2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.313
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle

Abstract: Abstract-Intrusion detection systems designed for conventional computer systems and networks are not necessarily suitable for mobile cyber-physical systems, such as robots, drones and automobiles. They tend to be geared towards attacks of different nature and do not take into account mobility, energy consumption and other physical aspects that are vital to a mobile cyber-physical system. We have developed a decision tree-based method for detecting cyber attacks on a small-scale robotic vehicle using both cyber… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 43 publications
(32 citation statements)
references
References 14 publications
0
32
0
Order By: Relevance
“…Loukas and G. Oke, 2007). Also, in cyber-physical systems, such as semiautonomous vehicles, the human operator is likely to be the first to observe the adverse physical impact of a command injection attack (T. Vuong et al, 2015). In the future, we intend to extend the scope of this research on human sensors of security threats in terms of types of attacks and platforms involved.…”
Section: Resultsmentioning
confidence: 99%
“…Loukas and G. Oke, 2007). Also, in cyber-physical systems, such as semiautonomous vehicles, the human operator is likely to be the first to observe the adverse physical impact of a command injection attack (T. Vuong et al, 2015). In the future, we intend to extend the scope of this research on human sensors of security threats in terms of types of attacks and platforms involved.…”
Section: Resultsmentioning
confidence: 99%
“…Ref [51][103] [110] showed the consistent characteristics in these applications. The utilization of ML for mechanical fault diagnosis and prevention of cyber attacks in transport system can be more explored, as only two [94] [107] reported the benefits of ML in this area. ML is also a popular solution to configure plant/production, optimize electrical load/dispatch, and reduce road latent cost, forecast short term in electricity usage and etc.…”
Section: Machine Learning Methods In Cpsmentioning
confidence: 99%
“…At this point, the source node will be used to prevent data from being sent via the malicious route [16]. Vuong et al developed traditional IDS for detecting cyber-attacks on robotic vehicles [17]. Their IDS is based on a decision tree method that relies on physical features and cyber in detecting malware codes.…”
Section: Related Workmentioning
confidence: 99%