{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:02:51Z","timestamp":1725912171962},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672342"},{"type":"electronic","value":"9783319672359"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67235-9_11","type":"book-chapter","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T23:43:34Z","timestamp":1506383014000},"page":"150-176","source":"Crossref","is-referenced-by-count":4,"title":["Defending Cyber-Physical Systems from Sensor Attacks"],"prefix":"10.1007","author":[{"given":"Bharadwaj","family":"Satchidanandan","sequence":"first","affiliation":[]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, September 2009","DOI":"10.1109\/ALLERTON.2009.5394956"},{"issue":"4","key":"11_CR3","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","volume":"22","author":"Y Mo","year":"2014","unstructured":"Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396\u20131407 (2014)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"11_CR4","unstructured":"Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-Physical Systems Security (2009)"},{"key":"11_CR5","unstructured":"Abrams, M.: Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, Australia (2008)"},{"issue":"2","key":"11_CR6","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/JPROC.2016.2575064","volume":"105","author":"B Satchidanandan","year":"2017","unstructured":"Satchidanandan, B., Kumar, P.R.: Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219\u2013240 (2017)","journal-title":"Proc. IEEE"},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1300000037","volume":"9","author":"J Ponniah","year":"2014","unstructured":"Ponniah, J., Hu, Y.-C., Kumar, P.R.: A clean slate approach to secure wireless networking. Found. Trends Netw. 9(1), 1\u2013105 (2014). doi:\n10.1561\/1300000037","journal-title":"Found. Trends Netw."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Hou, I.-H., Borkar, V., Kumar, P.R.: A theory of QoS for wireless. In: IEEE INFOCOM. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5061954"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Satchidanandan, B., Kumar, P.R.: On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems. In: 9th International Conference on Communication Systems and Networks (COMSNETS) (2017, to appear)","DOI":"10.1109\/COMSNETS.2017.7945354"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: The 28th International Conference on Distributed Computing Systems Workshops. IEEE (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"11_CR11","unstructured":"Cardenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems (2008)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","volume-title":"Hybrid Systems: Computation and Control","author":"S Amin","year":"2009","unstructured":"Amin, S., C\u00e1rdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31\u201345. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-00602-9_3"},{"key":"11_CR13","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","volume-title":"Power System State Estimation: Theory and Implementation","author":"A Abur","year":"2004","unstructured":"Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton (2004)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TSG.2013.2280658","volume":"5","author":"KC Sou","year":"2014","unstructured":"Sou, K.C., Sandberg, H., Johansson, K.H.: Data attack isolation in power networks using secure voltage magnitude measurements. IEEE Trans. Smart Grid 5(1), 14\u201328 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"11_CR15","unstructured":"Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems (SCS), Stockholm (2010)"},{"issue":"12","key":"11_CR16","doi-asserted-by":"crossref","first-page":"3194","DOI":"10.1109\/TAC.2014.2351625","volume":"59","author":"JM Hendrickx","year":"2014","unstructured":"Hendrickx, J.M., Johansson, K.H., Jungers, R.M., Sandberg, H., Sou, K.C.: Efficient computations of a security index for false data attacks in power networks. IEEE Trans. Autom. Control 59(12), 3194\u20133208 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Guo, Z., Johansson, K.H., Shi, L.: A study of packet-reordering integrity attack on remote state estimation. In: 2016 35th Chinese Control Conference (CCC), pp. 7250\u20137255, July 2016","DOI":"10.1109\/ChiCC.2016.7554505"},{"key":"11_CR18","unstructured":"Guo, Z., Shi, D., Johansson, K.H., Shi, L.: Optimal linear cyber-attack on remote state estimation"},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","volume":"51","author":"A Teixeira","year":"2015","unstructured":"Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135\u2013148 (2015)","journal-title":"Automatica"},{"issue":"11","key":"11_CR20","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti, F., D\u00f6rfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Fawzi, H., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE (2011)","DOI":"10.1109\/Allerton.2011.6120187"},{"issue":"6","key":"11_CR22","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","volume":"59","author":"H Fawzi","year":"2014","unstructured":"Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454\u20131467 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: Revealing stealthy attacks in control systems. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1806\u20131813, October 2012","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SHIELD: a data verification framework for participatory sensing systems. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. ACM, New York (2015). \nhttp:\/\/doi.acm.org\/10.1145\/2766498.2766503","DOI":"10.1145\/2766498.2766503"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Weerakkody, S., Mo, Y., Sinopoli, B.: Detecting integrity attacks on control systems using robust physical watermarking. In: 53rd IEEE Conference on Decision and Control, pp. 3757\u20133764, December 2014","DOI":"10.1109\/CDC.2014.7039974"},{"issue":"1","key":"11_CR26","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","volume":"35","author":"Y Mo","year":"2015","unstructured":"Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93\u2013109 (2015)","journal-title":"IEEE Control Syst."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Satchidanandan, B., Kumar, P.R.: Secure control of networked cyber-physical systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 283\u2013289, December 2016","DOI":"10.1109\/CDC.2016.7798283"},{"key":"11_CR28","series-title":"SIAM Classics in Applied Mathematics","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611974263","volume-title":"Stochastic Systems: Estimation, Identification and Adaptive Control","author":"PR Kumar","year":"2015","unstructured":"Kumar, P.R., Varaiya, P.: Stochastic Systems: Estimation, Identification and Adaptive Control. SIAM Classics in Applied Mathematics. SIAM, Philadelphia (2015)"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Lai, T.L., Wei, C.Z.: Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. In: The Annals of Statistics, pp. 154\u2013166 (1982)","DOI":"10.1214\/aos\/1176345697"},{"issue":"5","key":"11_CR30","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/PROC.1970.7723","volume":"58","author":"T Kailath","year":"1970","unstructured":"Kailath, T.: The innovations approach to detection and estimation theory. Proc. IEEE 58(5), 680\u2013695 (1970)","journal-title":"Proc. IEEE"},{"key":"11_CR31","unstructured":"Ko, W.-H., Satchidanandan, B., Kumar, P.R.: Theory and application of dynamic watermarking for cybersecurity of advanced transportation systems. In: International Workshop on Cyber-Physical Systems Security (to appear)"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Robinson, C.L., Schutz, H.-J., Baliga, G., Kumar, P.: Architecture and algorithm for a laboratory vehicle collision avoidance system. In: IEEE 22nd International Symposium on Intelligent Control, vol. 2007, pp. 23\u201328. IEEE (2007)","DOI":"10.1109\/ISIC.2007.4450855"},{"key":"11_CR33","unstructured":"Secure control of an intelligent transportation system. \nhttps:\/\/youtu.be\/qMSakEtkk_0"}],"container-title":["Lecture Notes in Computer Science","Communication Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67235-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T23:50:44Z","timestamp":1506383444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67235-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672342","9783319672359"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67235-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}