AG

A.J. Gallo

Authored

8 records found

Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to pro ...
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber- ...
The current trend in the evolution of wind turbines is to increase their rotor size in order to capture more power. This leads to taller, slender and more flexible towers, which thus experience higher dynamical loads due to the turbine rotation and environmental factors. It is he ...
In this paper we present a hierarchical scheme to detect cyber-attacks in a hierarchical control architecture for large-scale interconnected systems (LSS). We consider the LSS as a network of physically coupled subsystems, equipped with a two-layer controller: on the local level, ...
In this paper we present a novel switching function for multiplicative watermarking systems. The switching function is based on the algebraic structure of elliptic curves over finite fields. The resulting function allows for both watermarking generator and remover to define appro ...
This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output ℓ 2 -gain, which characterizes the maxim ...
This work addresses the problem of cyber-attack isolation within a distributed diagnosis architecture for large-scale interconnected systems. Considering a distributed control architecture, malicious agents are capable of compromising the data exchanged between distributed contro ...
This work addresses the problem of cyber-attack isolation within a distributed diagnosis architecture for large-scale interconnected systems. Considering a distributed control architecture, malicious agents are capable of compromising the data exchanged between distributed contro ...

Contributed

2 records found

Defense Against Malicious Parameter Identification

System Immersion Coding and Hybrid Multiplicative Watermarking

Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identif ...
Due to the increase in traffic, road congestion has gone up. Vehicle platooning is a possible way to increase the capacity of a given road, by decreasing the distance between the vehicles in the platoon. At the moment, the control of vehicle platoons is commonly done using PID co ...