Security for control systems under sensor and actuator attacks.
Hamza FawziPaulo TabuadaSuhas N. DiggaviPublished in: CDC (2012)
Keyphrases
- control system
- intrusion detection and prevention
- security threats
- security mechanisms
- security measures
- security problems
- cyber attacks
- computer security
- security protocols
- industrial automation
- denial of service attacks
- countermeasures
- java card
- security vulnerabilities
- security breaches
- intrusion detection
- security issues
- real time
- malicious users
- malicious attacks
- chosen plaintext
- critical infrastructure
- closed loop
- stream cipher
- security flaws
- access control
- fault injection
- cryptographic protocols
- security risks
- information security
- buffer overflow
- biometric template
- security requirements
- sensor data
- security management
- identity theft
- sensor networks
- cryptographic algorithms
- unauthorized access
- sensor technology
- dos attacks
- information leakage
- key management
- advanced encryption standard
- secure routing
- intrusion prevention
- control strategy
- network security
- intrusion detection system
- smart card
- wireless sensor
- cyber security
- attack detection
- insider attacks
- control scheme
- elliptic curve
- security analysis