On the Computation of Worst Attacks: A LP Framework

Nabil H. Hirzallah, Petros G. Voulgaris

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider the problem of false data injection attacks modeled as additive disturbances in various parts of a general LTI feedback system and derive necessary and sufficient conditions for the existence of stealthy unbounded attacks. We also consider the problem of characterizing the worst, bounded and stealthy attacks. This problem involves a maximization of a convex function subject to convex constraints, and hence, in principle, it is not easy to solve. However, by employing a ∞ framework, we show how tractable Linear Programming (LP) methods can be used to obtain the worst attack design. Moreover, we provide a controller synthesis iterative method to minimize the worst impact of such attacks and test its efficacy in a power system component.

Original languageEnglish (US)
Title of host publication2018 Annual American Control Conference, ACC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4527-4532
Number of pages6
ISBN (Print)9781538654286
DOIs
StatePublished - Aug 9 2018
Event2018 Annual American Control Conference, ACC 2018 - Milwauke, United States
Duration: Jun 27 2018Jun 29 2018

Publication series

NameProceedings of the American Control Conference
Volume2018-June
ISSN (Print)0743-1619

Other

Other2018 Annual American Control Conference, ACC 2018
Country/TerritoryUnited States
CityMilwauke
Period6/27/186/29/18

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'On the Computation of Worst Attacks: A LP Framework'. Together they form a unique fingerprint.

Cite this