Switching multiplicative watermark design against covert attacks

Alexander J. Gallo, Sribalaji C. Anand*, Andre M.H. Teixeira, Riccardo M.G. Ferrari

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

4 Downloads (Pure)

Abstract

Active techniques have been introduced to give better detectability performance for cyber-attack diagnosis in cyber–physical systems (CPS). In this paper, switching multiplicative watermarking is considered, whereby we propose an optimal design strategy to define switching filter parameters. Optimality is evaluated exploiting the so-called output-to-output gain of the closed-loop system, including some supposed attack dynamics. A worst-case scenario of a matched covert attack is assumed, presuming that an attacker with full knowledge of the closed-loop system injects a stealthy attack of bounded energy. Our algorithm, given watermark filter parameters at some time instant, provides optimal next-step parameters. Analysis of the algorithm is given, demonstrating its features, and demonstrating that through initialization of certain parameters outside of the algorithm, the parameters of the multiplicative watermarking can be randomized. Simulation shows how, by adopting our method for parameter design, the attacker’s impact on performance diminishes.
Original languageEnglish
Article number112301
Number of pages7
JournalAutomatica
Volume177
DOIs
Publication statusPublished - 2025

Keywords

  • Fault detection and isolation
  • Network security
  • Networked control systems

Fingerprint

Dive into the research topics of 'Switching multiplicative watermark design against covert attacks'. Together they form a unique fingerprint.

Cite this