Filters








1,883 Hits in 7.9 sec

Linear system security -- detection and correction of adversarial attacks in the noise-free case [article]

Zhanghan Tang, Margreta Kuijper, Michelle Chong, Iven Mareels and Chris Leckie
2017 arXiv   pre-print
We address the problem of attack detection and attack correction for multi-output discrete-time linear time-invariant systems under sensor attack.  ...  Methods to compute the security index are presented as are algorithms to detect and correct for sensor attacks. The results are illustrated by examples involving multiple sensors.  ...  CONCLUSIONS AND FUTURE WORK In this paper, we proposed attack detection and correction methods for zero-input discrete LTI systems in the noise-free case.  ... 
arXiv:1711.05400v1 fatcat:m2hlx2n3efc5zeakmenobwxvsy

Vulnerability of linear systems against sensor attacks--a system's security index [article]

Michelle S. Chong, Margreta Kuijper
2016 arXiv   pre-print
The 'security index' of a discrete-time LTI system under sensor attacks is introduced as a quantitative measure on the security of an observable system.  ...  We derive ideas from error control coding theory to provide sufficient conditions for attack detection and correction.  ...  INTRODUCTION The security of control systems against adversarial attacks is a challenge to maintain when the adversary knows the workings of any component of the system and has garnered access, with the  ... 
arXiv:1602.06594v1 fatcat:ojpwnicinvgnvejbmqo57a3psy

Secure interval observer for linear continuous-time systems with discrete measurements subject to cyber-attacks

Djahid Rabehi, Nacim Meslem, Nacim Ramdani
2019 2019 4th Conference on Control and Fault Tolerant Systems (SysTol)  
This paper addresses the design of a secure interval state estimator for linear continuous-time systems in the bounded error context with discrete-time measurements subject to external attacks.  ...  The attacker capabilities are assumed limited in the sense that only a subset of all the sensors can be attacked although this subset is unknown.  ...  The problem of security is not new to the control systems field, particularly in the area of fault detection and identification (FDI) [3] .  ... 
doi:10.1109/systol.2019.8864782 dblp:conf/systol/RabehiMR19 fatcat:aitjfq35zjeq7kwacrxcdljkga

Secure State Estimation Against Sensor Attacks in the Presence of Noise

Shaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas N. Diggavi, Paulo Tabuada
2017 IEEE Transactions on Control of Network Systems  
Finally, as a result of independent interest, we give a coding theoretic view of attack detection and state estimation against sensor attacks in a noiseless dynamical system.  ...  We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary.  ...  Several recent works have studied the problem of secure state estimation against sensor attacks in linear dynamical systems.  ... 
doi:10.1109/tcns.2016.2606880 fatcat:zxaced2usvcmdkfg2me3ycoa5i

Node capture attacks in wireless sensor networks: A system theoretic approach

Tamara Bonaci, Linda Bushnell, Radha Poovendran
2010 49th IEEE Conference on Decision and Control (CDC)  
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned node detection and revocation  ...  By combining probabilistic analysis of logical key graphs and linear control theory, we derive a dynamical model that efficiently describes network behavior under attack.  ...  It represents a mapping between the network security problem and a linear dynamical system. B.  ... 
doi:10.1109/cdc.2010.5717499 dblp:conf/cdc/BonaciBP10 fatcat:qod4xxd7hzaztmb37u35v5atr4

On the use of watermark-based schemes to detect cyber-physical attacks

Jose Rubio-Hernan, Luca De Cicco, Joaquin Garcia-Alfaro
2017 EURASIP Journal on Information Security  
We address security issues in cyber-physical systems (CPSs). We focus on the detection of attacks against cyber-physical systems.  ...  Attacks against these systems shall be handled both in terms of safety and security. Networked control technologies imposed by industrial standards already cover the safety dimension.  ...  In addition, JRH carried out the numeric simulations and laboratory experiments, and drafted the initial version of the manuscript.  ... 
doi:10.1186/s13635-017-0060-9 fatcat:qpgs4pfvyfb3rldu5gnebzx4wy

A Framework for Evaluating Security in the Presence of Signal Injection Attacks [article]

Ilias Giechaskiel and Youqian Zhang and Kasper B. Rasmussen
2019 arXiv   pre-print
As security in our framework is not binary, it allows for the direct comparison of the level of security between different systems.  ...  We further define the concepts of existential, selective, and universal security, which address attacker goals from mere disruptions of the sensor readings to precise waveform injections.  ...  INTRODUCTION In our daily routine we interact with dozens of sensors: from motion detection in home security systems and tire pressure monitors in cars, to accelerometers in smartphones and heart rate  ... 
arXiv:1901.03675v1 fatcat:wwtkd3l7hze6haa4djk5puirje

Detecting Integrity Attacks in IoT-based Cyber Physical Systems: a Case Study on Hydra Testbed

Federica Battisti, Giuseppe Bernieri, Marco Carli, Michela Lopardo, Federica Pascucci
2018 2018 Global Internet of Things Summit (GIoTS)  
In the industrial field, the problem becomes more complex due to the need of protecting a large attack surface while granting the availability of the system and the real time response to the presence of  ...  The Internet of Things paradigm improves the classical information sharing scheme. However, it has increased the need for granting the security of the connected systems.  ...  An extended review of the security aspects is in [17] . In [6] a smart attack on linear time-invariant systems is addressed.  ... 
doi:10.1109/giots.2018.8534437 dblp:conf/giots/BattistiBCLP18 fatcat:y2gvgl6k55hbtmwr5htk2minfi

Secure State Estimation For Cyber Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach [article]

Yasser Shoukry, Pierluigi Nuzzo, Alberto Puggelli, Alberto L. Sangiovanni-Vincentelli, Sanjit A. Seshia, Paulo Tabuada
2015 arXiv   pre-print
We address the problem of detecting and mitigating the effect of malicious attacks to the sensors of a linear dynamical system.  ...  We develop a novel, efficient algorithm that uses a Satisfiability-Modulo-Theory approach to isolate the compromised sensors and estimate the system state despite the presence of the attack, thus harnessing  ...  This paper addresses the problem of detecting and mitigating the effects of an adversarial corruption of sensory data in a linear dynamical system.  ... 
arXiv:1412.4324v2 fatcat:kvrfjlzfvrhbffbmxwm6u7xvwy

Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks

Yanpeng Guan, Xiaohua Ge
2018 IEEE Transactions on Signal and Information Processing over Networks  
This paper is concerned with the problem of joint distributed attack detection and distributed secure estimation for a networked cyber-physical system under physical and cyber attacks.  ...  The system is monitored by a wireless sensor network in which a group of sensors is spatially distributed and the sensors' measurements are broadcast to remote estimators via a wireless network medium.  ...  Generally, the threshold should be the maximal value of the evaluated residual in the FDI attack-free case.  ... 
doi:10.1109/tsipn.2017.2749959 fatcat:zxk5s2qnybatxcndk55amjik2a

RobustSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition [article]

Jianfei Yang, Han Zou, Lihua Xie
2022 arXiv   pre-print
Deep models can extract robust features from various sensors and generalize well even in challenging situations such as data-insufficient cases.  ...  To the best of our knowledge, this is the first work to investigate adversarial attacks and further develop a novel defense framework for wireless human activity recognition in mobile computing research  ...  Security of HAR Systems Regardless of HAR models, device-free HAR systems are vulnerable to adversarial attacks .  ... 
arXiv:2204.01560v1 fatcat:cqcxuy5tjvftbjltkvfvjnaa3y

Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories [article]

Mohammad Nasim Imtiaz Khan, Swaroop Ghosh
2021 arXiv   pre-print
At the end of Silicon roadmap, keeping the leakage power in tolerable limit and bridging the bandwidth gap between processor and memory have become some of the biggest challenges.  ...  Some of these memories are already deployed in full systems and as discrete chips and are believed to become ubiquitous in future computing devices.  ...  ACKNOWLEDGEMENTS The authors acknowledge the support from Anupam Chattopadhyay, Shivam Bhasin, Sumeet. Gupta  ... 
arXiv:2105.06401v1 fatcat:dwih3fdeuffpjduboiovfieyiu

Countering Adversarial Attacks on Autonomous Vehicles Using Denoising Techniques: A Review

A. Kloukiniotis, A. Papandreou, A. Lalos, P. Kapsalas, D.-V. Nguyen, K. Moustakas
2022 IEEE Open Journal of Intelligent Transportation Systems  
The study presents insights on the robustness of the aforementioned approaches in mitigating adversarial attacks in scene analysis operations.  ...  This poses security issues that need to be addressed. This paper has two aims. The first one investigates strategies for robustifying scene analysis of adversarial road scenes.  ...  In sensor attacks, it is assumed that the attacker is outside the vehicle and targets sensor data acquisition. Figure 3 indicates the major sensor types, range, and position of an AV. C.  ... 
doi:10.1109/ojits.2022.3142612 fatcat:tbzdckvd2fhehjpltojsxoqaou

Secure and self-stabilizing clock synchronization in sensor networks

Jaap-Henk Hoepman, Andreas Larsson, Elad M. Schiller, Philippas Tsigas
2011 Theoretical Computer Science  
Using this clock sampling algorithm, we construct the first self-stabilizing algorithm for secure clock synchronization in sensor networks that is resilient to the aforementioned adversarial attacks.  ...  In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews.  ...  Acknowledgements This work would not have been possible without the contribution of Marina Papatriantafilou in many helpful discussions, ideas, and analysis.  ... 
doi:10.1016/j.tcs.2010.04.012 fatcat:b27brqdzrzhg7a3wjphn6sgbgy

Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks [article]

Abhishek Gupta, Zhaoyuan Yang
2018 arXiv   pre-print
Complex autonomous control systems are subjected to sensor failures, cyber-attacks, sensor noise, communication channel failures, etc. that introduce errors in the measurements.  ...  We develop a framework for using adversarial deep reinforcement learning to design observer strategies that are robust to adversarial errors in information channels.  ...  Deception Attack of Autonomous System Deception attacks are cyber attacks on autonomous systems in which a strategic adversary injects noise in the communication channel between the sensor and the command  ... 
arXiv:1809.06784v1 fatcat:q2xse7fhdjbmbaie4zcqwqorza
« Previous Showing results 1 — 15 out of 1,883 results