Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may cause catastrophic effects on such systems. Due to the events of Stuxnet, replay attacks have gained increasing attention in recent years. To counter for the replay attacks, it has been proposed to impose additional watermarking signals to nominal control inputs. However, such detector may result in the waste of control cost especially when the attack is absent. In this paper, we firstly formulate an attack duration model for the replay attack. By exploiting the attack model, we propose a periodic watermarking strategy which aims to reduce the costs while guaranteeing the detection performance. Furthermore, we obtain an optimal periodic waterma...
© 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativec...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
Large scale of watermarking methods is available in the literature. These methods differ in visibili...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This paper considers the problem of designing physical watermark signals to protect a control system...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
Dynamic watermarking schemes can enhance the cyber attack detection capability of networked control ...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
The problem of replay attacks in the communication network between Distributed Generation Units (DG...
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
© 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativec...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
Large scale of watermarking methods is available in the literature. These methods differ in visibili...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This paper considers the problem of designing physical watermark signals to protect a control system...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical...
Dynamic watermarking schemes can enhance the cyber attack detection capability of networked control ...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
The problem of replay attacks in the communication network between Distributed Generation Units (DG...
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
© 2018. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativec...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
Large scale of watermarking methods is available in the literature. These methods differ in visibili...