2019
DOI: 10.1016/j.ifacol.2019.12.183
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of cyber-physical systems under learning-based attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…The smart city architecture is highly prone to malicious attacks that include different injection attacks such as code injection attacks, SQL injection attacks, code-reuse attacks, etc. However, injection attacks normally inject malicious code into an application to disrupt its functioning, exploiting untrusted resources [ 20 , 21 , 22 ].…”
Section: Smart City Layered Adversariesmentioning
confidence: 99%
“…The smart city architecture is highly prone to malicious attacks that include different injection attacks such as code injection attacks, SQL injection attacks, code-reuse attacks, etc. However, injection attacks normally inject malicious code into an application to disrupt its functioning, exploiting untrusted resources [ 20 , 21 , 22 ].…”
Section: Smart City Layered Adversariesmentioning
confidence: 99%
“…When the controller detects an attack, it shuts the system down and prevents the attacker from causing further "damage" to the plant. The controller/detector is aware of the plant dynamics (1) and knows the open-loop gain a of the plant. On the other hand, the attacker knows the plant dynamics (1) as well as the plant state X k , and control input U k (or equivalently, Z k ) at time k (see Fig.…”
Section: Problem Setupmentioning
confidence: 99%
“…The controller/detector, being aware of the dynamic (1) and the open-loop gain a, attempts to detect possible attacks by testing for statistical deviations from the typical behavior of the system (1). More precisely, under the legitimate system operation (corresponding to the null hypothesis), the controller observation Y k behaves according to…”
Section: B Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem of cyber-attacks in networked control systems has been studied comprehensively in previous research [4]- [8]. In this paper our focus is on the analysis and detection of replay attacks in control systems [9], [10].…”
Section: Introductionmentioning
confidence: 99%