Safety monitoring under stealthy sensor injection attacks using reachable sets

Cédric Escudero, Michelle S. Chong, Paolo Massioni, Eric Zamaï

Onderzoeksoutput: WerkdocumentPreprintAcademicpeer review

34 Downloads (Pure)

Samenvatting

Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation.
Originele taal-2Engels
UitgeverarXiv.org
Pagina's1-8
Aantal pagina's8
Volume2307.12715
DOI's
StatusGepubliceerd - 24 jul. 2023

Vingerafdruk

Duik in de onderzoeksthema's van 'Safety monitoring under stealthy sensor injection attacks using reachable sets'. Samen vormen ze een unieke vingerafdruk.

Citeer dit