Secure system identification. Showkatbakhsh, M., Tabuada, P., & Diggavi, S. N. In 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, Monticello, IL, USA, September 27-30, 2016, pages 1137–1141, 2016. doi abstract bibtex This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.
@inproceedings{DBLP:conf/allerton/ShowkatbakhshTD16,
abstract = {This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.},
author = {Mehrdad Showkatbakhsh and
Paulo Tabuada and
Suhas N. Diggavi},
bibsource = {dblp computer science bibliography, http://dblp.org},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/allerton/ShowkatbakhshTD16},
booktitle = {54th Annual Allerton Conference on Communication, Control, and Computing,
Allerton 2016, Monticello, IL, USA, September 27-30, 2016},
crossref = {DBLP:conf/allerton/2016},
doi = {10.1109/ALLERTON.2016.7852363},
file = {:papers:mehrdad_allerton16.pdf},
pages = {1137--1141},
tags = {conf,IT,SecureCPS},
timestamp = {Fri, 17 Feb 2017 10:49:47 +0100},
title = {Secure system identification},
type = {4},
year = {2016}
}
Downloads: 0
{"_id":"6sH6q4EEdY2AjaDp3","bibbaseid":"showkatbakhsh-tabuada-diggavi-securesystemidentification-2016","author_short":["Showkatbakhsh, M.","Tabuada, P.","Diggavi, S. N."],"bibdata":{"bibtype":"inproceedings","type":"4","abstract":"This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.","author":[{"firstnames":["Mehrdad"],"propositions":[],"lastnames":["Showkatbakhsh"],"suffixes":[]},{"firstnames":["Paulo"],"propositions":[],"lastnames":["Tabuada"],"suffixes":[]},{"firstnames":["Suhas","N."],"propositions":[],"lastnames":["Diggavi"],"suffixes":[]}],"bibsource":"dblp computer science bibliography, http://dblp.org","biburl":"http://dblp.uni-trier.de/rec/bib/conf/allerton/ShowkatbakhshTD16","booktitle":"54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, Monticello, IL, USA, September 27-30, 2016","crossref":"DBLP:conf/allerton/2016","doi":"10.1109/ALLERTON.2016.7852363","file":":papers:mehrdad_allerton16.pdf","pages":"1137–1141","tags":"conf,IT,SecureCPS","timestamp":"Fri, 17 Feb 2017 10:49:47 +0100","title":"Secure system identification","year":"2016","bibtex":"@inproceedings{DBLP:conf/allerton/ShowkatbakhshTD16,\n abstract = {This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.},\n author = {Mehrdad Showkatbakhsh and\nPaulo Tabuada and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/allerton/ShowkatbakhshTD16},\n booktitle = {54th Annual Allerton Conference on Communication, Control, and Computing,\nAllerton 2016, Monticello, IL, USA, September 27-30, 2016},\n crossref = {DBLP:conf/allerton/2016},\n doi = {10.1109/ALLERTON.2016.7852363},\n file = {:papers:mehrdad_allerton16.pdf},\n pages = {1137--1141},\n tags = {conf,IT,SecureCPS},\n timestamp = {Fri, 17 Feb 2017 10:49:47 +0100},\n title = {Secure system identification},\n type = {4},\n year = {2016}\n}\n\n","author_short":["Showkatbakhsh, M.","Tabuada, P.","Diggavi, S. N."],"key":"DBLP:conf/allerton/ShowkatbakhshTD16","id":"DBLP:conf/allerton/ShowkatbakhshTD16","bibbaseid":"showkatbakhsh-tabuada-diggavi-securesystemidentification-2016","role":"author","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/e2kjGxYgtBo8SWSbC","dataSources":["hicKnsKYNEFXC4CgH","jxCYzXXYRqw2fiEXQ","wCByFFrQMyRwfzrJ6","yuqM5ah4HMsTyDrMa","YaM87hGQiepg5qijZ","n9wmfkt5w8CPqCepg","soj2cS6PgG8NPmWGr","FaDBDiyFAJY5pL28h","ycfdiwWPzC2rE6H77"],"keywords":[],"search_terms":["secure","system","identification","showkatbakhsh","tabuada","diggavi"],"title":"Secure system identification","year":2016}