THESIS
2017
xiv, 71 pages : illustrations (some color) ; 30 cm
Abstract
Cyber physical systems are open to all sorts of attacks due to its reliance on wireless
communication. Attackers are searching for optimal attacks that damage the system's
performance, and in the presence of a detection mechanism, would want the optimal
attack that is stealthy. In this thesis, the concept of ∈-stealthiness is studied in its entirety.
We construct optimal ∈-stealthy attacks with respect to estimation quality for the
control attack and tackle the measurement attack case from two different perspectives.
Our secondary objective is to propose a method to counter this attack. We will
develop a model under which the estimator can increase the probability of detection.
In this model, two ideas are proposed to optimize the threshold distribution and the
optimal distribu...[
Read more ]
Cyber physical systems are open to all sorts of attacks due to its reliance on wireless
communication. Attackers are searching for optimal attacks that damage the system's
performance, and in the presence of a detection mechanism, would want the optimal
attack that is stealthy. In this thesis, the concept of ∈-stealthiness is studied in its entirety.
We construct optimal ∈-stealthy attacks with respect to estimation quality for the
control attack and tackle the measurement attack case from two different perspectives.
Our secondary objective is to propose a method to counter this attack. We will
develop a model under which the estimator can increase the probability of detection.
In this model, two ideas are proposed to optimize the threshold distribution and the
optimal distribution is constructed accordingly.
Post a Comment