Attack Detection Through Time Fingerprinting: A Stochastic Event-Triggered Control Approach
I. van Straalen (TU Delft - Team Riccardo Ferrari)
A.J. Gallo (Politecnico di Milano)
Riccardo M.G. Ferrari (TU Delft - Team Riccardo Ferrari)
M. Mazo (TU Delft - Team Manuel Mazo Jr)
More Info
expand_more
Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.
Abstract
We propose a novel cyber-attack detection scheme for control schemes regulated via Stochastic Event-Triggered Control, to detect packets that are maliciously injected by an adversary. The diagnosis scheme relies on assessing whether the arrival time of the information packets received from the controller are compatible with the nominal probability distribution of triggering, or whether they are anomalous. To contrast the threat of an eavesdropping adversary capable of estimating the nominal triggering distribution, we propose a switching scheme, whereby the probability of triggering is drawn among a set of stochastic triggering mechanisms, which is such that the reconstruction of the communication pattern by an eavesdropper becomes computationally infeasible. We design the set of stochastic triggering mechanisms via the solution of an optimization problem, which embeds an explicit trade-off between the properties of the nominal Stochastic Event-Triggered Controller and the detection scheme. The results are illustrated through a numerical example.
Files
File under embargo until 12-06-2026