Risk-based Security Measure Allocation Against Actuator Attacks
نویسندگان
چکیده
This article considers the problem of risk-optimal allocation security measures when actuators an uncertain control system are under attack. We consider adversary injecting false data into actuator channels. The attack impact is characterized by maximum performance loss caused a stealthy with bounded energy. Since random variable, due to uncertainty, we use Conditional Value-at-Risk (CVaR) characterize risk associated then allocating set minimize risk. assume that there only limited number available. Under this constraint, observe mixed-integer optimization problem. Thus relaxation techniques approximate Semi-Definite Program (SDP). also compare our method (i) across different measures: worst-case measure, average (nominal) and (ii) search algorithms: exhaustive greedy algorithms. depict efficacy approach through numerical examples.
منابع مشابه
Security Against Selective Opening Attacks
This survey will deal with the problem of selective opening attacks (SOA). We will present the known results (both possibility and impossibility ones) and the main open questions related to SOA. Despite the importance of this problem, many of the important questions were open until very recently and some important questions about the power of SOA are still open.
متن کاملSecurity Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...
متن کاملAn active security protocol against DoS attacks
Denial of Service (DoS ) attacks represent, in today's Internet, one of the most complex issues to address. A session is under a DoS attack if it cannot achieve its intended throughput due to the misbehavior of other sessions. Many research studies dealt with DoS, proposing models and/or architectures mostly based on an attack prevention approach. Prevention techniques lead to di erent models, ...
متن کاملSecurity Against Impersonation Attacks in Distributed Systems
In a multi-agent system, transitioning from a centralized to a distributed decision-making strategy can introduce vulnerability to adversarial manipulation. We study the potential for adversarial manipulation in a class of graphical coordination games where the adversary can pose as a friendly agent in the game, thereby influencing the decision-making rules of a subset of agents. The adversary’...
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE open journal of control systems
سال: 2023
ISSN: ['2694-085X']
DOI: https://doi.org/10.1109/ojcsys.2023.3305831