The introduction of automation in cyber-physical systems (CPS) has raised major safety and security concerns. One attack vector is the sensing unit whose measurements can be manipulated by an adversary through attacks such as denial of service and delay injection. To secure an autonomous CPS from such attacks, we use a challenge response authentication (CRA) technique for detection of attack in active sensors data and estimate safe measurements using the recursive least square algorithm. For demonstrating effectiveness of our proposed approach, a car-follower model is considered where the follower vehicle\u27s radar sensor measurements are manipulated in an attempt to cause a collision
Vehicular cyber-physical systems (CPSes) that integrate sensing, computing, control, and communicati...
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs...
This paper introduces a cyber-secure strategy for radar tracking systems. Two common cyber attacks i...
The drive to achieve trustworthy autonomous cyber-physical systems (CPS), which can attain goals ind...
Over the years, autonomous systems have entered almost all the facets of human life. Gradually, high...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Cyber-physical system (CPS) has become an integral part of human life, ranging from aircraft to heal...
This paper focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped ...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
With recent progress in networked embedded control technology, cyber attacks have become one of the ...
© 2016 ACM.This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (C...
The increasingly tight coupling of cyber (computing/communication) and physical (sensing/actuation)...
Embedded sensing systems are pervasively used in life- and security-critical systems such as those f...
Autonomous cyber physical systems are increasingly common in a wide variety of application domains, ...
Abstract Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and rada...
Vehicular cyber-physical systems (CPSes) that integrate sensing, computing, control, and communicati...
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs...
This paper introduces a cyber-secure strategy for radar tracking systems. Two common cyber attacks i...
The drive to achieve trustworthy autonomous cyber-physical systems (CPS), which can attain goals ind...
Over the years, autonomous systems have entered almost all the facets of human life. Gradually, high...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Cyber-physical system (CPS) has become an integral part of human life, ranging from aircraft to heal...
This paper focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped ...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
With recent progress in networked embedded control technology, cyber attacks have become one of the ...
© 2016 ACM.This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (C...
The increasingly tight coupling of cyber (computing/communication) and physical (sensing/actuation)...
Embedded sensing systems are pervasively used in life- and security-critical systems such as those f...
Autonomous cyber physical systems are increasingly common in a wide variety of application domains, ...
Abstract Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and rada...
Vehicular cyber-physical systems (CPSes) that integrate sensing, computing, control, and communicati...
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs...
This paper introduces a cyber-secure strategy for radar tracking systems. Two common cyber attacks i...