kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An Online Approach to Physical Watermark Design
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore..
Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China.;Tsinghua Univ, BNRist, Beijing 100084, Peoples R China..
Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore..
Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore..ORCID iD: 0000-0002-7137-4136
Show others and affiliations
2020 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 65, no 9, p. 3895-3902Article in journal (Refereed) Published
Abstract [en]

This article considers the problem of designing physical watermark signals in order to optimally detect possible replay attack in a linear time-invariant system, under the assumption that the system parameters are unknown and need to be identified online. We first provide a replay attack model, where an adversary replays the previous sensor data in order to fool the system. A physical watermarking scheme, which leverages a random input as a watermark to detect the replay attack, is then introduced. The optimal watermark signal design problem is cast as an optimization problem, which aims to achieve the optimal trade-off between control performance and intrusion detection. An online watermarking design and system identification algorithm is provided to deal with systems with unknown parameters. We prove that the proposed algorithm converges to the optimal one and characterize the almost sure convergence rate. An industrial process example is provided to illustrate the effectiveness of the proposed strategy.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020. Vol. 65, no 9, p. 3895-3902
Keywords [en]
Watermarking, Detectors, Intrusion detection, Mathematical model, Control systems, Convergence, Electronic mail, Cyber-physical system, security, system identification
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-281491DOI: 10.1109/TAC.2020.2971994ISI: 000565140400013Scopus ID: 2-s2.0-85090942028OAI: oai:DiVA.org:kth-281491DiVA, id: diva2:1478188
Note

QC 20201021

Available from: 2020-10-21 Created: 2020-10-21 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Liu, HanxiaoJohansson, Karl H.

Search in DiVA

By author/editor
Liu, HanxiaoXie, LihuaJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)
In the same journal
IEEE Transactions on Automatic Control
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 85 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf