Novel stealthy attack and defense strategies for networked control systems

Y Mao, H Jafarnejadsani, P Zhao… - … on Automatic Control, 2020 - ieeexplore.ieee.org
This article studies novel attack and defense strategies, based on a class of stealthy attacks,
namely the zero-dynamics attack (ZDA), for multiagent control systems. ZDA poses a …

Detectability of cooperative zero-dynamics attack

Y Mao, E Akyol - 2018 56th Annual Allerton Conference on …, 2018 - ieeexplore.ieee.org
This paper studies the detectability of cooperative zero-dynamics attacks, in the context of
coupled harmonic oscillators. A defense strategy, which consists of a strategic topology …

Strategic topology switching for security-part II: Detection & switching topologies

Y Mao, E Akyol, Z Zhang - arXiv preprint arXiv:1711.11181, 2017 - arxiv.org
This two-part paper considers strategic topology switching for security in the second-order
multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero …

A novel defense strategy against zero-dynamics attacks in multi-agent systems

Y Mao, E Akyol, Z Zhang - 2019 IEEE 58th Conference on …, 2019 - ieeexplore.ieee.org
This paper studies strategic topology switching for a second-order multi-agent system under
zero-dynamics attack (ZDA) whose attack-starting time is allowed to be not the initial time …

Detectability of intermittent zero-dynamics attack in networked control systems

Y Mao, H Jafarnejadsani, P Zhao… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
This paper analyzes stealthy attacks, particularly the zero-dynamics attack (ZDA) in
networked control systems. ZDA hides the attack signal in the null-space of the state-space …

Geometrical characterization of sensor placement for cone-invariant and multi-agent systems against undetectable zero-dynamics attacks

J Chen, J Wei, W Chen, H Sandberg… - SIAM Journal on Control …, 2022 - SIAM
Undetectable attacks are an important class of malicious attacks threatening the security of
cyber-physical systems, which can modify a system's state but leave the system output …

Control-and Game-Theoretic Approaches to Secure Networked Systems

Y Mao - 2019 - search.proquest.com
For large-scale networked systems, see eg, social networks and power networks,
centralized measurement (sensing) and control are not feasible, and hence require the …