Scenario-based defense mechanism against vulnerabilities in Lagrange-based DMPC
نویسندگان
چکیده
In this paper, we present an analysis of the vulnerability a distributed model predictive control (DMPC) scheme in context cyber-security. We consider different types so-called insider attacks. particular, situation where one local controllers sends false information to others manipulate costs for its own advantage. Then, propose popular scenario-based mechanism protect or, at least, relieve consequences attack typical DMPC negotiation process. The theoretical and algorithmic properties defense are also analyzed. A real case study based on four tank plant is provided illustrate both attacks mechanisms.
منابع مشابه
Prediction of defense mechanism styles based on executive functions
Combining psychoanalysis and neurology feels peculiar at first. The combination that tries to bind concepts of psychoanalysis with neuroscience in order to provide integrates knowledge for better understanding of human mind. However, interaction between psychoanalysis and neuroscience has came to attention during past three decades. Purpose of this study is to investigate and find correlation b...
متن کاملRICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bugs, a popular avenue of attack and frequent programming error [1–15], occur when a variable value goes out of the range of the machine word used to materialize it, e.g. when assigning a large 32-bit int to a 16-bit short...
متن کاملViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s web server and it does not require installation of any tool or storage of any data, such as keys or history l...
متن کاملA Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...
متن کاملLocation Verification Based Defense Against Sybil Attack in Sensor Networks
Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols including...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Control Engineering Practice
سال: 2021
ISSN: ['1873-6939', '0967-0661']
DOI: https://doi.org/10.1016/j.conengprac.2021.104879