{"title":"On the Watermark-Securable Subspace of a Linear Stochastic System","authors":"Bharadwaj Satchidanandan, P. Kumar","doi":"10.1109/ICC47138.2019.9123155","DOIUrl":null,"url":null,"abstract":"We consider a multiple-input, multiple-output perfectly observed linear dynamical system with an arbitrary set of malicious sensors and actuators. The honest actuators watermark their control inputs and perform certain tests to detect the presence of malicious sensors. The state space of such a system can be decomposed into two orthogonal subspaces, called the watermark-securable and the watermark-unsecurable subspaces, such that no matter what attack strategy the malicious sensors and actuators employ, they cannot degrade the state estimation performance of the honest sensors and actuators along the watermark-securable subspace if they wish to remain undetected. This paper characterizes a certain subset of the watermark-securable subspace.","PeriodicalId":231050,"journal":{"name":"2019 Sixth Indian Control Conference (ICC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Sixth Indian Control Conference (ICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICC47138.2019.9123155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
We consider a multiple-input, multiple-output perfectly observed linear dynamical system with an arbitrary set of malicious sensors and actuators. The honest actuators watermark their control inputs and perform certain tests to detect the presence of malicious sensors. The state space of such a system can be decomposed into two orthogonal subspaces, called the watermark-securable and the watermark-unsecurable subspaces, such that no matter what attack strategy the malicious sensors and actuators employ, they cannot degrade the state estimation performance of the honest sensors and actuators along the watermark-securable subspace if they wish to remain undetected. This paper characterizes a certain subset of the watermark-securable subspace.