite de Lorraine, Longwy, France > Centre de la Recherche en Automatique de Nancy (CRAN)]
Hua, Changchun [Yanshan University, China > Institute of Electrical Engineering]
10-Jun-2015
IMA Journal of Mathematical Control and Information
Oxford University Press
Structural methods for control of complex systems
1-22
Yes (verified by ORBilu)
International
0265-0754
1471-6887
Oxford
United Kingdom
[en] cyber-attack detection ; multiple stochastic cyber-attacks ; stochastic DoS attack
[en] Based on the traditional linear algebra theory, this paper propose the attack detection schemes for networked control systems (NCSs) under single stochastic cyber-attack and multiple stochastic cyber-attacks aiming at multiple communication channels of NCSs, respectively. The focus is on designing an anomaly detector for NCSs under cyber-attacks. First, we construct a model of stochastic NCSs with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that NCSs are possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose the algebraic detection schemes for possible stochastic cyber-attacks. We transform the detector error dynamics into algebraic equations. By applying the presented approaches, residual information that is caused by different attacks is, respectively, obtained and anomalies on the control system are detected. In addition, suf´Čücient and necessary conditions guaranteeing the detectability of the stochastic cyber-attacks are obtained. The presented detection approaches in this paper are simple, straightforward and easy to implement. The aim of this work is to use traditional
mathematics tools to solve new problems that arise from the complex NCSs. Finally, two simulation examples are provided. The simulation results underline that the detection approaches are effective and feasible in practical application.
SnT
Fonds National de la Recherche - FnR
Researchers ; Professionals ; Students ; Others
http://hdl.handle.net/10993/21816
10.1093/imamci/dnv026
FnR ; FNR1206050 > Holger Voos > SeSaNet > Integrated Security and Safety Engineering for Networked Control Systems > 15/06/2012 > 14/06/2015 > 2011

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
IMA J Math Control Info-2015-Li-imamci-dnv026.pdfPublisher postprint585.98 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.