Jairo Alonso Giraldo

Learn More
— The consensus algorithm can represent many problems in cooperative behavior, and has been widely used in engineering and social sciences. In this work we prove that the consensus model where the information that each agent receives from its neighbors has time-varying asynchronous delays and sampling, converges to an agreement independent of these(More)
The vulnerability of false data injection attacks on real-time electricity pricing for the power grid market has been recently explored. Previous work has focused on the impact caused by attackers that compromise pricing signals and send false prices to a subset of consumers. In this paper we extend previous work by considering a more powerful and general(More)
Networked Control Systems (NCS) has been one of the main research areas in the last few years, due to the benefits of the insertion of a communication network in distributed systems, and the widely area of applications such as tele-operations, robotics, UAVs, power systems, among others, and new growing areas like smart grids and Cyber-Physiscal Systems.(More)
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide(More)
— The Kuramoto oscillator has been widely studied because it can model biological, social, chemical, and engineering problems. Conditions for frequency synchronization of a network of Kuramoto oscillators have been well established, but it depends on the connectivity of the network and on the natural frequencies. In this work we propose a consensus-based(More)
— Motivated by the increasing interest in networked multi-agent systems and the wide number of applications in decentralized distributed control of smart grids, we address the problem of synchronization when each node (e.g., a microgrid, a distributed generator) is modeled as a linear-time continuous system whose output measurements are sent through(More)
Monitoring the " physics " of control systems to detect attacks is a growing area of research. In its basic form a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements in order to identify potentially false control commands or false sensor readings. In this paper, we(More)
—Recent work has studied the impact caused by attackers that compromise pricing signals used in the emerging retail electricity market and send false prices to a subset of consumers. In this paper, we extend previous work by considering a more realistic adversary model that is not arbitrarily tied to scaling and delay attacks, but that can generate any(More)