Access the full text.
Sign up today, get DeepDyve free for 14 days.
References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.
National critical infrastructures like power plants, power grids, industrial process plants, water distribution systems employ a hierarchy of controllers designed to control the physical/chemical processes safely and optimally. They deploy sophisticated control algorithms implemented in software and exchange control commands and information over networks. Various researches have examined attack scenarios in such embedded control systems from control theoretic perspectives. This paper revisits the theoretical aspects of these attacks and postulates that such attacks can be detected by statistical techniques like sequential probability ratio test (SPRT), cumulative sum (CUSUM), multiple model Kalman filter etc. The proposed techniques are studied closely for their effectiveness by extensive simulations. Keywords: cyber physical system; CPS; false data injection attack; sequential probability ratio test; SPRT; Kalman filter; targeted attacks; false data injection attack; control attack models. Reference to this paper should be made as follows: Gawand, H.L., Bhattacharjee, A.K. and Roy, K. (2016) `Investigation of control theoretic cyber attacks on controllers', Int. J. Systems, Control and Communications, Vol. 7, No. 3, pp.273305. Biographical notes: Hemangi Laxman Gawand is a DGFS-PhD student at Homi Bhabha National Institute BARC. She has prior industrial experience in industrial automation and telecom domain. Her area of interests is
International Journal of Systems, Control and Communications – Inderscience Publishers
Published: Jan 1, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.