eduzhai > Applied Sciences > Engineering >

Co-design for Security and Performance Geometric Tools

  • Save

... pages left unread,continue reading

Document pages: 16 pages

Abstract: When control systems are endowed with model-based anomaly detectors, thescale of what an attacker is able to accomplish is constrained if an attack isto remain stealthy to the detector. This paper develops a novel framework basedon geometric sums for computing precise ellipsoidal bounds on the set of statesreachable due to constrained stealthy attacks. We show that this approachprovides much more exact ellipsoidal bounds than alternative methods based onconvex optimization. The increased tightness of these bounds enables a thoroughinvestigation into the inherent trade-off between closed-loop performance(measured based on the $ |H | 2$ gain) and security (measured based on thereachable set of the attack) through the design of the controller and observergain matrices in estimate-based feedback on linear time-invariant controlsystems.

Please select stars to rate!


0 comments Sign in to leave a comment.

    Data loading, please wait...