Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Park, Junkil -
dc.contributor.author Ivanov, Radoslav -
dc.contributor.author Weimer, James -
dc.contributor.author Pajic, Miroslav -
dc.contributor.author Son, Sang Hyuk -
dc.contributor.author Lee, Insup -
dc.date.accessioned 2018-06-01T03:57:42Z -
dc.date.available 2018-06-01T03:57:42Z -
dc.date.created 2018-03-29 -
dc.date.issued 2017-07 -
dc.identifier.issn 2378-962X -
dc.identifier.uri http://hdl.handle.net/20.500.11750/6444 -
dc.description.abstract This article is concerned with the security of modern Cyber-Physical Systems in the presence of transient sensor faults.We consider a system with multiple sensors measuring the same physical variable, where each sensor provides an interval with all possible values of the true state.We note that some sensors might output faulty readings and others may be controlled by a malicious attacker. Differing from previous works, in this article, we aim to distinguish between faults and attacks and develop an attack detection algorithm for the latter only. To do this, we note that there are two kinds of faults-transient and permanent; the former are benign and short-lived, whereas the latter may have dangerous consequences on system performance. We argue that sensors have an underlying transient fault model that quantifies the amount of time in which transient faults can occur. In addition, we provide a framework for developing such a model if it is not provided by manufacturers. Attacks can manifest as either transient or permanent faults depending on the attacker's goal.We provide different techniques for handling each kind. For the former, we analyze the worst-case performance of sensor fusion over time given each sensor's transient fault model and develop a filtered fusion interval that is guaranteed to contain the true value and is bounded in size. To deal with attacks that do not comply with sensors' transient fault models, we propose a sound attack detection algorithm based on pairwise inconsistencies between sensor measurements. Finally, we provide a real-data case study on an unmanned ground vehicle to evaluate the various aspects of this article. © 2017 ACM. -
dc.language English -
dc.publisher Association for Computing Machinary, Inc. -
dc.title Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults -
dc.type Article -
dc.identifier.doi 10.1145/3064809 -
dc.identifier.scopusid 2-s2.0-85071483569 -
dc.identifier.bibliographicCitation ACM Transactions on Cyber-Physical Systems, v.1, no.3 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Cyber-physical systems security -
dc.subject.keywordAuthor sensor fusion -
dc.subject.keywordAuthor fault-tolerance -
dc.subject.keywordAuthor fault-tolerant algorithms -
dc.subject.keywordPlus DESIGN -
dc.citation.number 3 -
dc.citation.title ACM Transactions on Cyber-Physical Systems -
dc.citation.volume 1 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
Department of Electrical Engineering and Computer Science RTCPS(Real-Time Cyber-Physical Systems) Lab 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE