Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F.

Risultato della ricerca: Paper

Abstract

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a family of undetectable attacks. We illustrate our results on a cloud-based surveillance example.
Lingua originaleEnglish
Stato di pubblicazionePublished - 2018

Cita questo

Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F. (2018). Stealthy Attacks in Cloud-Connected Linear Impulsive Systems.

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems. / Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F.

2018.

Risultato della ricerca: Paper

Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F. 2018, 'Stealthy Attacks in Cloud-Connected Linear Impulsive Systems'.
Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F.. Stealthy Attacks in Cloud-Connected Linear Impulsive Systems. 2018.
Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F. / Stealthy Attacks in Cloud-Connected Linear Impulsive Systems.
@conference{f11954657330481fbe2bbee1db5aefbc,
title = "Stealthy Attacks in Cloud-Connected Linear Impulsive Systems",
abstract = "This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a family of undetectable attacks. We illustrate our results on a cloud-based surveillance example.",
author = "{Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F.} and Adriano Fagiolini",
year = "2018",
language = "English",

}

TY - CONF

T1 - Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

AU - Duz, A.; Phillips, S.; Sanfelice, R.; Pasqualetti, F.

AU - Fagiolini, Adriano

PY - 2018

Y1 - 2018

N2 - This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a family of undetectable attacks. We illustrate our results on a cloud-based surveillance example.

AB - This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a family of undetectable attacks. We illustrate our results on a cloud-based surveillance example.

UR - http://hdl.handle.net/10447/357667

M3 - Paper

ER -