Security analysis for Cyber-Physical Systems against stealthy deception attacks.
Cheolhyeon KwonWeiyi LiuInseok HwangPublished in: ACC (2013)
Keyphrases
- security analysis
- cyber physical systems
- security requirements
- security mechanisms
- smart card
- defense mechanisms
- public key
- physical world
- cyber security
- embedded systems
- authentication protocol
- user authentication
- encryption scheme
- critical infrastructure
- security protocols
- ddos attacks
- computer systems
- access control
- low cost