• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems

    Thumbnail
    Date
    2019
    Author
    Golabi A.
    Erradi A.
    Tantawy A.
    Shaban K.
    Metadata
    Show full item record
    Abstract
    In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data injections on output measurements and scheduling variables. To improve the detection accuracy of FDI attacks, the attack detector design uses the performance metric H- to maximize the detection capability of the detector module to effectively detect FDI attacks. On the other hand, it uses the H? metric to minimize the effect of disturbance on the detector module given an unreliable network. We assume that the network unreliability comes from packet dropout that we modeled as Bernoulli process. The FDI attack detector is designed such that H- and H? performance metrics are maintained despite packet dropout. Based on stochastic stability, we define a set of sufficient Linear Matrix Inequalities (LMI) that we solve as a multi-objective optimization problem to obtain the detector gain. The obtained detector gain is used for estimating the current system state and current output measurement using the system input, manipulated measurements and manipulated scheduling variables. Then, the output of the detector is compared with the actual sensor measurement. The resulting residual signal carries the information about the FDI attack. The proposed approach is tested and validated on a two-tank system. The evaluation results demonstrate that the proposed detector is able to detect FDI attacks. - 2019 IEEE.
    DOI/handle
    http://dx.doi.org/10.1109/CSET.2019.8904913
    http://hdl.handle.net/10576/13929
    Collections
    • Computer Science & Engineering [‎2428‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video