Cyber attacks benchmark simulator

In this benchmark, a malicious attacker wants to remain hidden while stealing water by altering the signals of the sensors of the levels of the tanks. It is assumed that the thieves can extract water from the tanks using extraction pumps with flow rates and, depending on the the theft and the type of sensor alteration, different attack scenarios are proposed.

 

Software


Simulink simulator