2020
DOI: 10.1109/lcsys.2019.2925278
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of Security-Guaranteeing Dynamic Watermarks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…Researchers are studying different aspects of securing the CPS against attacks on the physical layer. The primary research problems are the study of different attack strategies [8], [9], attack resilient state estimation [10]- [12], attack detection strategies [1], [3], [13]- [19], etc. In one approach of attack detection schemes, physical watermarking signals are added to the control inputs and the authenticity of the received observations is checked by various statistical tests.…”
Section: A Related Workmentioning
confidence: 99%
“…Researchers are studying different aspects of securing the CPS against attacks on the physical layer. The primary research problems are the study of different attack strategies [8], [9], attack resilient state estimation [10]- [12], attack detection strategies [1], [3], [13]- [19], etc. In one approach of attack detection schemes, physical watermarking signals are added to the control inputs and the authenticity of the received observations is checked by various statistical tests.…”
Section: A Related Workmentioning
confidence: 99%
“…While the dynamic watermarking has been studied for linear time invariant system with Gaussian disturbance, it has also been analyzed in the system with arbitrary non-Gaussian noise [36], linear time-varying systems [37], [38], and nonlinear systems [34], [39]. For example, [40] considered the linear system case when the covariance matrix of the measurement noise is unknown or slowly varying over the time.…”
Section: A Related Workmentioning
confidence: 99%
“…A typical example of additive watermarking is termed as physical watermarking or dynamic watermarking (DW). Their basic concept is that the control law is actively encrypted by injecting certain probing signal (e.g., an independent identically distributed [12], [15], [16] or stationary [17] Gaussian signal), and specific tests (e.g., χ 2 test [12] or DW tests [18]- [20]) are performed to infer a malicious activity. Physical watermarking [12] is designed particularly for preventing replay attack, which is also driven to investigate the tradeoff between the watermarking intensity and replay attack detection effectiveness.…”
Section: Introductionmentioning
confidence: 99%