{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:25:01Z","timestamp":1760523901408,"version":"3.41.0"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science 8 Technology Center","award":["CCF-0939370"],"award-info":[{"award-number":["CCF-0939370"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1646449"],"award-info":[{"award-number":["CNS-1646449"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"U.S. Army Research Office","doi-asserted-by":"crossref","award":["W911NF-15-1-0279"],"award-info":[{"award-number":["W911NF-15-1-0279"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100006754","name":"US Army Research Laboratory","doi-asserted-by":"crossref","award":["W911NF-19-2-0033"],"award-info":[{"award-number":["W911NF-19-2-0033"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NPRP","award":["NPRP 8-1531-2-651"],"award-info":[{"award-number":["NPRP 8-1531-2-651"]}]},{"name":"Qatar National Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2020,1,31]]},"abstract":"<jats:p>The transportation sector is on the threshold of a revolution as advances in real-time communication, real-time computing, and sensing technologies have brought to fruition the capability to build Transportation Cyber-Physical Systems (TCPS) such as self-driving cars, unmanned aerial vehicles, adaptive cruise control systems, truck platoons, and so on. While there are many benefits that TCPSs have to offer, a major challenge that needs to be addressed to enable their proliferation is their vulnerability to cyber attacks. In this article, we demonstrate, using laboratory prototypes of TCPSs, how the approach of Dynamic Watermarking can secure them from arbitrary sensor attacks. Specifically, we consider two TCPSs of topical interest: (i) an adaptive cruise control system and (ii) a system of self-driving vehicles tracking given trajectories. In each of these systems, we first show how cyber attacks on sensors can compromise safety and cause collisions between vehicles in spite of the presence of a collision avoidance module in the system. We then apply the approach of Dynamic Watermarking and demonstrate that it detects attacks with \u201clow\u201d delay. Once an attack is detected, the controller can take appropriate control actions to prevent collisions, thereby guaranteeing safety in the sense of collision freedom.<\/jats:p>","DOI":"10.1145\/3361700","type":"journal-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:16:57Z","timestamp":1573852617000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems"],"prefix":"10.1145","volume":"4","author":[{"given":"Woo-Hyun","family":"Ko","sequence":"first","affiliation":[{"name":"Texas A8M University, Texas"}]},{"given":"Bharadwaj","family":"Satchidanandan","sequence":"additional","affiliation":[{"name":"Texas A8M University, Texas"}]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[{"name":"Texas A8M University, Texas"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"unstructured":"[n.d.]. Hackers Fool Tesla S\u2019s Autopilot to hide and Spoof Obstacles. Wired magazine. Retrieved from https:\/\/www.wired.com\/2016\/08\/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles\/.  [n.d.]. Hackers Fool Tesla S\u2019s Autopilot to hide and Spoof Obstacles. Wired magazine. Retrieved from https:\/\/www.wired.com\/2016\/08\/hackers-fool-tesla-ss-autopilot-hide-spoof-obstacles\/.","key":"e_1_2_1_2_1"},{"unstructured":"[n.d.]. Hackers Remotely Kill a Jeep On the Highway- With Me in it. Wired magazine. Retrieved from https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/.  [n.d.]. Hackers Remotely Kill a Jeep On the Highway- With Me in it. Wired magazine. Retrieved from https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/.","key":"e_1_2_1_3_1"},{"unstructured":"[n.d.]. Secure Control of an Intelligent Transportation System. Retrieved from https:\/\/youtu.be\/xapmP2-u6HY.  [n.d.]. Secure Control of an Intelligent Transportation System. Retrieved from https:\/\/youtu.be\/xapmP2-u6HY.","key":"e_1_2_1_4_1"},{"unstructured":"[n.d.]. Securing a Prototypical Automated Vehicle Platoon from Replay Attacks Using Dynamic Watermarking. Retrieved from https:\/\/youtu.be\/996fg9hAfpw.  [n.d.]. Securing a Prototypical Automated Vehicle Platoon from Replay Attacks Using Dynamic Watermarking. Retrieved from https:\/\/youtu.be\/996fg9hAfpw.","key":"e_1_2_1_5_1"},{"unstructured":"[n.d.]. Securing an Adaptive Cruise Control System from Adversarial Sensors Using Dynamic Watermarking. Retrieved from https:\/\/youtu.be\/n4dcaK7uGSo.  [n.d.]. Securing an Adaptive Cruise Control System from Adversarial Sensors Using Dynamic Watermarking. Retrieved from https:\/\/youtu.be\/n4dcaK7uGSo.","key":"e_1_2_1_6_1"},{"unstructured":"[n.d.]. Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Society of Automobile Engineers standard. Retrieved from http:\/\/standards.sae.org\/j3016_201401\/.  [n.d.]. Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. Society of Automobile Engineers standard. Retrieved from http:\/\/standards.sae.org\/j3016_201401\/.","key":"e_1_2_1_7_1"},{"unstructured":"Marshall Abrams and Joe Weiss. 2008. Malicious Control System Cyber Security Attack Case Study\u2014Maroochy Water Services Australia. https:\/\/www.mitre.org\/publications\/technical-papers\/malicious-control-system-cyber-security-attack-case-study-maroochy-water-services-australia.  Marshall Abrams and Joe Weiss. 2008. Malicious Control System Cyber Security Attack Case Study\u2014Maroochy Water Services Australia. https:\/\/www.mitre.org\/publications\/technical-papers\/malicious-control-system-cyber-security-attack-case-study-maroochy-water-services-australia.","key":"e_1_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1109\/MCOM.2015.7120028"},{"doi-asserted-by":"publisher","key":"e_1_2_1_10_1","DOI":"10.5555\/794197.795074"},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.5555\/1496671.1496677"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1145\/2714576.2714619"},{"doi-asserted-by":"publisher","key":"e_1_2_1_14_1","DOI":"10.1145\/2766498.2766505"},{"volume-title":"Proceedings of the 47th IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201917)","year":"2017","author":"Dunn D. D.","key":"e_1_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1109\/TAC.2014.2303233"},{"key":"e_1_2_1_17_1","first-page":"3","article-title":"The security and privacy of smart vehicles","volume":"2","author":"Hubaux J. P.","year":"2004","journal-title":"IEEE Sec. Priv."},{"unstructured":"Brent Kesler. [n.d.]. The vulnerability of nuclear facilities to cyber attack. http:\/\/large.stanford.edu\/courses\/2015\/ph241\/holloway1\/docs\/SI-v10-I1_Kesler.pdf.  Brent Kesler. [n.d.]. The vulnerability of nuclear facilities to cyber attack. http:\/\/large.stanford.edu\/courses\/2015\/ph241\/holloway1\/docs\/SI-v10-I1_Kesler.pdf.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the IEEE Conference on Communications and Network Security (CNS\u201916)","year":"2016","author":"Ko Woo-Hyun","key":"e_1_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_20_1","DOI":"10.5555\/40665"},{"unstructured":"Tze Leung Lai and Ching Zong Wei. 1982. Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. The Annals of Statistics (1982) 154--166. The Institute of Mathematical Statistics.  Tze Leung Lai and Ching Zong Wei. 1982. Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. The Annals of Statistics (1982) 154--166. The Institute of Mathematical Statistics.","key":"e_1_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/MSP.2011.67"},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1214\/aoms\/1177693055"},{"doi-asserted-by":"crossref","unstructured":"Sreekanth Malladi Jim Alves-Foss and Robert B. Heckendorn. 2002. On Preventing Replay Attacks on Security Protocols. Technical Report. Idaho University Moscow Department of Computer Science.  Sreekanth Malladi Jim Alves-Foss and Robert B. Heckendorn. 2002. On Preventing Replay Attacks on Security Protocols. Technical Report. Idaho University Moscow Department of Computer Science.","key":"e_1_2_1_24_1","DOI":"10.21236\/ADA462295"},{"volume-title":"Proceedings of the IEEE 52nd Conference on Decision and Control (CDC\u201913)","author":"Miao Fei","key":"e_1_2_1_25_1"},{"unstructured":"Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf.  Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. Black Hat USA. http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf.","key":"e_1_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1109\/ISIT.2015.7282993"},{"doi-asserted-by":"publisher","key":"e_1_2_1_28_1","DOI":"10.1109\/TCST.2013.2280899"},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1109\/JPROC.2011.2161428"},{"volume-title":"Proceedings of the 47th Allerton Conference on Communication, Control, and Computing. DOI:https:\/\/doi.org\/10","year":"2009","author":"Mo Yilin","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","first-page":"1","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"Mo Y.","year":"2015","journal-title":"IEEE Contr. Syst."},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1109\/TAC.2013.2266831"},{"key":"e_1_2_1_33_1","first-page":"2","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit J.","year":"2015","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"volume-title":"Proceedings of the Black Hat Europe Conference.","year":"2015","author":"Petit Jonathan","key":"e_1_2_1_34_1"},{"unstructured":"Moshe Pollak. 1985. Optimal detection of a change in distribution. Ann. Stat. (1985) 206--227. The Institute of Mathematical Statistics.  Moshe Pollak. 1985. Optimal detection of a change in distribution. Ann. Stat. (1985) 206--227. The Institute of Mathematical Statistics.","key":"e_1_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1109\/TII.2015.2491259"},{"volume-title":"Proceedings of the IEEE 22nd International Symposium on Intelligent Control. IEEE, 23--28","author":"Robinson Craig L.","key":"e_1_2_1_37_1"},{"volume-title":"Proceedings of the IEEE 55th Conference on Decision and Control (CDC\u201916)","year":"2016","author":"Satchidanandan B.","key":"e_1_2_1_38_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_39_1","DOI":"10.1109\/JPROC.2016.2575064"},{"volume-title":"Proceedings of the 9th International Conference on Communication Systems and Networks (COMSNETS\u201917)","year":"2017","author":"Satchidanandan B.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the 55th Allerton Conference on Communication, Control, and Computing. 911--917","year":"2017","author":"Satchidanandan B.","key":"e_1_2_1_41_1"},{"doi-asserted-by":"crossref","unstructured":"Bharadwaj Satchidanandan and P. R. Kumar. 2018. Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System. Springer International Publishing Cham 217--228. DOI:https:\/\/doi.org\/10.1007\/978-3-319-67068-3_16  Bharadwaj Satchidanandan and P. R. Kumar. 2018. Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System. Springer International Publishing Cham 217--228. DOI:https:\/\/doi.org\/10.1007\/978-3-319-67068-3_16","key":"e_1_2_1_42_1","DOI":"10.1007\/978-3-319-67068-3_16"},{"volume-title":"Proceedings of the IEEE Conference on Decision and Control (CDC\u201918). 2068--2073","year":"2018","author":"Satchidanandan B.","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","first-page":"2","article-title":"On the design of security-guaranteeing dynamic watermarks","volume":"4","author":"Satchidanandan B.","year":"2020","journal-title":"IEEE Contr. Syst. Lett."},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1137\/1108002"},{"doi-asserted-by":"publisher","key":"e_1_2_1_46_1","DOI":"10.1145\/2810103.2813679"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1137\/S0040585X97981202"},{"doi-asserted-by":"publisher","key":"e_1_2_1_48_1","DOI":"10.1145\/2185505.2185515"},{"volume-title":"Proceedings of the 50th Allerton Conference on Communication, Control, and Computing. 1806--1813","year":"2012","author":"Teixeira A.","key":"e_1_2_1_49_1"},{"volume-title":"Proceedings of the 31st Computer Security Applications Conference (ACSAC\u201915)","year":"1800","author":"Valente Junia","key":"e_1_2_1_50_1"},{"volume":"3","volume-title":"Academic Press Library in Signal Processing","author":"Venugopal","key":"e_1_2_1_51_1"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361700","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:08Z","timestamp":1750202588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,31]]}},"alternative-id":["10.1145\/3361700"],"URL":"https:\/\/doi.org\/10.1145\/3361700","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"type":"print","value":"2378-962X"},{"type":"electronic","value":"2378-9638"}],"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2017-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}