{"title":"包含单个恶意执行器的线性系统的水印安全子空间","authors":"Bharadwaj Satchidanandan, P. Kumar","doi":"10.1109/COMSNETS48256.2020.9027331","DOIUrl":null,"url":null,"abstract":"Consider a multiple-input, multiple-output, perfectly observed linear dynamical system containing an arbitrary set of malicious sensors, and at most one malicious actuator. The malicious sensors need not report their measurements truthfully and a malicious actuator may not apply inputs in accordance with the control law. The honest actuators in the system, if there are any, employ Dynamic Watermarking in order to detect the presence of malicious nodes. The state space of such a system can be decomposed into two orthogonal subspaces, called the watermark-securable and the watermark-unsecurable subspaces, such that the malicious sensors and actuators cannot degrade the state estimation performance of the honest sensors and actuators along the watermark-securable subspace if they wish to remain undetected. This paper presents a precise characterization of the watermark-securable subspace for any system containing at most one malicious actuator.","PeriodicalId":265871,"journal":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The Watermark-Securable Subspace of a Linear System Containing a Single Malicious Actuator\",\"authors\":\"Bharadwaj Satchidanandan, P. Kumar\",\"doi\":\"10.1109/COMSNETS48256.2020.9027331\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Consider a multiple-input, multiple-output, perfectly observed linear dynamical system containing an arbitrary set of malicious sensors, and at most one malicious actuator. The malicious sensors need not report their measurements truthfully and a malicious actuator may not apply inputs in accordance with the control law. The honest actuators in the system, if there are any, employ Dynamic Watermarking in order to detect the presence of malicious nodes. The state space of such a system can be decomposed into two orthogonal subspaces, called the watermark-securable and the watermark-unsecurable subspaces, such that the malicious sensors and actuators cannot degrade the state estimation performance of the honest sensors and actuators along the watermark-securable subspace if they wish to remain undetected. This paper presents a precise characterization of the watermark-securable subspace for any system containing at most one malicious actuator.\",\"PeriodicalId\":265871,\"journal\":{\"name\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSNETS48256.2020.9027331\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSNETS48256.2020.9027331","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Watermark-Securable Subspace of a Linear System Containing a Single Malicious Actuator
Consider a multiple-input, multiple-output, perfectly observed linear dynamical system containing an arbitrary set of malicious sensors, and at most one malicious actuator. The malicious sensors need not report their measurements truthfully and a malicious actuator may not apply inputs in accordance with the control law. The honest actuators in the system, if there are any, employ Dynamic Watermarking in order to detect the presence of malicious nodes. The state space of such a system can be decomposed into two orthogonal subspaces, called the watermark-securable and the watermark-unsecurable subspaces, such that the malicious sensors and actuators cannot degrade the state estimation performance of the honest sensors and actuators along the watermark-securable subspace if they wish to remain undetected. This paper presents a precise characterization of the watermark-securable subspace for any system containing at most one malicious actuator.