2016 IEEE 55th Conference on Decision and Control (CDC) 2016
DOI: 10.1109/cdc.2016.7798283
|View full text |Cite
|
Sign up to set email alerts
|

Secure control of networked cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…We do not restrict the range of false-data attacks. With this abstraction in hand, it is possible to develop an active defense based on the idea of "dynamic watermarking" [76], [77], [79]. The basic idea is illustrated in Fig.…”
Section: A Securing Manufacturing Controllers Via Dynamic Watermarksmentioning
confidence: 99%
See 1 more Smart Citation
“…We do not restrict the range of false-data attacks. With this abstraction in hand, it is possible to develop an active defense based on the idea of "dynamic watermarking" [76], [77], [79]. The basic idea is illustrated in Fig.…”
Section: A Securing Manufacturing Controllers Via Dynamic Watermarksmentioning
confidence: 99%
“…This idea was introduced in [103] to detect replay attacks and extended in [104] to detect other attacks. The articles [79], [102], [105] develop detectors that provably detect arbitrary attacks that introduce nonzero power distortion. Dynamic watermarking is a general methodology that can apply in a variety of contexts.…”
Section: Fig 12 Dynamic Watermarking: the Actuator Node I Adds A Secret Noise E I (T) "Watermark" To The Nominal Control Input U Inominalmentioning
confidence: 99%
“…[24] also considered attack surface is considered where a subset of control input can be manipulated by the attacker. Later, [25]-[27] introduced the distortion power as a general metric for arbitrary attack scenarios and developed testing scheme that ensures zero power distortion. In [28]- [30], the authors used securable and unsecurable subspaces of the linear dynamic system to analyze the capability of applying dynamic watermarking for a given system.…”
Section: A Related Workmentioning
confidence: 99%
“…The honest actuators can therefore detect malicious sensors by checking if the measurements reported by the sensors are appropriately correlated with the watermark. In our prior work [38][39][40], we have shown that by using this approach, and subjecting the reported sequence of measurements to two particular tests of sensor veracity, it can be ensured that the malicious sensors, no matter what attack strategy they employ, do not distort the measurements beyond adding a zero power signal to the noise already entering the system. This result, known as the fundamental security guarantee of Dynamic Watermarking, was established for broad classes of linear systems.…”
Section: Related Workmentioning
confidence: 99%
“…In our prior work [38][39][40]44], we developed the approach of Dynamic Watermarking to secure a cyber-physical system and established the security guarantees that it provides. Specifically, it is shown in these papers that Dynamic Watermarking can secure, in a very precise sense, many broad classes of linear systems from arbitrary attack strategies.…”
Section: Introductionmentioning
confidence: 99%