This paper analyzes the injection of finite sequences as a physical watermarking method for the detection of sensor replay attacks under an unknown but zonotopically bounded uncertainty description. A temporal mismatch between the watermark sequences that are injected during the record and replay phases of the attack is achieved by splitting the input space into a pre-established number of sets. These sets are designed offline by solving an optimization problem whose solution guarantees that, in each set, there exists a finite sequence that ensures attack detection for all possible recorded watermarks belonging to any of the remaining sets. Additionally, several approaches for reducing the complexity of the optimization problem are discusse...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper considers the problem of designing physical watermark signals to protect a control system...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
© 2020. The AuthorsThis paper presents the design of an input sequence in order to actively guarante...
This paper presents a zonotopic set-invariance analysis of replay attacks affecting the communicatio...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...
This paper considers the problem of designing physical watermark signals to protect a control system...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
We consider periodic watermarking scheduling for detecting discontinuous replay attacks in Cyber–Phy...
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
© 2020. The AuthorsThis paper presents the design of an input sequence in order to actively guarante...
This paper presents a zonotopic set-invariance analysis of replay attacks affecting the communicatio...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-p...
This letter proposes a threat discrimination methodology for distinguishing between sensor replay at...