This paper addresses the detection and isolation of replay attacks on sensor measurements. As opposed to previously proposed additive watermarking, we propose a multiplicative watermarking scheme, where each sensor's output is separately watermarked by being fed to a SISO watermark generator. Additionally, a set of equalizing filters is placed at the controller's side, which reconstructs the original output signals from the received watermarked data. We show that the proposed scheme has several advantages over existing approaches: it has no detrimental effects on the closed-loop performance in the absence of attacks; it can be designed in a modular fashion, independently of the design of the controller and anomaly detector; it facilitates t...
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
This paper considers the problem of designing physical watermark signals to protect a control system...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
4siThis letter proposes a threat discrimination methodology for distinguishing between sensor repla...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This article presents a novel secure-control framework against sensor deception attacks. The vulnera...
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
This paper considers the problem of designing physical watermark signals to protect a control system...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
4siThis letter proposes a threat discrimination methodology for distinguishing between sensor repla...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This article presents a novel secure-control framework against sensor deception attacks. The vulnera...
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper investigates the security issue of the data replay attacks on the control systems. The at...