2022
DOI: 10.1016/j.future.2021.08.020
|View full text |Cite
|
Sign up to set email alerts
|

Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(8 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Succeeding studies [24,36] further adapted these detection methods to more practical applications. Fang et al [12] proposed adding unique noise (fingerprints) to sensor measurements and using machine learning techniques to detect the attacks.…”
Section: Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Succeeding studies [24,36] further adapted these detection methods to more practical applications. Fang et al [12] proposed adding unique noise (fingerprints) to sensor measurements and using machine learning techniques to detect the attacks.…”
Section: Detectionmentioning
confidence: 99%
“…Even though such attacks are complicated to perform in practice, and as a result are still rare, we need to find effective detection and mitigation strategies to deal with them before they become common. In the last few years, there has been work on detecting such attacks on sensors [12,24,36,41,49]. In this paper, we focus on detecting attacks on actuators, which is quite a bit harder.…”
Section: Introductionmentioning
confidence: 99%
“…There are several methods for acquiring fingerprint pictures, which is the initial stage of fingerprint identification [ 15 ]. Many fingerprint acquisition methods exist: optical, capacitive, temperature [ 16 ], ultrasonic, and electromagnetic wave [ 17 ] fingerprint acquisition technology. After fingerprint photos are accepted, pre-processing is undertaken to simplify the extraction of fingerprint features, classifying fingerprints according to several characteristic points, then comparing them to those stored in the database to determine if they are the same.…”
Section: Introductionmentioning
confidence: 99%
“…The goal of smart cities is to provide a safe, efficient and convenient environment for human settlements. Facilities and structures, such as water, transportation and power, are designed with computerised systems, including databases and decision-making algorithms, where the data can be securely stored in the cloud [2,3]. Recently, the user interaction and dynamic route planning [4] has been quite popular in the smart city.…”
Section: Introductionmentioning
confidence: 99%