Note: This content is accessible to all versions of every browser. However, this browser does not seem to support current Web standards, preventing the display of our site's design details.

  

Control-Theoretic Methods for Cyber-Physical Security

Author(s):

F. Pasqualetti, F. Dörfler, F. Bullo
Conference/Journal:

IEEE Control Systems Magazine, vol. 35, no. 1, pp. 110-127
Abstract:

Cyberphysical systems integrate physical processes, computational resources, and communication capabilities. Cyberphysical systems have permeated modern society, becoming prevalent in many domains, including energy production, health care, and telecommunications. Examples of cyberphysical systems include sensor networks, industrial automation systems, and critical infrastructures such as transportation networks, power generation and distribution networks, water and gas distribution networks, and advanced manufacturing systems. The integration of cybertechnologies with physical processes increases system efficiencies and, at the same time, introduces vulnerabilities that undermine the reliability of critical infrastructures. As recently highlighted by the Maroochy water breach in March 2000 [1], multiple recent power blackouts in Brazil [2], the SQL Slammer worm attack on the Davis-Besse nuclear plant in January 2003 [3], the StuxNet computer worm in June 2010 [4], and various industrial security incidents [5], cyberphysical systems are prone to failures and attacks on their physical infrastructure and cyberattacks on their data management and communication layer [6], [7].

Year:

2015
Type of Publication:

(01)Article
Supervisor:



No Files for download available.
% Autogenerated BibTeX entry
@Article { PasD_r:2015:IFA_5268,
    author={F. Pasqualetti and F. D{\"o}rfler and F. Bullo},
    title={{Control-Theoretic Methods for Cyber-Physical Security}},
    journal={IEEE Control Systems Magazine},
    year={2015},
    volume={35},
    number={1},
    pages={110--127},
    month=feb,
    url={http://control.ee.ethz.ch/index.cgi?page=publications;action=details;id=5268}
}
Permanent link