Reference : An application of linear algebra theory in networked control systems: stochastic cybe...
Scientific journals : Article
Engineering, computing & technology : Electrical & electronics engineering
An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach
Li, Yumei [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Voos, Holger mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Engineering Research Unit > ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)]
Darouach, Mohamed [Universite de Lorraine, Longwy, France > Centre de la Recherche en Automatique de Nancy (CRAN)]
Hua, Changchun [Yanshan University, China > Institute of Electrical Engineering]
IMA Journal of Mathematical Control and Information
Oxford University Press
Structural methods for control of complex systems
Yes (verified by ORBilu)
United Kingdom
[en] cyber-attack detection ; multiple stochastic cyber-attacks ; stochastic DoS attack
[en] Based on the traditional linear algebra theory, this paper propose the attack detection schemes for networked control systems (NCSs) under single stochastic cyber-attack and multiple stochastic cyber-attacks aiming at multiple communication channels of NCSs, respectively. The focus is on designing an anomaly detector for NCSs under cyber-attacks. First, we construct a model of stochastic NCSs with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that NCSs are possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose the algebraic detection schemes for possible stochastic cyber-attacks. We transform the detector error dynamics into algebraic equations. By applying the presented approaches, residual information that is caused by different attacks is, respectively, obtained and anomalies on the control system are detected. In addition, suf´Čücient and necessary conditions guaranteeing the detectability of the stochastic cyber-attacks are obtained. The presented detection approaches in this paper are simple, straightforward and easy to implement. The aim of this work is to use traditional
mathematics tools to solve new problems that arise from the complex NCSs. Finally, two simulation examples are provided. The simulation results underline that the detection approaches are effective and feasible in practical application.
Fonds National de la Recherche - FnR
Researchers ; Professionals ; Students ; Others
FnR ; FNR1206050 > Holger Voos > SeSaNet > Integrated Security and Safety Engineering for Networked Control Systems > 15/06/2012 > 14/06/2015 > 2011

File(s) associated to this reference

Fulltext file(s):

Open access
IMA J Math Control Info-2015-Li-imamci-dnv026.pdfPublisher postprint585.98 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.