On the confidentiality of controller states under sensor attacks.
David UmsonstHenrik SandbergPublished in: Autom. (2021)
Keyphrases
- information leakage
- real time
- initial state
- micro controller
- sensor networks
- control system
- countermeasures
- control loop
- contact force
- sensor data
- information security
- closed loop
- controller design
- intrusion detection and prevention
- multi sensor
- control algorithm
- personal information
- access control
- control method
- malicious attacks
- adaptive control
- watermarking algorithm
- reinforcement learning
- control architecture
- control theory
- control law
- fuzzy controller
- optimal control
- control strategy
- data acquisition
- input output