In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is considered. We propose a multiplicative watermarking scheme, where each sensor’s output is individually fed to a SISO watermark generator whose parameters are supposed to be unknown to the adversary. Under such a scenario, the detectability properties of the attack are analyzed and guidelines for designing the watermarking filters are derived. Fundamental limitations to the case of single-output systems are also uncovered, for which an alternative approach is proposed. The results are illustrated through numerical examples
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
This article presents a novel secure-control framework against sensor deception attacks. The vulnera...
Abstract — This paper considers a method of coding the sensor outputs in order to detect stealthy fa...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-p...
This paper addresses the design of an active cyberattack detection architecture based on multiplicat...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their i...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
This article presents a novel secure-control framework against sensor deception attacks. The vulnera...
Abstract — This paper considers a method of coding the sensor outputs in order to detect stealthy fa...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-p...
This paper addresses the design of an active cyberattack detection architecture based on multiplicat...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
This paper proposes a sensor additive switching watermark methodology for detecting physical faults ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical...