File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

권철현

Kwon, Cheolhyeon
High Assurance Mobility Control Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Recursive reachable set computation for on-line safety assessment of the Cyber-Physical System against stealthy cyber attacks

Author(s)
Kwon, CheolhyeonHwang, Inseok
Issued Date
2017-09-27
DOI
10.1109/ALLERTON.2016.7852361
URI
https://scholarworks.unist.ac.kr/handle/201301/34916
Fulltext
https://ieeexplore.ieee.org/document/7852361
Citation
54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, pp.1123 - 1128
Abstract
With recent progress in networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of logical and physical processes. Since the conventional computer security techniques are unable to assure the underlying physical behavior against cyber attacks, this paper considers the safety of the compromised CPS from a controls domain perspective. Specifically, we propose an on-line algorithm to assess the safety of the CPS in the presence of stealthy cyber attacks which can be designed intelligently to avoid detection. The main idea is based on a reachability analysis that computes the reachable set of CPS states possibly reached by all potential stealthy cyber attacks. The reachable set computation typically demands a large computation cost and has mostly relied on the approximation techniques. However, our algorithm analytically derives the exact reachable set solution and further establishes a recursive computation structure that can perform in the real-time CPS operation. This significantly enhances the quality of the on-line safety assessment, enabling more reliable, less conservative, and computationally efficient process. The proposed algorithm is demonstrated with an illustrative example of an unmanned aircraft system (UAS) application.
Publisher
Institute of Electrical and Electronics Engineers
ISSN
0000-0000

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.