Log In Sign Up

Design of multiplicative watermarking against covert attacks

by   Alexander J. Gallo, et al.

This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output l2-gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control problem is non-convex. Hence, we propose an algorithm to design the watermarking filters by solving the problem suboptimally via LMIs. We show that, against covert attacks, the output-to-output l2-gain is unbounded without watermarking, and we provide a sufficient condition for boundedness in the presence of watermarks.


page 1

page 2

page 3

page 4


Average Cost Optimal Control of Stochastic Systems Using Reinforcement Learning

This paper addresses the average cost minimization problem for discrete-...

Active RISs: Signal Modeling, Asymptotic Analysis, and Beamforming Design

Reconfigurable intelligent surfaces (RISs) have emerged as a candidate t...

Robust Data-Driven Output Feedback Control via Bootstrapped Multiplicative Noise

We propose a robust data-driven output feedback control algorithm that e...

Optimal control of nonlocal continuity equations: numerical solution

The paper addresses an optimal ensemble control problem for nonlocal con...

Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design

This paper discusses the problem of estimating the state of a linear tim...

Deep Optimization of Parametric IIR Filters for Audio Equalization

This paper describes a novel Deep Learning method for the design of IIR ...