• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Electrical Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Electrical Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems

    View/Open
    Data-Driven_Covert-Attack_Strategies_and_Countermeasures_for_Cyber-Physical_Systems.pdf (372.9Kb)
    Date
    2021
    Author
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    Metadata
    Show full item record
    Abstract
    This paper studies covert-attacks for cyber-physical systems (CPS) under conditions that adversaries do not explicitly know the system characteristic matrices (A, B, C). Covert-attacks are considered as undetectable type of cyber-attacks. We propose and develop conditions under which adversaries are capable of performing covert-attacks for CPS only by utilizing Markov parameters of the system, which are assumed to be known to adversaries. In order to demonstrate the execution of proposed covert-attacks in this paper, a specific sensor attack signal which should be accompanied by an actuator attack is introduced based on Markov parameters of the CPS. The minimum number of sensors which should be attacked to perform covert-attacks while only one actuator is manipulated by adversaries is investigated. The latter can be used by adversaries to select a specific actuator to compromise. In order to make the CPS more secure against covert-attacks, we propose and develop a coding scheme which increases the number of required sensors that should be compromised during a covert-attack. Hence, if the proposed coding scheme is utilized, adversaries need to compromise all the output communication channels of CPS to perform covert-attacks. An illustrative simulation case study is provided to demonstrate the effectiveness of the proposed covert-attack method and the coding scheme.
    DOI/handle
    http://dx.doi.org/10.1109/CDC45484.2021.9683376
    http://hdl.handle.net/10576/57721
    Collections
    • Electrical Engineering [‎2821‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video