메뉴 건너뛰기




Volumn 35, Issue 1, 2015, Pages 110-127

Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; COMPUTER WORMS; CRITICAL INFRASTRUCTURES; EMBEDDED SYSTEMS; MANUFACTURE; OUTAGES; PUBLIC WORKS; SECURE COMMUNICATION; SENSOR NETWORKS; WATER DISTRIBUTION SYSTEMS;

EID: 84921502597     PISSN: 1066033X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCS.2014.2364725     Document Type: Article
Times cited : (349)

References (57)
  • 2
    • 77950343228 scopus 로고    scopus 로고
    • The day the samba stopped
    • Mar. 06-26
    • J. P. Conti, "The day the samba stopped," Eng. Technol., vol. 5, no. 4, pp. 46-47, Mar. 06-26, 2010
    • (2010) Eng. Technol. , vol.5 , Issue.4 , pp. 46-47
    • Conti, J.P.1
  • 3
    • 11044238440 scopus 로고    scopus 로고
    • SQL Slammer worm lessons learned for consideration by the electricity sector
    • Atlanta, GA, Tech. Rep.
    • S. Kuvshinkova, "SQL Slammer worm lessons learned for consideration by the electricity sector," North Amer. Elec. Reliab. Council, Atlanta, GA, Tech. Rep., 2003
    • (2003) North Amer. Elec. Reliab. Council
    • Kuvshinkova, S.1
  • 4
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 5
    • 46749138780 scopus 로고    scopus 로고
    • Hackers vs slackers
    • G. Richards, "Hackers vs slackers," Eng. Technol., vol. 3, no. 19, pp. 40-43, 2008
    • (2008) Eng. Technol. , vol.3 , Issue.19 , pp. 40-43
    • Richards, G.1
  • 6
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid networks
    • A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, 2010
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 10
    • 84893372666 scopus 로고    scopus 로고
    • Timing of cyber conflict
    • R. Axelrod and R. Iliev, "Timing of cyber conflict," Proc. Natl. Acad. Sci., vol. 111, no. 4, pp. 1298-1303, 2014
    • (2014) Proc. Natl. Acad. Sci. , vol.111 , Issue.4 , pp. 1298-1303
    • Axelrod, R.1    Iliev, R.2
  • 11
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • Apr.
    • S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Proc. Hybrid Systems: Computation Control, Apr. 2009, vol. 5469, pp. 31-45
    • (2009) Proc. Hybrid Systems: Computation Control , vol.5469 , pp. 31-45
    • Amin, S.1    Cárdenas, A.2    Sastry, S.3
  • 12
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Chicago, IL, Nov.
    • Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in Proc. ACM Conf. Computer Communications Security, Chicago, IL, Nov. 2009, pp. 21-32
    • (2009) Proc. ACM Conf. Computer Communications Security , pp. 21-32
    • Liu, Y.1    Reiter, M.K.2    Ning, P.3
  • 15
    • 84890076504 scopus 로고    scopus 로고
    • On analysis and design of stealthresilient control systems
    • San Francisco, CA, Aug.
    • S. D. Bopardikar and A. Speranzon, "On analysis and design of stealthresilient control systems," in Proc. Int. Symp. Resilient Control Systems, San Francisco, CA, Aug. 2013, pp. 48-53
    • (2013) Proc. Int. Symp. Resilient Control Systems , pp. 48-53
    • Bopardikar, S.D.1    Speranzon, A.2
  • 16
    • 84897707918 scopus 로고    scopus 로고
    • Monitoring of stealthy attack in networked control systems
    • Nice, France, Oct.
    • J. Y. Keller and D. Sauter, "Monitoring of stealthy attack in networked control systems," in Proc. Conf. Control Fault-Tolerant Systems, Nice, France, Oct. 2013, pp. 462-467
    • (2013) Proc. Conf. Control Fault-Tolerant Systems , pp. 462-467
    • Keller, J.Y.1    Sauter, D.2
  • 19
    • 84866745498 scopus 로고    scopus 로고
    • A decoupled feedback structure for covertly appropriating network control systems
    • Milan, Italy aug.
    • R. Smith, "A decoupled feedback structure for covertly appropriating network control systems," in Proc. Int. Federation Automatic Control World Congr., Milan, Italy, Aug. 2011, pp. 90-95
    • (2011) Proc. Int. Federation Automatic Control World Congr , pp. 90-95
    • Smith, R.1
  • 20
    • 80053166327 scopus 로고    scopus 로고
    • Stackelberg-game analysis of correlated attacks in cyber-physical systems
    • San Francisco, CA, July
    • M. Zhu and S. Martínez, "Stackelberg-game analysis of correlated attacks in cyber-physical systems," in Proc. American Control Conf., San Francisco, CA, July 2011, pp. 4063-4068
    • (2011) Proc. American Control Conf , pp. 4063-4068
    • Zhu, M.1    Martínez, S.2
  • 21
    • 84901474949 scopus 로고    scopus 로고
    • Secure estimation and control for cyber-physical systems under adversarial attacks
    • H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks," IEEE Trans. Autom. Contr., vol. 59, no. 6, pp. 1454-1467, 2014
    • (2014) IEEE Trans. Autom. Contr. , vol.59 , Issue.6 , pp. 1454-1467
    • Fawzi, H.1    Tabuada, P.2    Diggavi, S.3
  • 22
  • 23
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • Gaithersburg, MD oct.
    • G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Communications, Gaithersburg, MD, Oct. 2010, pp. 214-219
    • (2010) Proc. IEEE Int. Conf. Smart Grid Communications , pp. 214-219
    • Dan, G.1    Sandberg, H.2
  • 24
    • 84860692605 scopus 로고    scopus 로고
    • Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
    • Orlando, FL, Dec.
    • F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," in Proc. IEEE Conf. Decision Control European Control Conf., Orlando, FL, Dec. 2011, pp. 2195-2201
    • (2011) Proc. IEEE Conf. Decision Control European Control Conf , pp. 2195-2201
    • Pasqualetti, F.1    Dörfler, F.2    Bullo, F.3
  • 25
    • 82155185205 scopus 로고    scopus 로고
    • Distributed internet-based load altering attacks against smart power grids
    • A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, 2011
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.-H.1    Leon-Garcia, A.2
  • 26
    • 84874173102 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 99, no. 1, pp. 1-15, 2012
    • (2012) Proc. IEEE , vol.99 , Issue.1 , pp. 1-15
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 28
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Contr., vol. 56, no. 7, pp. 1495-1508, 2011
    • (2011) IEEE Trans. Autom. Contr. , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.2
  • 29
    • 84855392746 scopus 로고    scopus 로고
    • Consensus computation in unreliable networks: A system theoretic approach
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Trans. Autom. Contr., vol. 57, no. 1, pp. 90-104, 2012
    • (2012) IEEE Trans. Autom. Contr. , vol.57 , Issue.1 , pp. 90-104
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 30
    • 84855384074 scopus 로고    scopus 로고
    • On distributed convex optimization under inequality and equality constraints
    • M. Zhu and S. Martínez, "On distributed convex optimization under inequality and equality constraints," IEEE Trans. Autom. Contr., vol. 57, no. 1, pp. 151-164, 2012
    • (2012) IEEE Trans. Autom. Contr. , vol.57 , Issue.1 , pp. 151-164
    • Zhu, M.1    Martínez, S.2
  • 32
    • 78049296486 scopus 로고    scopus 로고
    • A fault diagnosis and security framework for water systems
    • D. G. Eliades and M. M. Polycarpou, "A fault diagnosis and security framework for water systems," IEEE Trans. Control Syst. Technol., vol. 18, no. 6, pp. 1254-1265, 2010
    • (2010) IEEE Trans. Control Syst. Technol. , vol.18 , Issue.6 , pp. 1254-1265
    • Eliades, D.G.1    Polycarpou, M.M.2
  • 34
    • 84887278643 scopus 로고    scopus 로고
    • Attack detection and identification in cyber-physical systems
    • F. Pasqualetti, F. Dörfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Contr., vol. 58, no. 11, pp. 2715-2729, 2013
    • (2013) IEEE Trans. Autom. Contr. , vol.58 , Issue.11 , pp. 2715-2729
    • Pasqualetti, F.1    Dörfler, F.2    Bullo, F.3
  • 35
    • 0040761805 scopus 로고
    • Invariant subspaces and invertibility properties for singular systems: The general case
    • Apr.
    • T. Geerts, "Invariant subspaces and invertibility properties for singular systems: The general case," Linear Algebra Applicat., vol. 183, pp. 61-88, Apr. 1993
    • (1993) Linear Algebra Applicat. , vol.183 , pp. 61-88
    • Geerts, T.1
  • 41
    • 0038516887 scopus 로고    scopus 로고
    • Generic properties and control of linear structured systems: A survey
    • J. M. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: A survey," Automatica, vol. 39, no. 7, pp. 1125-1144, 2003
    • (2003) Automatica , vol.39 , Issue.7 , pp. 1125-1144
    • Dion, J.M.1    Commault, C.2    Woude Der J.Van3
  • 43
    • 84874233151 scopus 로고    scopus 로고
    • Cyber-physical security via geometric control: Distributed monitoring and malicious attacks
    • Maui, HI, Dec.
    • F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical security via geometric control: Distributed monitoring and malicious attacks," in Proc. IEEE Conf. Decision Control, Maui, HI, Dec. 2012, pp. 3418-3425
    • (2012) Proc. IEEE Conf. Decision Control , pp. 3418-3425
    • Pasqualetti, F.1    Dörfler, F.2    Bullo, F.3
  • 44
    • 84887295094 scopus 로고    scopus 로고
    • Continuous-time distributed observers with discrete communication
    • F. Dörfler, F. Pasqualetti, and F. Bullo, "Continuous-time distributed observers with discrete communication," IEEE J. Sel. Topics Signal Processing, vol. 7, no. 2, pp. 296-304, 2013
    • (2013) IEEE J. Sel. Topics Signal Processing , vol.7 , Issue.2 , pp. 296-304
    • Dörfler, F.1    Pasqualetti, F.2    Bullo, F.3
  • 45
    • 0026107664 scopus 로고
    • An application of Prony methods in PSS design for multimachine systems
    • D. J. Trudnowski, J. R. Smith, T. A. Short, and D. A. Pierre, "An application of Prony methods in PSS design for multimachine systems," IEEE Trans. Power Syst., vol. 6, no. 1, pp. 118-126, 1991
    • (1991) IEEE Trans. Power Syst. , vol.6 , Issue.1 , pp. 118-126
    • Trudnowski, D.J.1    Smith, J.R.2    Short, T.A.3    Pierre, D.A.4
  • 47
    • 80053157963 scopus 로고    scopus 로고
    • A graph-theoretical characterization of power network vulnerabilities
    • San Francisco, CA, June
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in Proc. American Control Conf., San Francisco, CA, June 2011, pp. 3918-3923
    • (2011) Proc. American Control Conf , pp. 3918-3923
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 51
    • 60549094984 scopus 로고    scopus 로고
    • Optimization models for operative planning in drinking water networks
    • J. Burgschweiger, B. Gnädig, and M. C. Steinbach, "Optimization models for operative planning in drinking water networks," Optim. Eng., vol. 10, no. 1, pp. 43-73, 2009
    • (2009) Optim. Eng. , vol.10 , Issue.1 , pp. 43-73
    • Burgschweiger, J.1    Gnädig, B.2    Steinbach, M.C.3
  • 54
    • 84871944240 scopus 로고    scopus 로고
    • False data injection attacks in control systems
    • Stockholm, Sweden apr.
    • Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in Proc. 1st Workshop Secure Control Systems, Stockholm, Sweden, Apr. 2010
    • (2010) Proc. 1st Workshop Secure Control Systems
    • Mo, Y.1    Sinopoli, B.2
  • 56
    • 0026679548 scopus 로고
    • A tutorial on the geometric analysis of linear time-invariant implicit systems
    • F. L. Lewis, "A tutorial on the geometric analysis of linear time-invariant implicit systems," Automatica, vol. 28, no. 1, pp. 119-137, 1992
    • (1992) Automatica , vol.28 , Issue.1 , pp. 119-137
    • Lewis, F.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.