There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.conferencePlace | US | - |
dc.citation.conferencePlace | Allerton HouseMonticello | - |
dc.citation.endPage | 1128 | - |
dc.citation.startPage | 1123 | - |
dc.citation.title | 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016 | - |
dc.contributor.author | Kwon, Cheolhyeon | - |
dc.contributor.author | Hwang, Inseok | - |
dc.date.accessioned | 2023-12-19T18:09:59Z | - |
dc.date.available | 2023-12-19T18:09:59Z | - |
dc.date.created | 2019-07-25 | - |
dc.date.issued | 2017-09-27 | - |
dc.description.abstract | With recent progress in networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of logical and physical processes. Since the conventional computer security techniques are unable to assure the underlying physical behavior against cyber attacks, this paper considers the safety of the compromised CPS from a controls domain perspective. Specifically, we propose an on-line algorithm to assess the safety of the CPS in the presence of stealthy cyber attacks which can be designed intelligently to avoid detection. The main idea is based on a reachability analysis that computes the reachable set of CPS states possibly reached by all potential stealthy cyber attacks. The reachable set computation typically demands a large computation cost and has mostly relied on the approximation techniques. However, our algorithm analytically derives the exact reachable set solution and further establishes a recursive computation structure that can perform in the real-time CPS operation. This significantly enhances the quality of the on-line safety assessment, enabling more reliable, less conservative, and computationally efficient process. The proposed algorithm is demonstrated with an illustrative example of an unmanned aircraft system (UAS) application. | - |
dc.identifier.bibliographicCitation | 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, pp.1123 - 1128 | - |
dc.identifier.doi | 10.1109/ALLERTON.2016.7852361 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.scopusid | 2-s2.0-85015245835 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/34916 | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/7852361 | - |
dc.language | 영어 | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | Recursive reachable set computation for on-line safety assessment of the Cyber-Physical System against stealthy cyber attacks | - |
dc.type | Conference Paper | - |
dc.date.conferenceDate | 2016-09-27 | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.