Abstract
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is considered. We propose a multiplicative watermarking scheme, where each sensor’s output is individually fed to a SISO watermark generator whose parameters are supposed to be unknown to the adversary. Under such a scenario, the detectability properties of the attack are analyzed and guidelines for designing the watermarking filters are derived. Fundamental limitations to the case of single-output systems are also uncovered, for which an alternative approach is proposed. The results are illustrated through numerical examples.
Original language | English |
---|---|
Title of host publication | Proceedings of 2018 European Control Conference (ECC2018) |
Place of Publication | Piscataway, NJ, USA |
Publisher | IEEE |
Pages | 338-343 |
ISBN (Print) | 978-3-9524-2699-9 |
DOIs | |
Publication status | Published - 2018 |
Event | 16th European Control Conference, ECC 2018 - Limassol, Cyprus Duration: 12 Jun 2018 → 15 Jun 2018 http://www.ecc18.eu/ |
Conference
Conference | 16th European Control Conference, ECC 2018 |
---|---|
Abbreviated title | ECC 2018 |
Country/Territory | Cyprus |
City | Limassol |
Period | 12/06/18 → 15/06/18 |
Internet address |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Watermarking
- Detectors
- Generators
- Data models
- Closed loop systems
- Equalizers
Fingerprint
Dive into the research topics of 'Detection of sensor data injection attacks with multiplicative watermarking'. Together they form a unique fingerprint.Prizes
-
Marie Skłodowska-Curie Individual Fellowship
Ferrari, R. (Recipient), 22 Jan 2016
Prize: Fellowship awarded competitively