2018 Annual American Control Conference (ACC) 2018
DOI: 10.23919/acc.2018.8431569
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Watermarking for Networked Control Systems

Abstract: Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal. However, past approaches assume full state measurements or a centralized controller, which is not found in networked LTI systems with subcontrollers. Since generally the entire system is neither controllable nor observable by a single subcontroller, communication of sensor measurements is required to en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 24 publications
(38 reference statements)
0
18
0
Order By: Relevance
“…• Remark 9. The privacy-enhancing signal introduced in this work is related to the dynamic watermarking signal [26], [29], [30], which are unique signatures that are available only to the controller. In contrast, in our setup (depicted in Fig.…”
Section: Corollary 2 For Any Control Policymentioning
confidence: 99%
See 3 more Smart Citations
“…• Remark 9. The privacy-enhancing signal introduced in this work is related to the dynamic watermarking signal [26], [29], [30], which are unique signatures that are available only to the controller. In contrast, in our setup (depicted in Fig.…”
Section: Corollary 2 For Any Control Policymentioning
confidence: 99%
“…On the other hand, the attacker can completely hijack the sensor and control signals that travel through a communication network that has been compromised. Previous watermarking techniques [26], [29], [30] are only effective at securing the system if the attacker has no access to the control signals, which is not the case here. On the other hand, since in our case, the attacker does not have full knowledge of the system dynamics, our privacyenhancing signal is used to hamper the learning process of the attacker during the learning phase, rather than providing a unique signature to the control signal as in the case of watermarking.…”
Section: Introductionmentioning
confidence: 95%
See 2 more Smart Citations
“…Gairo et al [7], for example, randomly switch between the sensors used to detect otherwise stealthy attacks, while in [8] a random watermarking signal is injected into the CPS to make stealthy attacks detectable. However, the MTD strategies in [7] and [8] directly influence the closed-loop behavior of the CPS and can decrease its performance. Griffioen et al [9] propose a MTD scheme that introduces an auxiliary system to not influence the closed-loop behavior and simultaneously detect an attack.…”
Section: Introductionmentioning
confidence: 99%