2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2017
DOI: 10.1109/qrs-c.2017.89
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Identification via Sensor Fingerprinting in a Cyber Physical System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Analysis is carried out on 2 latching relays based on their operation timings. Another related work presented a preliminary study, on the idea of sensor fingerprinting in [86], using 2 sensors, based on correlation analysis with an accuracy of 86%. However, to the best of our knowledge, this article present the first attempt to present a rigorous analysis on a multitude of sensors specific to ICS.…”
Section: Software Based Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…Analysis is carried out on 2 latching relays based on their operation timings. Another related work presented a preliminary study, on the idea of sensor fingerprinting in [86], using 2 sensors, based on correlation analysis with an accuracy of 86%. However, to the best of our knowledge, this article present the first attempt to present a rigorous analysis on a multitude of sensors specific to ICS.…”
Section: Software Based Fingerprintingmentioning
confidence: 99%
“…Regions A, B and C in Figure 9 show, respectively, the sensor readings before, during, and after the attack. A detailed analysis on such an attack and preliminary results based on sensor fingerprint, is presented in form of a short paper [86].…”
Section: Appendix a Physical Sensor Swap Attack In Swat Testbedmentioning
confidence: 99%
“…In [16], the authors proposed sensor noise fingerprinting to detect attacks on physical components of a CPS with a focus on ultrasonic level sensors on the SWaT testbed. To calculate the noise fingerprint for a sensor, first they collected its data from the healthy runs which contained no attack.…”
Section: Related Workmentioning
confidence: 99%
“…For this reason, many researchers have started focusing on developing techniques and approaches for anomaly detection within ICS processes. Existing state-of-the-art research can be divided into two categories: (I) Formal methods based on mathematical models and behavior specification of processes [6][7][8][9][10], and (II) data driven approaches using: (a) machine learning (ML) [11][12][13], (b) deep learning (DL) [14][15][16][17], and (c) statistical modeling [18,19].…”
Section: Introductionmentioning
confidence: 99%
“…Any deviations from the created signatures are recognized as anomalies. This approach is highly susceptible to noise in the operating environment, which limits it to a small number of devices in a process [18].…”
Section: Introductionmentioning
confidence: 99%