2017 IEEE 56th Annual Conference on Decision and Control (CDC) 2017
DOI: 10.1109/cdc.2017.8263914
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic watermarking for general LTI systems

Abstract: Detecting attacks in control systems is an important aspect of designing secure and resilient control systems. Recently, a dynamic watermarking approach was proposed for detecting malicious sensor attacks for SISO LTI systems with partial state observations and MIMO LTI systems with a full rank input matrix and full state observations; however, these previous approaches cannot be applied to general LTI systems that are MIMO and have partial state observations. This paper designs a dynamic watermarking approach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
36
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(37 citation statements)
references
References 21 publications
1
36
0
Order By: Relevance
“…Note, we have also modified the formula from [17], by including a constant term, and removing the scale matrix inverse from the trace in (27) due to the normalization carried out in (24). Note that for n < + k , the test statistic value is defined as 0.…”
Section: Dynamic Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Note, we have also modified the formula from [17], by including a constant term, and removing the scale matrix inverse from the trace in (27) due to the normalization carried out in (24). Note that for n < + k , the test statistic value is defined as 0.…”
Section: Dynamic Watermarkingmentioning
confidence: 99%
“…These methods were proven to detect arbitrary attack models [15] including attacks that replayed a measured signal [16]. These methods were later extended to generalized LTI systems [17], and to networked control systems [18].…”
Section: Introductionmentioning
confidence: 99%
“…A dynamic watermarking algorithm was proposed in [17] for integrity attack detection in networked CPSs. In [18], the authors introduced a security scheme that ensures detection of data injection attacks using a non-stationary watermarking technique. Finally, the authors in [19] analyzed the optimality of Gaussian watermarked signals in presence of cyber attacks in linear time-variant IoT-like systems.…”
Section: Introductionmentioning
confidence: 99%
“…A dynamic watermarking algorithm was proposed in [12] for integrity attack detection in networked CPSs. In [13], the authors introduced a security scheme that ensures detection of attacks that add a nonzeroaverage-power signal to sensor measurements using a nonstationary watermarking technique. Finally, the authors in [14] analyzed the optimality of Gaussian watermarked signals against cyber attacks in linear time-variant IoT-like systems.…”
Section: Introductionmentioning
confidence: 99%