Scenario-based defense mechanism against vulnerabilities in Lagrange-based DMPC

نویسندگان

چکیده

In this paper, we present an analysis of the vulnerability a distributed model predictive control (DMPC) scheme in context cyber-security. We consider different types so-called insider attacks. particular, situation where one local controllers sends false information to others manipulate costs for its own advantage. Then, propose popular scenario-based mechanism protect or, at least, relieve consequences attack typical DMPC negotiation process. The theoretical and algorithmic properties defense are also analyzed. A real case study based on four tank plant is provided illustrate both attacks mechanisms.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prediction of defense mechanism styles based on executive functions

Combining psychoanalysis and neurology feels peculiar at first. The combination that tries to bind concepts of psychoanalysis with neuroscience in order to provide integrates knowledge for better understanding of human mind. However, interaction between psychoanalysis and neuroscience has came to attention during past three decades. Purpose of this study is to investigate and find correlation b...

متن کامل

RICH: Automatically Protecting Against Integer-Based Vulnerabilities

We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bugs, a popular avenue of attack and frequent programming error [1–15], occur when a variable value goes out of the range of the machine word used to materialize it, e.g. when assigning a large 32-bit int to a 16-bit short...

متن کامل

ViWiD : Visible Watermarking Based Defense Against Phishing

In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s web server and it does not require installation of any tool or storage of any data, such as keys or history l...

متن کامل

A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment

Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...

متن کامل

Location Verification Based Defense Against Sybil Attack in Sensor Networks

Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols including...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Control Engineering Practice

سال: 2021

ISSN: ['1873-6939', '0967-0661']

DOI: https://doi.org/10.1016/j.conengprac.2021.104879