2017
DOI: 10.1186/s13635-017-0060-9
|View full text |Cite
|
Sign up to set email alerts
|

On the use of watermark-based schemes to detect cyber-physical attacks

Abstract: We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems. Attacks against these systems shall be handled both in terms of safety and security. Networked-control technologies imposed by industrial standards already cover the safety dimension. However, from a security standpoint, using only cyber information to analyze the security of a cyber-physical system is not enough, since the physical malicious actions that can threaten the correct be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 36 publications
(92 reference statements)
0
27
0
Order By: Relevance
“…Notice that such anomalies can either be unintentional failures, or stealthy attacks disguised by intentional modifications produced by a malicious entity that intends to disrupt the physical system. Assuming a system with appropriate measure to detect both failures and attacks, the PN controller can react to those anomalies, by enforcing some mitigation policies. At the data domain, we have network probes and effectors , conducting data monitoring—if instructed by the control domain.…”
Section: Our Proposalmentioning
confidence: 99%
“…Notice that such anomalies can either be unintentional failures, or stealthy attacks disguised by intentional modifications produced by a malicious entity that intends to disrupt the physical system. Assuming a system with appropriate measure to detect both failures and attacks, the PN controller can react to those anomalies, by enforcing some mitigation policies. At the data domain, we have network probes and effectors , conducting data monitoring—if instructed by the control domain.…”
Section: Our Proposalmentioning
confidence: 99%
“…In the case of Watermark 1, L m|b = L (m) , η v k follows a Markovian process (10) with parameters α and β and ∆u v k ∼ N (0, Q) is an IID Gaussian process. In the case of Watermark 2, L m|b = L (b) , η v k is an IID Bernoulli process with drop probability p d and ∆u v k is a stationary Gaussian process which satisfies (14). Additionally, v v k ∼ N (0, R) and w v k ∼ N (0, Q) are IID processes.…”
Section: B Attack Strategymentioning
confidence: 99%
“…We now investigate a watermark consisting of stationary Gaussian noise generated by a HMM (14) and an IID Bernoulli drop process at the control input with drop probability equal to p d . Again, we design a watermark to address a performance and security trade-off.…”
Section: The Second Watermark Designmentioning
confidence: 99%
See 1 more Smart Citation
“…If data modification is not timely detected, it may result in severe disruption of the system or even in its complete damage. Badly secured IIoT structures and services may be used as entry points for network attacks and expose both data and systems to threats [3][4][5].…”
Section: Introductionmentioning
confidence: 99%