4.7 Article

Proactive attack detection scheme based on watermarking and moving target defense

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Sensor Switching Control Under Attacks Detectable by Finite Sample Dynamic Watermarking Tests

Pedro Hespanhol et al.

Summary: This article investigates the enhancement of control system security through dynamic watermarking for detecting malicious attacks on sensor measurements. The focus is on designing sensor switching strategies to improve security and performance, with validation through simulation analysis in an autonomous driving setting.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Automation & Control Systems

A Moving Target Defense for Securing Cyber-Physical Systems

Paul Griffioen et al.

Summary: This article discusses the design and analysis of multiple moving target defenses to recognize and isolate attacks on cyber-physical systems. By introducing stochastic, time-varying parameters, attackers' knowledge of the system model is limited, inhibiting their ability to construct stealthy attack sequences. Three main designs are explored, including hybrid systems, extended systems, and sensor nonlinearities, to enhance the effectiveness of moving target defense.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Automation & Control Systems

A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks

Riccardo M. G. Ferrari et al.

Summary: This article proposes a watermarking approach for detecting stealthy attacks on sensor measurements, ensuring data verification and source authentication. Designing watermark filters and a switching protocol guarantees the performance and stability of the watermark scheme to allow for detectable cyber-attacks.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Automation & Control Systems

A Moving Target Defense Control Framework for Cyber-Physical Systems

Aris Kanellopoulos et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2020)

Article Engineering, Electrical & Electronic

Reliable Cross-Technology Communication With Physical-Layer Acknowledgement

Hao He et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Automation & Control Systems

An Online Approach to Physical Watermark Design

Hanxiao Liu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2020)

Article Automation & Control Systems

Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2020)

Proceedings Paper Computer Science, Cybernetics

Replay attack detection using a zonotopic KF and LQ approach

Carlos Trapiello et al.

2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2020)

Article Automation & Control Systems

On the Design of Security-Guaranteeing Dynamic Watermarks

Bharadwaj Satchidanandan et al.

IEEE CONTROL SYSTEMS LETTERS (2020)

Article Automation & Control Systems

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

Jiahao Huang et al.

AUTOMATICA (2020)

Article Computer Science, Theory & Methods

A moving target defense and network forensics framework for ISP networks using SDN and NFV

Abdullah Aydeger et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Optimal strategy selection approach to moving target defense based on Markov robust game

Jing-lei Tan et al.

COMPUTERS & SECURITY (2019)

Article Automation & Control Systems

Interval Estimation Methods for Discrete-Time Linear Time-Invariant Systems

Wentao Tang et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)

Proceedings Paper Automation & Control Systems

A Tutorial on Detecting Security Attacks on Cyber-Physical Systems

Paul Griffioen et al.

2019 18TH EUROPEAN CONTROL CONFERENCE (ECC) (2019)

Article Engineering, Electrical & Electronic

Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems

Bharadwaj Satchidanandan et al.

PROCEEDINGS OF THE IEEE (2017)

Article Automation & Control Systems

Constrained zonotopes: A new tool for set-based estimation and fault detection

Joseph K. Scott et al.

AUTOMATICA (2016)

Article Automation & Control Systems

A secure control framework for resource-limited adversaries

Andre Teixeira et al.

AUTOMATICA (2015)

Article Automation & Control Systems

PHYSICAL AUTHENTICATION OF CONTROL SYSTEMS DESIGNING WATERMARKED CONTROL INPUTS TO DETECT COUNTERFEIT SENSOR OUTPUTS

Yilin Mo et al.

IEEE CONTROL SYSTEMS MAGAZINE (2015)

Article Computer Science, Information Systems

Finding Focus in the Blur of Moving-Target Techniques

Hamed Okhravi et al.

IEEE SECURITY & PRIVACY (2014)

Article Automation & Control Systems

Zonotopic guaranteed state estimation for uncertain systems

Vu Tuan Hieu Le et al.

AUTOMATICA (2013)

Article Automation & Control Systems

Guaranteed state estimation by zonotopes

T Alamo et al.

AUTOMATICA (2005)