Documents

DOI

In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is considered. We propose a multiplicative watermarking scheme, where each sensor’s output is individually fed to a SISO watermark generator whose parameters are supposed to be unknown to the adversary. Under such a scenario, the detectability properties of the attack are analyzed and guidelines for designing the watermarking filters are derived. Fundamental limitations to the case of single-output systems are also uncovered, for which an alternative approach is proposed. The results are illustrated through numerical examples.
Original languageEnglish
Title of host publicationProceedings of 2018 European Control Conference (ECC2018)
Place of PublicationPiscataway, NJ, USA
PublisherIEEE
Pages338-343
ISBN (Print)978-3-9524-2699-9
DOIs
Publication statusPublished - 2018
Event16th European Control Conference, ECC 2018 - Limassol, Cyprus
Duration: 12 Jun 201815 Jun 2018
http://www.ecc18.eu/

Conference

Conference16th European Control Conference, ECC 2018
Abbreviated titleECC 2018
CountryCyprus
CityLimassol
Period12/06/1815/06/18
Internet address

    Research areas

  • Watermarking, Detectors, Generators, Data models, Closed loop systems , Equalizers

ID: 47764935