2015
DOI: 10.1109/mcs.2014.2364724
|View full text |Cite
|
Sign up to set email alerts
|

Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
91
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 389 publications
(94 citation statements)
references
References 15 publications
2
91
0
1
Order By: Relevance
“…More specifically, we focus on the adaptation of physical-layer failure detection mechanisms (e.g., systems for the detection of faults and accidents) to handle, as well as, attacks (e.g., replay and integrity attacks conducted by malicious adversaries). We extend the work proposed in [3] which reexamines the security of a specific scheme proposed by Mo et al in [4,5].…”
Section: Introductionmentioning
confidence: 85%
See 4 more Smart Citations
“…More specifically, we focus on the adaptation of physical-layer failure detection mechanisms (e.g., systems for the detection of faults and accidents) to handle, as well as, attacks (e.g., replay and integrity attacks conducted by malicious adversaries). We extend the work proposed in [3] which reexamines the security of a specific scheme proposed by Mo et al in [4,5].…”
Section: Introductionmentioning
confidence: 85%
“…• We reexamine the effectiveness of the attack detector proposed in [4,5] under new adversary models.…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations