2023
DOI: 10.1145/3497862
|View full text |Cite
|
Sign up to set email alerts
|

Toward Improving the Security of IoT and CPS Devices: An AI Approach

Abstract: Detecting anomalously behaving devices in security-and-safety-critical applications is an important challenge. This paper presents an off-device methodology for detecting the anomalous behavior of devices considering their power consumption data. The methodology takes advantage of the fact that every action on-board a device will be reflected in its power trace. This argument makes it inevitable for anomalously behaving device to go undetected. We transform the device’s 1-D instantaneous power consumption sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 58 publications
0
2
0
Order By: Relevance
“…• Adversarial Robustness: CPS are often targeted by sophisticated cyber-attackers who use techniques such as adversarial machine learning to evade detection. There is a need for DL models that are robust to these attacks and that can continue to operate effectively even in the presence of adversarial inputs [114].…”
Section: • Model Selection and Developmentmentioning
confidence: 99%
“…• Adversarial Robustness: CPS are often targeted by sophisticated cyber-attackers who use techniques such as adversarial machine learning to evade detection. There is a need for DL models that are robust to these attacks and that can continue to operate effectively even in the presence of adversarial inputs [114].…”
Section: • Model Selection and Developmentmentioning
confidence: 99%
“…Although the existing literature has developed the existing anomaly detection methods, most of them are limited to the characteristics of the device for anomaly detection, and cannot take into account the characteristics of other non-self-faults of the equipment, such as the failure to consider the data security problems caused by these data in the transmission process. In the selection of data, previous researchers have mainly focused on the power consumption of the equipment [15], the distance phase of the device [16] and other characteristics of these devices to detect anomalies. In this paper, six multi-dimensional features of photovoltaic grid-connected inverters are collected to construct anomaly detection models, which are power consumption, three voltage values of three-phase voltage, communication data length, and communication data delay.…”
Section: Introductionmentioning
confidence: 99%