Investigation of control theoretic cyber attacks on controllers
by Hemangi Laxman Gawand; Anup Kumar Bhattacharjee; Kallol Roy
International Journal of Systems, Control and Communications (IJSCC), Vol. 7, No. 3, 2016

Abstract: National critical infrastructures like power plants, power grids, industrial process plants, water distribution systems employ a hierarchy of controllers designed to control the physical/chemical processes safely and optimally. They deploy sophisticated control algorithms implemented in software and exchange control commands and information over networks. Various researches have examined attack scenarios in such embedded control systems from control theoretic perspectives. This paper revisits the theoretical aspects of these attacks and postulates that such attacks can be detected by statistical techniques like sequential probability ratio test (SPRT), cumulative sum (CUSUM), multiple model Kalman filter etc. The proposed techniques are studied closely for their effectiveness by extensive simulations.

Online publication date: Wed, 29-Jun-2016

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Systems, Control and Communications (IJSCC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com