On the confidentiality of controller states under sensor attacks.
David UmsonstHenrik SandbergPublished in: CoRR (2020)
Keyphrases
- information leakage
- initial state
- micro controller
- real time
- control system
- control loop
- sensor data
- countermeasures
- contact force
- intrusion detection and prevention
- closed loop
- sensor networks
- information security
- neural network
- controller design
- control architecture
- malicious attacks
- control method
- watermarking scheme
- pid controller
- access control
- personal information
- adaptive control
- control algorithm
- sensor fusion
- multi sensor
- hidden markov models
- fuzzy logic
- optimal policy
- control strategy
- optimal control
- security mechanisms
- control law
- state variables
- control scheme