当前位置: X-MOL 学术IEEE Trans. Autom. Control › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks
IEEE Transactions on Automatic Control ( IF 6.2 ) Pub Date : 2021-01-13 , DOI: 10.1109/tac.2021.3050549
Hao Liu , Ben Niu , Jiahu Qin

In this article, the reachability analysis is investigated for the linear discrete-time systems in the presence of malicious cyber attacks. Moreover, the system disturbance and measurement noise are assumed to be unknown-but-bounded (UBB). Then, the attack model is built and a novel attack detector, which depends on the estimate residue is developed. Based on the stealthy cyber-attack set, reachability analysis is done, and the corresponding reachable set is computed. In order to reduce the computation burden, a recursive reachable set computation algorithm is proposed. Finally, an example is provided to illustrate the validity of main results.

中文翻译:


隐秘网络攻击下线性离散时间系统的可达性分析



在本文中,研究了存在恶意网络攻击时线性离散时间系统的可达性分析。此外,系统扰动和测量噪声被假设为未知但有界(UBB)。然后,建立了攻击模型,并开发了一种依赖于残差估计的新型攻击检测器。基于隐形网络攻击集进行可达性分析,计算出相应的可达集。为了减轻计算负担,提出一种递归可达集计算算法。最后通过算例说明主要结果的有效性。
更新日期:2021-01-13
down
wechat
bug