Secure networked control systems against replay attacks without injecting authentication noise.
Bixiang TangLuis AlvergueGuoxiang GuPublished in: ACC (2015)
Keyphrases
- security mechanisms
- networked control systems
- security issues
- access control
- security requirements
- security protocols
- authentication scheme
- user authentication
- authentication protocol
- smart card
- long time delay
- security analysis
- cryptographic protocols
- communication networks
- key distribution
- control theory
- packet loss
- digital watermarking
- feedback control
- real time
- control method
- wavelet transform
- control system
- key agreement protocol
- guaranteed cost