Sensor deception attacks against security in supervisory control systems.
Jingshi YaoShaoyuan LiXiang YinPublished in: Autom. (2024)
Keyphrases
- control system
- intrusion detection and prevention
- security threats
- security mechanisms
- security problems
- security measures
- cyber attacks
- security protocols
- computer security
- industrial automation
- intrusion detection
- security issues
- security vulnerabilities
- java card
- critical infrastructure
- security risks
- denial of service attacks
- fault injection
- security breaches
- process control
- countermeasures
- chosen plaintext
- malicious attacks
- information security
- malicious users
- real time
- cryptographic protocols
- cryptographic algorithms
- key management
- sensor data
- stream cipher
- security flaws
- secure routing
- security management
- insider attacks
- security requirements
- access control
- network security
- identity theft
- wireless sensor
- misuse detection
- attack scenarios
- block cipher
- sensor networks
- control strategy
- buffer overflow
- biometric template
- security policies
- ddos attacks
- information leakage
- sensor technology
- watermarking scheme
- dos attacks
- attack detection
- user authentication
- sql injection
- network traffic
- intrusion prevention
- intrusion detection system