Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Delay-Induced Watermarking for Detection of Replay Attacks in Linear Systems (2404.00850v1)

Published 1 Apr 2024 in eess.SY, cs.CR, and cs.SY

Abstract: A state-feedback watermarking signal design for the detection of replay attacks in linear systems is proposed. The control input is augmented with a random time-delayed term of the system state estimate, in order to secure the system against attacks of replay type. We outline the basic analysis of the closed-loop response of the state-feedback watermarking in a LQG controlled system. Our theoretical results are applied on a temperature process control example. While the proposed secure control scheme requires very involved analysis, it, nevertheless, holds promise of being superior to conventional, feed-forward, watermarking schemes, in both its ability to detect attacks as well as the secured system performance.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (8)
  1. V. Venkatasubramanian, R. Rengaswamy, K. Yin, and S. N. Kavuri, “A review of process fault detection and diagnosis: Part i: Quantitative model-based methods,” Computers & Chemical Engineering, vol. 27, no. 3, pp. 293–311, 2003.
  2. H. Liu, Y. Mo, and K. H. Johansson, “Active detection against replay attack: A survey on watermark design for cyber-physical systems,” in Safety, Security and Privacy for Cyber-Physical Systems.   Springer, 2021, pp. 145–171.
  3. A. B. Sharma, L. Golubchik, and R. Govindan, “Sensor faults: Detection methods and prevalence in real-world datasets,” ACM Transactions on Sensor Networks (TOSN), vol. 6, no. 3, 2010.
  4. A. A. Cardenas, S. Amin, and S. Sastry, “Secure control: Towards survivable cyber-physical systems,” in 2008 The 28th International Conference on Distributed Computing Systems Workshops.   IEEE, 2008, pp. 495–500.
  5. J. Rubio-Hernan, L. De Cicco, and J. Garcia-Alfaro, “On the use of watermark-based schemes to detect cyber-physical attacks,” EURASIP Journal on Information Security, vol. 2017, no. 1, pp. 1–25, 2017.
  6. R. K. Mehra and J. Peschon, “An innovations approach to fault detection and diagnosis in dynamic systems,” Automatica, vol. 7, no. 5, pp. 637–640, 1971.
  7. Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in 2009 47th annual Allerton conference on communication, control, and computing (Allerton).   IEEE, 2009, pp. 911–918.
  8. J. Milošević, H. Sandberg, and K. H. Johansson, “Estimating the impact of cyber-attack strategies for stochastic networked control systems,” IEEE Transactions on Control of Network Systems, vol. 7, no. 2, pp. 747–757, 2019.

Summary

We haven't generated a summary for this paper yet.