SlideShare a Scribd company logo
1 of 18
Vulnerabilities of Control Systems in Internet of Things
Applications
Verica Radisavljevic-Gajic; Seri Park; Danai Chasaki
IEEE Internet of Things Journal
Year: 2018 | Volume: 5, Issue: 2 | Journal Article | Publisher: IEEE
Presenter: Atul Kumar Sahay
Arnab Bhattacharjee
Motivation
 Study about vulnerability of applied control systems in general, and especially
in the IoT environment.
 Examine fundamentals of L.C.S. and consider vulnerability of its main features
and concepts used in IoT applications.
 Examination of vulnerabilities of system stability, controllability, observability,
design of feedback loops, and design and placement of sensors and controllers
(actuators).
 Some basic vulnerability studies for time-invariant nonlinear unconstrained
systems prone to outside physical and cyber-attacks.
Introduction
 Immersive and pervasive networks that enable easy accesses and interactions
among things.
 Personal computers
 Smart phones
 Machines
 Vehicles
 Appliances
 Sensors and actuators
 Networks can be:
 Home networks
 Device to device networks
 Unmanned aerial networks
 Body area networks
 Satellite networks, providing person 2 person
 Person to machine
 Machine 2 machine communication.
 IoT and Feedback Control Systems
 Cyber Physical Systems and Feedback Control Systems:
Cyber-Physical Systems (CPS) are integrations of computation, networking,
and physical processes.
VULNERABILITY OF CONTROL SYSTEMS
TO OUTSIDE ATTACKS
 Physical systems can be either lumped (concentrated) parameter or distributed parameter
dynamic systems,
 Continuous or discrete time
 Deterministic or stochastic
 Time-invariant or time-varying
 Possibilities for malicious attackers to damage cyber physical control systems either by inserting
false signals via communication channels and in general IoT or interfering directly with the
system dynamics, or altering computational software.
For example - MATLAB
Parameters to check the VULNERABILITY
 Cyber-physical security
 Robustness
 Resilience Data injection attacks
 Covert misappropriation, detection of counterfeit sensors
 Attack detection and identification have been considered
Security Model
 An ideal cyber physical system needs to meet the following security requirements:
 Security Group (SG) knowledge - the Security Group (SG) should know the current control
system perfectly.
 Attack Group (AG) knowledge - Attack Group should know nothing about the control system.
 Access - The control system should be inaccessible to AGs.
 Vulnerabilities - The control system has no vulnerabilities.
 Damage potential - The control system’s misbehavior cannot cause damage.
 Detection SG detects any attack almost instantly.
 Recovery SG can restore control system integrity almost instantly.
VULNERABILITY OF SYSTEM STABILITY
 Time-invariant linear control systems are considered and vulnerability of
the internal system stability (characterized by the eigenvalues) and
bounded-input bounded-output (BIBO) stability are examined.
 LTI system is represented in state space form by the following vector
differential equation :
 Where :
 x(t) is a n-dimensional vector of system variables
 A is a constant matrix of dimension nxn.
 X(t0) is the system initial condition.
 Stability of these systems is determined using the corresponding Jordan
forms and finding and examining their minimal polynomials.
 A sophisticated attacker can insert in a stable physical system transfer
function an unstable transfer function zero and an unstable transfer
function pole that are very close to each other (acting as a dipole) so they
in fact cancel out each other and do not appear in the system transfer
function.
Where
 Hnom(s) - stable nominal transfer function
 P - inserted pole and zero
 Consider the nominal system transfer function and its altered variant
Fig. 1. Step Responses of the Nominal and Maliciously Altered System
Transfer Functions. The Time Axis Units are in Seconds
Linear System Vulnerability to Time Delays
 A hidden stability issue is loss of stability in linear time invariant
physical systems due to time delays.
 It is well known from that even in the simplest cases of linear
time invariant systems with an explicit time delay element e-sT
appearing in the system transfer function that is:
Vulnerability of Feedback Systems
 This is probably the most vulnerably point in a physical feedback (control)
system
VULNERABILITY OF CONTROLLABILITY
AND OBSERVABILITY
A sophisticated attacker who knows physical system dynamics and understands physical
system concepts known as controllability and observability
If a system has some badly-behaved state variables, it is important that those state variables
be at least observed at all times. If a physical system has some state variables that naturally
should not be present in the system (the system under attack) that state variables can be
observed only if the system is observable. Hence, losing observability means losing ability to
monitor presence of system attackers at all times.
SENSOR FUSION WITH NON-OPTIMAL
LOCAL “KALMAN” FILTERS
 The sensor fusion can be efficiently done by implementing the “centralized” Kalman
filter in a decentralized manner and using local filters as sensors.
VULNERABILITY OF NONLINEAR AND DISTRIBUTED
PARAMETER SYSTEMS
 Vulnerability issues in nonlinear and distributed parameter systems.
 For a nonlinear control system given by
the equilibrium points are obtained from
If a malicious attacker has an access to control input channels, the attacker
can change the system equilibrium points.
E.g.:
 Aircraft wings can go into chaotic motion
 Human heart and brain can produce signals.
CONCLUSIONS
 The study was limited to Time Invariant Systems.
 Further research is needed to address these issues and propose the
best defense strategies in cases of such attacks.
Thankyou
Q&A

More Related Content

Similar to Vulnerabilities of control system

Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMahmoudElsisi11
 
PE-3032_Lecture_01.pptx
PE-3032_Lecture_01.pptxPE-3032_Lecture_01.pptx
PE-3032_Lecture_01.pptxgeremu2
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9Ian Sommerville
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxMahendraShukla27
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenMarina Krotofil
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...eSAT Publishing House
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 
Sensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsSensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsIDES Editor
 
Introduction to control system 1
Introduction to control system 1Introduction to control system 1
Introduction to control system 1turna67
 
Control Strategies for Autonomous quadrotors.pptx
Control Strategies for Autonomous quadrotors.pptxControl Strategies for Autonomous quadrotors.pptx
Control Strategies for Autonomous quadrotors.pptxMahiRanka2
 
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...Drogkaris Prokopios
 
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...Waqas Tariq
 

Similar to Vulnerabilities of control system (20)

Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptx
 
system
systemsystem
system
 
PE-3032_Lecture_01.pptx
PE-3032_Lecture_01.pptxPE-3032_Lecture_01.pptx
PE-3032_Lecture_01.pptx
 
Ics presentation
Ics presentationIcs presentation
Ics presentation
 
Ch20-Software Engineering 9
Ch20-Software Engineering 9Ch20-Software Engineering 9
Ch20-Software Engineering 9
 
Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
Ch10
Ch10Ch10
Ch10
 
Power system security
Power system securityPower system security
Power system security
 
Power system security and smart grid
Power system security  and  smart gridPower system security  and  smart grid
Power system security and smart grid
 
Sensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsSensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded Systems
 
Introduction to control system 1
Introduction to control system 1Introduction to control system 1
Introduction to control system 1
 
Control Strategies for Autonomous quadrotors.pptx
Control Strategies for Autonomous quadrotors.pptxControl Strategies for Autonomous quadrotors.pptx
Control Strategies for Autonomous quadrotors.pptx
 
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
Semantic Modeling & Monitoring for Real Time Decision Making: Results and Nex...
 
Ch20
Ch20Ch20
Ch20
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...
Model Based Hierarchical and Distributed Control of Discrete Event Robotic Sy...
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Vulnerabilities of control system

  • 1. Vulnerabilities of Control Systems in Internet of Things Applications Verica Radisavljevic-Gajic; Seri Park; Danai Chasaki IEEE Internet of Things Journal Year: 2018 | Volume: 5, Issue: 2 | Journal Article | Publisher: IEEE Presenter: Atul Kumar Sahay Arnab Bhattacharjee
  • 2. Motivation  Study about vulnerability of applied control systems in general, and especially in the IoT environment.  Examine fundamentals of L.C.S. and consider vulnerability of its main features and concepts used in IoT applications.  Examination of vulnerabilities of system stability, controllability, observability, design of feedback loops, and design and placement of sensors and controllers (actuators).  Some basic vulnerability studies for time-invariant nonlinear unconstrained systems prone to outside physical and cyber-attacks.
  • 3. Introduction  Immersive and pervasive networks that enable easy accesses and interactions among things.  Personal computers  Smart phones  Machines  Vehicles  Appliances  Sensors and actuators
  • 4.  Networks can be:  Home networks  Device to device networks  Unmanned aerial networks  Body area networks  Satellite networks, providing person 2 person  Person to machine  Machine 2 machine communication.
  • 5.  IoT and Feedback Control Systems  Cyber Physical Systems and Feedback Control Systems: Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical processes.
  • 6. VULNERABILITY OF CONTROL SYSTEMS TO OUTSIDE ATTACKS  Physical systems can be either lumped (concentrated) parameter or distributed parameter dynamic systems,  Continuous or discrete time  Deterministic or stochastic  Time-invariant or time-varying  Possibilities for malicious attackers to damage cyber physical control systems either by inserting false signals via communication channels and in general IoT or interfering directly with the system dynamics, or altering computational software. For example - MATLAB
  • 7. Parameters to check the VULNERABILITY  Cyber-physical security  Robustness  Resilience Data injection attacks  Covert misappropriation, detection of counterfeit sensors  Attack detection and identification have been considered
  • 8. Security Model  An ideal cyber physical system needs to meet the following security requirements:  Security Group (SG) knowledge - the Security Group (SG) should know the current control system perfectly.  Attack Group (AG) knowledge - Attack Group should know nothing about the control system.  Access - The control system should be inaccessible to AGs.  Vulnerabilities - The control system has no vulnerabilities.  Damage potential - The control system’s misbehavior cannot cause damage.  Detection SG detects any attack almost instantly.  Recovery SG can restore control system integrity almost instantly.
  • 9. VULNERABILITY OF SYSTEM STABILITY  Time-invariant linear control systems are considered and vulnerability of the internal system stability (characterized by the eigenvalues) and bounded-input bounded-output (BIBO) stability are examined.  LTI system is represented in state space form by the following vector differential equation :  Where :  x(t) is a n-dimensional vector of system variables  A is a constant matrix of dimension nxn.  X(t0) is the system initial condition.
  • 10.  Stability of these systems is determined using the corresponding Jordan forms and finding and examining their minimal polynomials.  A sophisticated attacker can insert in a stable physical system transfer function an unstable transfer function zero and an unstable transfer function pole that are very close to each other (acting as a dipole) so they in fact cancel out each other and do not appear in the system transfer function. Where  Hnom(s) - stable nominal transfer function  P - inserted pole and zero
  • 11.  Consider the nominal system transfer function and its altered variant Fig. 1. Step Responses of the Nominal and Maliciously Altered System Transfer Functions. The Time Axis Units are in Seconds
  • 12. Linear System Vulnerability to Time Delays  A hidden stability issue is loss of stability in linear time invariant physical systems due to time delays.  It is well known from that even in the simplest cases of linear time invariant systems with an explicit time delay element e-sT appearing in the system transfer function that is:
  • 13. Vulnerability of Feedback Systems  This is probably the most vulnerably point in a physical feedback (control) system
  • 14. VULNERABILITY OF CONTROLLABILITY AND OBSERVABILITY A sophisticated attacker who knows physical system dynamics and understands physical system concepts known as controllability and observability If a system has some badly-behaved state variables, it is important that those state variables be at least observed at all times. If a physical system has some state variables that naturally should not be present in the system (the system under attack) that state variables can be observed only if the system is observable. Hence, losing observability means losing ability to monitor presence of system attackers at all times.
  • 15. SENSOR FUSION WITH NON-OPTIMAL LOCAL “KALMAN” FILTERS  The sensor fusion can be efficiently done by implementing the “centralized” Kalman filter in a decentralized manner and using local filters as sensors.
  • 16. VULNERABILITY OF NONLINEAR AND DISTRIBUTED PARAMETER SYSTEMS  Vulnerability issues in nonlinear and distributed parameter systems.  For a nonlinear control system given by the equilibrium points are obtained from If a malicious attacker has an access to control input channels, the attacker can change the system equilibrium points. E.g.:  Aircraft wings can go into chaotic motion  Human heart and brain can produce signals.
  • 17. CONCLUSIONS  The study was limited to Time Invariant Systems.  Further research is needed to address these issues and propose the best defense strategies in cases of such attacks.