2016 IEEE Conference on Communications and Network Security (CNS) 2016
DOI: 10.1109/cns.2016.7860529
|View full text |Cite
|
Sign up to set email alerts
|

Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The latter system, viz., a system of self-driving vehicles, consists of a set of vehicles tracking a given position vs. time trajectory in an automated manner without any human intervention. Some of the results pertaining to this system were earlier reported in our conference paper [19]. In each of these systems, we first show how cyber attacks on sensors can compromise safety and cause collisions between vehicles in the system in spite of the presence of a collision avoidance module that is present in them.…”
Section: Introductionmentioning
confidence: 85%
See 2 more Smart Citations
“…The latter system, viz., a system of self-driving vehicles, consists of a set of vehicles tracking a given position vs. time trajectory in an automated manner without any human intervention. Some of the results pertaining to this system were earlier reported in our conference paper [19]. In each of these systems, we first show how cyber attacks on sensors can compromise safety and cause collisions between vehicles in the system in spite of the presence of a collision avoidance module that is present in them.…”
Section: Introductionmentioning
confidence: 85%
“…Specifically, it is shown in these papers that Dynamic Watermarking can secure, in a very precise sense, many broad classes of linear systems from arbitrary attack strategies. One of the central results of these papers, termed as the fundamental security guarantee of Dynamic Watermarking, was also established in the context of a specific nonlinear dynamical model that describes the motion of a vehicle on a plane [19]. In this article, we apply the technique of Dynamic Watermarking to secure two transportation cyberphysical systems of topical interest, namely, (i) an adaptive cruise control system, or a vehicle platoon, and (ii) a system of self-driving vehicles.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While the probability distribution of the watermark can be disclosed to other nodes, its actual realization is kept secret. How to analyze the purported measurements and build an attack detector are shown in [2], while the authors in [3] and [4] showcase the application of the dynamic watermarkingbased approach in various control systems. Their hardware experiments have verified the effectiveness of this approach in quickly and accurately detecting cyberattacks on sensor measurements.…”
mentioning
confidence: 99%
“…1) We propose an auxiliary test criterion for detecting cyberattacks when the variance of the sensor noise is not known. Since the watermark tests developed in [3] and [4] depend on the statistics of the sensor noise, their performance depends on the accuracy of the knowledge of the statistics. To overcome the vulnerability of the dynamic watermarking approach with respect to this assumption, we propose an auxiliary watermark test that only needs the variance of the watermark superimposed on the control inputs but not the variance of the sensor noise.…”
mentioning
confidence: 99%