File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

권철현

Kwon, Cheolhyeon
High Assurance Mobility Control Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.conferencePlace US -
dc.citation.conferencePlace Washington, DC -
dc.citation.endPage 3349 -
dc.citation.startPage 3344 -
dc.citation.title 2013 1st American Control Conference, ACC 2013 -
dc.contributor.author Kwon, Cheolhyeon -
dc.contributor.author Liu, W. -
dc.contributor.author Hwang, I. -
dc.date.accessioned 2023-12-20T01:06:09Z -
dc.date.available 2023-12-20T01:06:09Z -
dc.date.created 2019-07-25 -
dc.date.issued 2013-06-17 -
dc.description.abstract Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Deception attacks (or false data injection attacks), which are performed by tampering with system components or data, are not of particular concern if they can be easily detected by the system's monitoring system. However, intelligent cyber attackers can avoid being detected by the monitoring system by carefully design cyber attacks. Our main objective is to investigate the performance of such stealthy deception attacks from the system's perspective. We investigate three kinds of stealthy deception attacks according to the attacker's ability to compromise the system. Based on the information about the dynamics of the system and existing hypothesis testing algorithms, we derive the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected. In the end, we illustrate the threat of these cyber attacks using an Unmanned Aerial Vehicle (UAV) navigation example. -
dc.identifier.bibliographicCitation 2013 1st American Control Conference, ACC 2013, pp.3344 - 3349 -
dc.identifier.issn 0743-1619 -
dc.identifier.scopusid 2-s2.0-84883504054 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/34923 -
dc.language 영어 -
dc.publisher Boeing,Eaton,Halliburton,Honeywell,MathWorks -
dc.title Security analysis for Cyber-Physical Systems against stealthy deception attacks -
dc.type Conference Paper -
dc.date.conferenceDate 2013-06-17 -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.