{"title":"针对虚假数据注入攻击的网络物理系统安全弹性控制的集合理论方法","authors":"Walter Lucia, B. Sinopoli, G. Franzé","doi":"10.1109/SOSCYPS.2016.7580002","DOIUrl":null,"url":null,"abstract":"In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":"{\"title\":\"A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks\",\"authors\":\"Walter Lucia, B. Sinopoli, G. Franzé\",\"doi\":\"10.1109/SOSCYPS.2016.7580002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.\",\"PeriodicalId\":422727,\"journal\":{\"name\":\"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"30\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOSCYPS.2016.7580002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOSCYPS.2016.7580002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.