This article presents a novel secure-control framework against sensor deception attacks. The vulnerability of cyber-physical systems with respect to sensor deceptive attacks makes that all sensor measurements are not reliable until the system security is assured by an attack detection module. Most of the active attack detection strategies require some time to assess the system security, while injecting a watermark signal to ease the detection. However, the injection of watermark signals deteriorates the performance and stability of the plant. The proposed control framework consists of a dual-rate control (DRC) that is able to stabilize the plant using: 1) a model predictive controller that operates at a slower sampling time; 2) a state-feed...
In this article, we address the cyber-security problem of industrial control systems (ICSs) when the...
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
International audienceThe use of control-theoretic solutions to detect attacks against cyber-physica...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems (CPS...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this article, we address the cyber-security problem of industrial control systems (ICSs) when the...
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
International audienceThe use of control-theoretic solutions to detect attacks against cyber-physica...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems (CPS...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this article, we address the cyber-security problem of industrial control systems (ICSs) when the...
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...