Y. Zhang, F. Xie, Y. Dong, G. Yang, and X. Zhou, HIGH FIDELITY VIRTUALIZATION OF CYBER-PHYSICAL SYSTEMS, International Journal of Modeling, Simulation, and Scientific Computing, vol.04, issue.02, p.2013
DOI : 10.1109/5.97300

D. Corman, V. Pillitteri, S. Tousley, M. Tehranipoor, and U. Lindqvist, NITRD Cyber-Physical Security Panel, 35th IEEE Symposium on Security and Privacy

A. A. Cardenas, S. Amin, and S. Sastry, Secure Control: Towards Survivable Cyber-Physical Systems, 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp.495-500, 2008.
DOI : 10.1109/ICDCS.Workshops.2008.40

URL : http://www.vs.inf.ethz.ch/edu/HS2011/CPS/papers/cardenas08_secure-control.pdf

A. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig et al., Challenges for securing cyber physical systems, Workshop on Future Directions in Cyber-Physical Systems Security, p.7, 2009.

S. Brown, Functional safety of electrical/electronic/programmable electronic safety related systems, Computing & Control Engineering Journal, vol.11, issue.11, p.14, 2000.

M. Clayton and . Cybersecurity, How US utilities passed up chance to protect their networks Cybersecurity-How-US-utilities-passed-up-chance-to-protect-their-networks, 2012.

J. Åkerberg and M. Björkman, Exploring Network Security in PROFIsafe, Computer Safety, Reliability, and Security: 28th International Conference. Proceedings, pp.67-80, 2009.
DOI : 10.3182/20080706-5-KR-1001.02364

Y. Mo, S. Weerakkody, and B. Sinopoli, Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs, IEEE Control Systems, vol.35, issue.1, pp.93-109, 2015.
DOI : 10.1109/MCS.2014.2364724

T. Roth and B. Mcmillin, Physical Attestation in the Smart Grid for Distributed State Verification, IEEE Transactions on Dependable and Secure Computing, issue.99, p.2016
DOI : 10.1109/compsac.2017.188

P. Barbosa, A. Brito, H. Almeida, and S. Clauß, Lightweight privacy for smart metering data by adding noise, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.531-538, 2014.
DOI : 10.1145/2554850.2554982

A. Arvani, S. Vittal, and . Rao, Detection and Protection Against Intrusions on Smart Grid Systems, International Journal of Cyber-Security and Digital Forensics, vol.3, issue.1, pp.38-48, 2014.
DOI : 10.17781/P001273

L. Van-long-do, I. Fillatre, and . Nikiforov, A statistical method for detecting cyber/physical attacks on SCADA systems, 2014 IEEE Conference on Control Applications (CCA), pp.364-369, 2014.

B. Genge, I. Kiss, and P. Haller, A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, International Journal of Critical Infrastructure Protection, vol.10, pp.3-17, 2015.
DOI : 10.1016/j.ijcip.2015.04.001

Y. Mo, T. Hyun-jin, K. Kim, D. Brancik, H. Dickinson et al., Cyber-Physical Security of a Smart Grid Infrastructure, Proceedings of the IEEE, pp.195-209, 2012.

R. Chabukswar, Secure Detection in Cyberphysical Control Systems, 2014.

F. Pasqualetti, Secure control systems: A control-theoretic approach to cyber-physical security, 2012.

Q. Zhu and T. Ba¸sarba¸sar, A hierarchical security architecture for smart grid, pp.413-438, 2012.
DOI : 10.1017/CBO9781139013468.019

. American-gas-association, Cryptographic Protection of SCADA Communications, 2006.

A. K. Wright, J. A. Kinast, and J. Mccarty, Low-Latency Cryptographic Protection for SCADA Communications, pp.263-277, 2004.
DOI : 10.1007/978-3-540-24852-1_19

URL : http://scadasafe.sourceforge.net/security.pdf

P. , P. International, . Standard, and . Profinet-security-guideline, http://www.profibus.com/download/specifications-standards/, Last access, Last access: Octobre 2014. [23] Frances Cleveland. IEC 62351 Security Standards for the Power System Information Infrastructure, 2013.

I. Research, The World Market for Industrial Ethernet -2009 Edition, 2009.

D. Eric and . Knapp, Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, p.2011

I. Research and . Safety, Safety networking for today and beyond, Library, 2017.

B. Batke, J. Wiberg, and D. Dubé, CIP Security Phase 1: Secure Transport for EtherNet/IP, ODVA 2015 Industry Conference & 17th Annual Meeting, p.15, 2015.

P. Ethernet, . Standardisation-group, and P. Ethernet, Communication Profile Specification (EPSG DS 301 V1.2.0), 2013.

J. Yung, H. Debar, and L. Granboulan, Security Issues and Mitigation in Ethernet POWERLINK, 2nd Workshop On The Security Of Industrial Control System & Cyber-Physical Systems, 2016.
DOI : 10.1109/INDIN.2013.6622965

URL : https://hal.archives-ouvertes.fr/hal-01560206

A. A. Cárdenas, S. Amin, Y. Zong-syun-lin, C. Huang, S. Huang et al., Attacks against process control systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.355-366, 2011.
DOI : 10.1145/1966913.1966959

G. Dán and H. Sandberg, Stealth Attacks and Protection Schemes for State Estimators in Power Systems, 2010 First IEEE International Conference on Smart Grid Communications, p.2010
DOI : 10.1109/SMARTGRID.2010.5622046

Y. Liu, P. Ning, and M. K. Reiter, False Data Injection Attacks Against State Estimation in Electric Power Grids, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pp.21-32, 2009.
DOI : 10.1145/1952982.1952995

URL : http://discovery.csc.ncsu.edu/~pning/pubs/ccs09-PowerGrids.pdf

A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson, Attack models and scenarios for networked control systems, Proceedings of the 1st international conference on High Confidence Networked Systems, HiCoNS '12, pp.55-64
DOI : 10.1145/2185505.2185515

Y. Mo, R. Chabukswar, and B. Sinopoli, Detecting integrity attacks on SCADA systems, IEEE Transactions on Control Systems Technology, vol.22, issue.4, pp.1396-1407, 2014.

S. Roy and . Smith, Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure, IEEE Control Systems, vol.35, issue.1, pp.82-92, 2015.

A. Hoehn and P. Zhang, Detection of covert attacks and zero dynamics attacks in cyber-physical systems, 2016 American Control Conference (ACC), pp.302-307, 2016.
DOI : 10.1109/ACC.2016.7524932

Y. Yuan, Q. Zhu, F. Sun, Q. Wang, and T. Ba¸sarba¸sar, Resilient control of cyber-physical systems against Denial-of-Service attacks, 2013 6th International Symposium on Resilient Control Systems (ISRCS), pp.54-59, 2013.
DOI : 10.1109/ISRCS.2013.6623750

A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, A secure control framework for resource-limited adversaries, Automatica, vol.51, pp.135-148, 2015.
DOI : 10.1016/j.automatica.2014.10.067

URL : http://arxiv.org/pdf/1212.0226

Y. Chen, S. Kar, and J. M. Moura, Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information, IEEE Transactions on Automatic Control, vol.62, issue.9, pp.1-1, 2016.
DOI : 10.1109/TAC.2016.2626267

URL : http://arxiv.org/pdf/1503.07125

F. Pasqualetti, F. Dorfler, and F. Bullo, Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems, IEEE Control Systems, vol.35, issue.1, pp.110-127, 2015.
DOI : 10.1109/MCS.2014.2364725

Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, False data injection attacks against state estimation in wireless sensor networks, 49th IEEE Conference on Decision and Control (CDC), pp.5967-5972, 2010.
DOI : 10.1109/CDC.2010.5718158

W. Gao, H. Thomas, and . Morris, On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems, Journal of Digital Forensics, Security and Law, vol.9, issue.1, p.37, 2014.
DOI : 10.15394/jdfsl.2014.1162

URL : https://doi.org/10.15394/jdfsl.2014.1162

B. Rakesh, K. Bobba, H. Wang, K. Khurana, . Nahtstedt et al., Detecting False Data Injection Attacks on DC State Estimation, Proceeding of the 1st Workshop on Secure Control Systems (CPSWEEK), pp.1-9, 2010.

Y. Liu, P. Ning, K. Michael, and . Reiter, False data injection attacks against state estimation in electric power grids, ACM Transactions on Information and System Security, vol.14, issue.1, p.13, 2011.
DOI : 10.1145/1952982.1952995

URL : http://discovery.csc.ncsu.edu/~pning/pubs/ccs09-PowerGrids.pdf

R. S. Smith, A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems, {IFAC} Proceedings Volumes 18th {IFAC} World Congress, pp.90-95, 2011.
DOI : 10.3182/20110828-6-IT-1002.01721

W. Gao, T. Morris, B. Reaves, and D. Richey, On SCADA control system command and response injection and intrusion detection, 2010 eCrime Researchers Summit, pp.1-9, 2010.

H. Thomas, W. Morris, and . Gao, Industrial control system cyber attacks

I. Hwang, S. Kim, Y. Kim, and C. Seah, A Survey of Fault Detection, Isolation, and Reconfiguration Methods, IEEE Transactions on Control Systems Technology, vol.18, issue.3, pp.636-653, 2010.
DOI : 10.1109/TCST.2009.2026285

R. Langner, Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011.
DOI : 10.1109/MSP.2011.67

Y. Mo and B. Sinopoli, Secure control against replay attacks, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.911-918, 2009.
DOI : 10.1109/ALLERTON.2009.5394956

URL : http://users.ece.cmu.edu/~brunos/Publications/allerton_2009.pdf

F. Miao, M. Pajic, and G. J. Pappas, Stochastic game approach for replay attack detection, 52nd IEEE Conference on Decision and Control, pp.1854-1859, 2013.

Q. Zhu and T. Ba¸sarba¸sar, Dynamic policy-based IDS configuration, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pp.8600-8605, 2009.
DOI : 10.1109/CDC.2009.5399894

A. Y. Lokhov, N. Lemons, T. C. Mcandrew, A. Hagberg, and S. Backhaus, Detection of Cyber-Physical Faults and Intrusions from Physical Correlations, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp.303-310, 2016.
DOI : 10.1109/ICDMW.2016.0050

URL : http://arxiv.org/pdf/1602.06604

Y. Wang, Z. Xu, J. Zhang, L. Xu, H. Wang et al., SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA, Computer Security -ESORICS 2014: 19th European Symposium on Research in Computer Security Proceedings, Part II, pp.401-418, 2014.
DOI : 10.1007/978-3-319-11212-1_23

URL : http://faculty.cs.tamu.edu/guofei/paper/SRID-ESORICS14.pdf

M. Dehghani, Z. Khalafi, A. Khalili, and A. Sami, Integrity attack detection in PMU networks using static state estimation algorithm, 2015 IEEE Eindhoven PowerTech, pp.1-6, 2015.
DOI : 10.1109/PTC.2015.7232265

P. Chen, S. Yang, and J. A. Mccann, Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems, IEEE Transactions on Industrial Electronics, vol.62, issue.6, pp.3832-3842, 2015.
DOI : 10.1109/TIE.2014.2350451

URL : http://spiral.imperial.ac.uk/bitstream/10044/1/19130/2/IEEE-TIE.pdf

Q. Zhu, Game-theoretic methods for security and resilience in cyber-physical systems, 2013.

Q. Zhu and T. Ba¸sarba¸sar, Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems, IEEE Control Systems, vol.35, issue.1, pp.46-65, 2015.
DOI : 10.1109/MCS.2014.2364710

I. David, J. Urbina, A. A. Giraldo, J. Cardenas, M. Valente et al., Survey and New Directions for Physics-Based Attack Detection in Control Systems, National Institute of Standards and Technology (NIST), pp.1-37, 2016.

L. Ljung, Perspectives on system identification, Annual Reviews in Control, vol.34, issue.1, pp.1-12, 2010.
DOI : 10.1016/j.arcontrol.2009.12.001

URL : http://www.control.isy.liu.se/%7Eljung/seoul2dvinew/plenary2.pdf

G. C. Goodwin, M. Gevers, and B. Ninness, Quantifying the error in estimated transfer functions with application to model order selection, IEEE Transactions on Automatic Control, vol.37, issue.7, pp.913-928, 1992.
DOI : 10.1109/9.148344

URL : http://murray.newcastle.edu.au/users/staff/brett/ggn.ps.gz

L. Ljung, System identification: Theory for the User, 1987.

H. Natke, System identification, Automatica, vol.28, issue.5, pp.1069-1071, 1992.
DOI : 10.1016/0005-1098(92)90167-E

N. Lawrence and R. , Model predictive control of a continuous, nonlinear, two-phase reactor, Journal of Process Control, vol.3, issue.2, pp.109-123, 1993.
DOI : 10.1016/0959-1524(93)80006-W

. Märta-barenthin and . Syberg, Complexity Issues, Validation and Input Design for Control in System Identification, KTH School of Electrical Engineering, 2008.

W. Tae-hoon-lee, . Sang-ra, T. Seung-hee-jin, J. B. Sung-yoon, and . Park, Robust Extended Kalman Filtering via Krein Space Estimation, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, issue.1, pp.87-243, 2004.

W. P. Heemels and N. Van-de-wouw, Stability and Stabilization of Networked Control Systems, pp.203-253, 2010.
DOI : 10.1007/978-0-85729-033-5_7

Y. Cheng-ching, Autotuning of PID Controllers, 2006.

A. Barrientos, I. Aguirre, J. D. Cerro, and P. Portero, LQG vs PID in attitude control of a unmanned aerial vehicle in hover, 10th International Conference on Advanced Robotics (ICAR) 2001, pp.599-604, 2001.

W. Zhang, M. S. Branicky, and S. M. Phillips, Stability of networked control systems, IEEE Control Systems Magazine, vol.21, issue.1, pp.84-99, 2001.
DOI : 10.1109/37.898794

. Ke-you, L. You, and . Xie, Survey of Recent Progress in Networked Control Systems, Acta Automatica Sinica, vol.39, issue.2, pp.101-117, 2013.

V. Jos-'e-salt, . Casanova, R. Cuenca, and . Pizá, Sistemas de Control Basados en Red Modelado y Dise??o de Estructuras de Control, Revista Iberoamericana de Autom??tica e Inform??tica Industrial RIAI, vol.5, issue.3, pp.5-20, 2008.
DOI : 10.1016/S1697-7912(08)70157-2

W. P. Heemels and M. C. Donkers, Model-based periodic event-triggered control for linear systems, Automatica, vol.49, issue.3, pp.698-711, 2013.
DOI : 10.1016/j.automatica.2012.11.025

W. Heemels, . Donkers, R. Andrew, and . Teel, Periodic Event-Triggered Control for Linear Systems, IEEE Transactions on Automatic Control, vol.58, issue.4, pp.847-861, 2013.
DOI : 10.1109/TAC.2012.2220443

D. Han, Y. Mo, J. Wu, S. Weerakkody, B. Sinopoli et al., Stochastic Event-Triggered Sensor Schedule for Remote State Estimation, IEEE Transactions on Automatic Control, vol.60, issue.10, pp.602661-2675, 2015.
DOI : 10.1109/TAC.2015.2406975

URL : http://arxiv.org/pdf/1402.0599

R. G. Aarts, System identification and parameter estimation, 2012.

Y. Zhu, New Developments in Industrial MPC Identification, Proceedings of the International Symposium on Advanced Control of Chemical Processes (ADChEM). Hong Kong, 2003.
DOI : 10.1016/S1474-6670(17)38705-0

T. Soderstrom and P. Stoica, System Identification, Journal of Dynamic Systems, Measurement, and Control, vol.115, issue.4, 1989.
DOI : 10.1115/1.2899207

Y. Zhu, F. Butoyi, D. Benelux, and N. , Multivariable and closed-loop identification for model predictive control, 2000.

Y. Chetouani, Using arx approach for modelling and prediction of the dynamics of a reactor-exchanger, In INSTITUTION OF CHEMICAL ENGINEERS SYMPOSIUM SERIES Institution of Chemical Engineers, vol.154, p.297, 1999.

R. Chabukswar, B. Sinopoli, G. Karsai, A. Giani, H. Neema et al., Simulation of Network Attacks on SCADA Systems, First Workshop on Secure Control Systems, Cyber Physical Systems Week, 2010.
DOI : 10.3182/20110828-6-it-1002.03712

URL : http://users.ece.cmu.edu/~brunos/Publications/ifac11.pdf

H. James, S. C. Graham, and . Patel, Security Considerations in SCADA Communication Protocols, 2004.

A. Kaung and M. , Secure Water Treatment Testbed (SWaT): An Overview, 2015.

C. Siaterlis, B. Genge, and M. Hohenadel, EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation, IEEE Transactions on Emerging Topics in Computing, vol.1, issue.2, pp.319-330, 2013.
DOI : 10.1109/TETC.2013.2287188

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=6646193

B. Green, D. Hutchison, S. A. , F. Frey, and A. Rashid, Testbed diversity as a fundamental principle for effective ICS security research, Proceedings of the First International Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN). Lancaster University, pp.12-15, 2016.

T. Yardley, Testbed cross-cutting research, 2014, https://tcipg.org/research/ testbed-cross-cutting-research, Last access, 2016.

A. Sánchez-aragó, E. R. Martínez, and S. S. Clares, SCADA Laboratory and Test-bed as a Service for Critical Infrastructure Protection, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, pp.25-29
DOI : 10.14236/ewic/ics-csr2014.4

M. Krotofil and J. Larsen, Rocking the pocket book: Hacking chemical plants for competition and extortion, DEF CON, vol.23, 2015.

Y. Zhang, F. Xie, Y. Dong, G. Yang, and X. Zhou, HIGH FIDELITY VIRTUALIZATION OF CYBER-PHYSICAL SYSTEMS, International Journal of Modeling, Simulation, and Scientific Computing, vol.04, issue.02, pp.1-26, 2013.
DOI : 10.1109/5.97300

F. Bellard, QEMU, a Fast and Portable Dynamic Translator, Annual Technical Conference, ATEC'05, pp.41-46, 2005.

R. Candell, K. Stouffer, and D. Anand, A cybersecurity testbed for industrial control systems, Process Control and Safety Symposium, International Society of Automation, 2014.
DOI : 10.6028/NIST.IR.8089

S. Mclaughlin, C. Konstantinou, X. Wang, L. Davi, A. Sadeghi et al., The Cybersecurity Landscape in Industrial Control Systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016.
DOI : 10.1109/JPROC.2015.2512235

G. Koutsandria, R. Gentz, M. Jamei, A. Scaglione, S. Peisert et al., A real-time testbed environment for cyber-physical security on the power grid A Survey of Industrial Control System Testbeds, 1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy Secure IT Systems: 20th Nordic Conference Proceedings, pp.67-78, 2015.

F. Gene, D. Franklin, . Powell, L. Michael, and . Workman, Digital control of dynamic systems, 1998.

B. Brumback and M. Srinath, A Chi-square test for fault-detection in Kalman filters, IEEE Transactions on Automatic Control, vol.32, issue.6, pp.552-554, 1987.
DOI : 10.1109/TAC.1987.1104658

S. Tripathi and M. A. Ikbal, Step Size Optimization of LMS Algorithm Using Aunt Colony Optimization & Its comparison with Particle Swarm optimization Algorithm in System Identification, International Research Journal of Engineering and Technology (IRJET), vol.2, pp.599-605, 2015.

S. Simon and . Haykin, Adaptive filter theory. Pearson Education India, 2014.

B. Widrow, M. John, . Mccool, G. Michael, C. Larimore et al., Stationary and nonstationary learning characteristics of the LMS adaptive filter, Proceedings of the IEEE, pp.1151-1162, 1976.
DOI : 10.1007/978-94-010-1223-2_23

R. Chabukswar, Y. Mo, and B. Sinopoli, Detecting Integrity Attacks on SCADA Systems, IFAC Proceedings Volumes, pp.11239-11244, 2011.
DOI : 10.3182/20110828-6-IT-1002.03712

URL : http://users.ece.cmu.edu/~brunos/Publications/ifac11.pdf

S. Weyer, M. Schmitt, M. Ohmer, and D. Gorecky, Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems, IFAC-PapersOnLine, vol.48, issue.3, pp.579-584, 2015.
DOI : 10.1016/j.ifacol.2015.06.143

J. Lee, B. Bagheri, and H. Kao, A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Manufacturing Letters, vol.3, pp.18-23, 2015.
DOI : 10.1016/j.mfglet.2014.12.001

R. Baheti and H. Gill, Cyber-physical systems. The impact of control technology, pp.161-166, 2011.

B. Satchidanandan, R. Panganamala, and . Kumar, Dynamic Watermarking: Active Defense of Networked Cyber???Physical Systems, Proceedings of the IEEE, pp.219-240, 2017.
DOI : 10.1109/JPROC.2016.2575064

URL : https://doi.org/10.1109/jproc.2016.2575064

D. Had?iosmanovi´chad?iosmanovi´c, R. Sommer, E. Zambon, and P. H. Hartel, Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes, Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC '14, pp.126-135, 2014.

D. I. Urbina, J. A. Giraldo, A. A. Cardenas, N. O. Tippenhauer, J. Valente et al., Limiting the Impact of Stealthy Attacks on Industrial Control Systems, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1092-1105, 2016.
DOI : 10.1109/CPRE.2011.6035612

URL : http://dl.acm.org/ft_gateway.cfm?id=2978388&type=pdf

R. Group, La Cybersécurité des Réseaux Electriques Intelligents. White book. La Revue de l'Electricité et de l, Electronique (REE), 2016.

K. Curtis and . Primer, A basic technical overview of the protocol, 2005.

S. Sonali, S. B. Lagu, and . Deshmukh, Raspberry Pi for Automation of Water Treatment Plant, Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on, pp.532-536, 2015.

L. Lennart, System Identification Toolbox: User's Guide, 2012.

D. Seung-yeob-nam, J. Kim, and . Kim, ARP: preventing ARP poisoning-based man-in-the-middle attacks, IEEE communications letters, vol.14, issue.2, pp.187-189, 2010.

G. Hayes and K. El-khatib, Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), pp.179-184, 2013.
DOI : 10.1109/ICCITechnology.2013.6579545

. Un-filtre-de, Kalman qui produit une estimation optimale d'état?xétat? état?x t de l'état x t en fonction des mesures de bruit obtenues

U. Régulateur-linéaire-quadratique, LQR) qui fournit la loi de contrôle u t qui résout le problème LQR, en fonction de l'estimation de l'état?xétat? état?x t

B. Remarque, 1. Il est important de noter que la définition donnée ci-dessus suppose que l'attaquant ne possède pas (ou ne tente pas de rassembler) des connaissances du modèle du système. Pour cette raison
URL : https://hal.archives-ouvertes.fr/pasteur-01256155

. La-littérature-traditionnelle, utilisation de stratégies de contrôle pour conserver, par exemple, la performance de la boucle-fermée du système ou les propriétés de sûreté d'un réseau de communication reliant les composants distribués d'un système physique. Cependant

L. Communauté-de-contrôle-travaille-activement, adapter les stratégies de contrôle traditionnelles utilisées pour détecter les failles accidentelles et les erreurs, vers la détection d'attaques malveillantes [75, 77, 78]. Motivés par les mêmes objectifs, nous présentons une solution qui complète le détecteur de signature afin de couvrir ces faiblesses. Plus précisément, la nouvelle solution combine les stratégies de contrôle avec la stratégie de défi-réponse analysée et améliorée dans la section précédente