Monitoring of stealthy attack in networked control systems
Résumé
The first part of this paper describes a zero dynamic attack strategy that an attacker located inside the network of a networked control systems can use to act on the physical world while remaining undetectable. The second part shows how to detect the presence of the adversary in absence of sensor or actuator fault.