z-logo
open-access-imgOpen Access
Security analysis of cyber‐physical systems using H 2 norm
Author(s) -
Shames Iman,
Farokhi Farhad,
Summers Tyler H.
Publication year - 2017
Publication title -
iet control theory and applications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.059
H-Index - 108
eISSN - 1751-8652
pISSN - 1751-8644
DOI - 10.1049/iet-cta.2016.1391
Subject(s) - computer science , cyber physical system , norm (philosophy) , generator (circuit theory) , computer security , control theory (sociology) , reliability engineering , engineering , control (management) , artificial intelligence , power (physics) , physics , quantum mechanics , political science , law , operating system
In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks usingH 2 norms of attacks to target and monitoring outputs is proposed. In addition, optimisation problems for selecting inputs or outputs that point to attacks with maximum impact and least detectability are posed, and subsequently solved. To demonstrate the applicability of the analysis methods proposed in this study, the IEEE 9‐bus and 50‐generator 145‐bus systems are considered as test cases.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here