Safety monitoring under stealthy sensor injection attacks using reachable sets

Cédric Escudero, Michelle S. Chong, Paolo Massioni, Eric Zamaï

Research output: Working paperPreprintAcademicpeer-review

19 Downloads (Pure)

Abstract

Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation.
Original languageEnglish
PublisherarXiv.org
Pages1-8
Number of pages8
Volume2307.12715
DOIs
Publication statusPublished - 24 Jul 2023

Fingerprint

Dive into the research topics of 'Safety monitoring under stealthy sensor injection attacks using reachable sets'. Together they form a unique fingerprint.

Cite this