Abstract

This work considers destabilization attacks acting on a single link in a system's logical interconnection structure. This structure, or signal architecture, is characterized by the causal relationships among exposed signals within a network of interconnected systems. The concept of a vulnerable link is thus characterized, and necessary and sufficient conditions for identifying vulnerable links are provided. The vulnerability of various system architectures are then characterized by the vulnerability of their weakest link, and it is shown that every transfer function has a completely secure architecture with no vulnerable links. A numerical example then illustrate these concepts with concrete architectures.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call