Risk-based Security Measure Allocation Against Actuator Attacks

نویسندگان

چکیده

This article considers the problem of risk-optimal allocation security measures when actuators an uncertain control system are under attack. We consider adversary injecting false data into actuator channels. The attack impact is characterized by maximum performance loss caused a stealthy with bounded energy. Since random variable, due to uncertainty, we use Conditional Value-at-Risk (CVaR) characterize risk associated then allocating set minimize risk. assume that there only limited number available. Under this constraint, observe mixed-integer optimization problem. Thus relaxation techniques approximate Semi-Definite Program (SDP). also compare our method (i) across different measures: worst-case measure, average (nominal) and (ii) search algorithms: exhaustive greedy algorithms. depict efficacy approach through numerical examples.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Against Selective Opening Attacks

This survey will deal with the problem of selective opening attacks (SOA). We will present the known results (both possibility and impossibility ones) and the main open questions related to SOA. Despite the importance of this problem, many of the important questions were open until very recently and some important questions about the power of SOA are still open.

متن کامل

Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

متن کامل

An active security protocol against DoS attacks

Denial of Service (DoS ) attacks represent, in today's Internet, one of the most complex issues to address. A session is under a DoS attack if it cannot achieve its intended throughput due to the misbehavior of other sessions. Many research studies dealt with DoS, proposing models and/or architectures mostly based on an attack prevention approach. Prevention techniques lead to di erent models, ...

متن کامل

Security Against Impersonation Attacks in Distributed Systems

In a multi-agent system, transitioning from a centralized to a distributed decision-making strategy can introduce vulnerability to adversarial manipulation. We study the potential for adversarial manipulation in a class of graphical coordination games where the adversary can pose as a friendly agent in the game, thereby influencing the decision-making rules of a subset of agents. The adversary’...

متن کامل

Security of Quantum Cryptography against Collective Attacks

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE open journal of control systems

سال: 2023

ISSN: ['2694-085X']

DOI: https://doi.org/10.1109/ojcsys.2023.3305831