A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks.
Zhiheng XuQuanyan ZhuPublished in: SCAV@CPSWeek (2017)
Keyphrases
- control system
- security mechanisms
- cryptographic protocols
- distributed control
- security protocols
- control architecture
- stream cipher
- control strategy
- process control
- closed loop
- control center
- multi party
- secure routing
- real time
- resource constrained
- communication networks
- secure communication
- control strategies
- remote monitoring
- remote user authentication scheme
- countermeasures
- control method
- control algorithm
- computer networks
- data acquisition
- secret key
- security requirements
- key management
- control law
- communication systems
- control scheme
- information leakage
- smart card
- cryptographic algorithms
- information sharing
- mobile robot