Design of multiplicative watermarking against covert attacks

A.J. Gallo, S.C. Anand, Andre M. H. Teixeira, Riccardo M.G. Ferrari

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

22 Downloads (Pure)

Abstract

This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output ℓ 2 -gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control problem is non-convex. Hence, we propose an algorithm to design the watermarking filters by solving the problem suboptimally via LMIs. We show that, against covert attacks, the output-to-output ℓ 2 -gain is unbounded without watermarking, and we provide a sufficient condition for boundedness in the presence of watermarks.
Original languageEnglish
Title of host publicationProceedings of the 60th IEEE Conference on Decision and Control (CDC 2021)
PublisherIEEE
Pages4176-4181
ISBN (Print)978-1-6654-3659-5
DOIs
Publication statusPublished - 2021
Event60th IEEE Conference on Decision and Control (CDC 2021) - Austin, United States
Duration: 14 Dec 202117 Dec 2021

Conference

Conference60th IEEE Conference on Decision and Control (CDC 2021)
Country/TerritoryUnited States
CityAustin
Period14/12/2117/12/21

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Fingerprint

Dive into the research topics of 'Design of multiplicative watermarking against covert attacks'. Together they form a unique fingerprint.

Cite this