Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking

05/02/2022
by   Dajun Du, et al.
0

Dynamic watermarking schemes can enhance the cyber attack detection capability of networked control systems (NCSs). This paper presents a linear event-triggered solution to conventional dynamic watermarking (CDW) schemes. Firstly, the limitations of CDW schemes for event-triggered state estimation based NCSs are investigated. Secondly, a new event-triggered dynamic watermarking (ETDW) scheme is designed by treating watermarking as symmetric key encryption, based on the limit convergence theorem in probability. Its security property against the generalized replay attacks (GRAs) is also discussed in the form of bounded asymptotic attack power. Thirdly, finite sample ETDW tests are designed with matrix concentration inequalities. Finally, experimental results of a networked inverted pendulum system demonstrate the validity of our proposed scheme.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 6

page 8

page 9

page 11

research
12/23/2019

Encryption based on Conference Matrix

In this article, an encryption scheme based on (-1, 1) conference matrix...
research
10/19/2019

Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

Fairly recently, a new encryption scheme for embedded systems based on c...
research
09/24/2022

Stabilizability of multi-agent systems under event-triggered controllers

In view of the problems of large consumption of communication and comput...
research
03/09/2021

A deep learning based known plaintext attack method for chaotic cryptosystem

In this paper, we propose a known-plaintext attack (KPA) method based on...
research
12/14/2021

A code-based hybrid signcryption scheme

A key encapsulation mechanism (KEM) that takes as input an arbitrary str...
research
09/13/2018

Blockchain-inspired Event Recording System for Autonomous Vehicles

Autonomous vehicles are capable of sensing their environment and navigat...
research
08/23/2021

Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

In a clone node attack, an attacker attempted to physically capture the ...

Please sign up or login with your details

Forgot password? Click here to reset