DocumentCode :
22603
Title :
Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
Author :
Pasqualetti, Fabio ; Dorfler, Florian ; Bullo, Francesco
Author_Institution :
Dept. of Mech. Eng., Univ. of California, Riverside, Riverside, CA, USA
Volume :
35
Issue :
1
fYear :
2015
fDate :
Feb. 2015
Firstpage :
110
Lastpage :
127
Abstract :
Cyberphysical systems integrate physical processes, computational resources, and communication capabilities. Cyberphysical systems have permeated modern society, becoming prevalent in many domains, including energy production, health care, and telecommunications. Examples of cyberphysical systems include sensor networks, industrial automation systems, and critical infrastructures such as transportation networks, power generation and distribution networks, water and gas distribution networks, and advanced manufacturing systems. The integration of cybertechnologies with physical processes increases system efficiencies and, at the same time, introduces vulnerabilities that undermine the reliability of critical infrastructures. As recently highlighted by the Maroochy water breach in March 2000 [1], multiple recent power blackouts in Brazil [2], the SQL Slammer worm attack on the Davis-Besse nuclear plant in January 2003 [3], the StuxNet computer worm in June 2010 [4], and various industrial security incidents [5], cyberphysical systems are prone to failures and attacks on their physical infrastructure and cyberattacks on their data management and communication layer [6], [7].
Keywords :
control engineering computing; optimal control; security of data; Davis-Besse nuclear plant; Maroochy water breach; SQL Slammer worm attack; StuxNet computer worm; control theoretic methods; critical infrastructures; cyberphysical security; cyberphysical system; cybertechnology integration; geometric principles; industrial automation systems; optimal cross-layer resilient control system; sensor networks; Biological system modeling; Computational modeling; Computer crime; Computer security; Generators; Reservoirs;
fLanguage :
English
Journal_Title :
Control Systems, IEEE
Publisher :
ieee
ISSN :
1066-033X
Type :
jour
DOI :
10.1109/MCS.2014.2364725
Filename :
7011011
Link To Document :
بازگشت