- Full text PDF available (6)
—Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here we demonstrate the use of C2WindTunnel to simulate a plant and its… (More)
Ensuring security of systems based on supervisory control and data acquisition (SCADA) is a major challenge. In this paper we analyze the effect of integrity attacks on control systems and provide countermeasure capable of exposing such attacks. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and… (More)
Cyber-physical systems employing remote sensors and actuators and sparse communication networks are pervading the infrastructure. In this paper we consider a prototypical problem of estimating a binary state using measurements provided by binary sensors. We propose a new approach to estimate the states based on sensor measurements that may have been… (More)
In this paper, variants of the Ramsey Number problem are investigated. In particular, chromatic graphs not containing almost monochromatic triangles for color spectrum and color wheel, finite metric spaces not containing almost equilateral triangles and the relations between these different problems and the original Ramsey problem are studied.
— Sensor networks use binary measurements and state estimations for several reasons, including communication and processing overheads. Such a state estimator is vulnerable to attackers that can hijack a subset of the sensors in an effort to change the state estimate. After exhibiting a simulation that demonstrates the possible effect of integrity… (More)