Hierarchical Cyber-Attack Detection in Large-Scale Interconnected Systems

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

32 Downloads (Pure)

Abstract

In this paper we present a hierarchical scheme to detect cyber-attacks in a hierarchical control architecture for large-scale interconnected systems (LSS). We consider the LSS as a network of physically coupled subsystems, equipped with a two-layer controller: on the local level, decentralized controllers guarantee overall stability and reference tracking; on the supervisory level, a centralized coordinator sets references for the local regulators. We present a scheme to detect attacks that occur at the local level, with malicious agents capable of affecting the local control. The detection scheme is computed at the supervisory level, requiring only limited exchange of data and model knowledge. We offer detailed theoretical analysis of the proposed scheme, highlighting its detection properties in terms of robustness, detectability and stealthiness conditions.
Original languageEnglish
Title of host publicationProceedings of the IEEE 61st Conference on Decision and Control (CDC 2022)
PublisherIEEE
Pages6134-6139
ISBN (Print)978-1-6654-6761-2
DOIs
Publication statusPublished - 2022
EventIEEE 61st Conference on Decision and Control (CDC 2022) - Cancún, Mexico
Duration: 6 Dec 20229 Dec 2022

Conference

ConferenceIEEE 61st Conference on Decision and Control (CDC 2022)
Country/TerritoryMexico
CityCancún
Period6/12/229/12/22

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Couplings
  • Estimation error
  • Regulators
  • Industrial control
  • Redundancy
  • Computer architecture
  • Interconnected systems

Fingerprint

Dive into the research topics of 'Hierarchical Cyber-Attack Detection in Large-Scale Interconnected Systems'. Together they form a unique fingerprint.

Cite this