Show simple item record

dc.contributor.authorSánchez Corrales, Helem Sabina
dc.contributor.authorRotondo, Damiano
dc.contributor.authorEscobet Canal, Teresa
dc.contributor.authorPuig Cayuela, Vicenç
dc.contributor.authorSaludes Closa, Jordi
dc.contributor.authorQuevedo Casín, Joseba Jokin
dc.contributor.otherInstitut de Robòtica i Informàtica Industrial
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Minera, Industrial i TIC
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament de Matemàtiques
dc.date.accessioned2020-02-14T19:16:33Z
dc.date.available2020-02-14T19:16:33Z
dc.date.issued2019-03-01
dc.identifier.citationSanchez, H. [et al.]. Detection of replay attacks in cyber-physical systems using a frequency-based signature. "Journal of the Franklin Institute", 1 Març 2019, vol. 356, núm. 5, p. 2798-2824.
dc.identifier.issn0016-0032
dc.identifier.urihttp://hdl.handle.net/2117/177795
dc.description.abstractThis paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop system and checks whether the time profile of the frequency components in the output signal are compatible with the authentication signal or not. In order to carry out this target, the couplings between inputs and outputs are eliminated using a dynamic decoupling technique based on vector fitting. In this way, a signature introduced on a specific input channel will affect only the output that is selected to be associated with that input, which is a property that can be exploited to determine which channels are being affected. A bank of band-pass filters is used to generate signals whose energies can be compared to reconstruct an estimation of the time-varying frequency profile. By matching the known frequency profile with its estimation, the detector can provide the information about whether a replay attack is being carried out or not. The design of the signal generator and the detector are thoroughly discussed, and an example based on a quadruple-tank process is used to show the application and effectiveness of the proposed method.
dc.format.extent27 p.
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Automàtica i control
dc.subject.otherCyber-physical systems
dc.subject.othercyber-attacks
dc.subject.otherreplay attacks
dc.subject.othersignal generator
dc.subject.otherdetector logic
dc.titleDetection of replay attacks in cyber-physical systems using a frequency-based signature
dc.typeArticle
dc.contributor.groupUniversitat Politècnica de Catalunya. SAC - Sistemes Avançats de Control
dc.identifier.doi10.1016/j.jfranklin.2019.01.005
dc.description.peerreviewedPeer Reviewed
dc.subject.inspecClassificació INSPEC::Cybernetics
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S0016003219300134
dc.rights.accessOpen Access
local.identifier.drac23964788
dc.description.versionPostprint (author's final draft)
dc.relation.projectidinfo:eu-repo/grantAgreement/MINECO/2PE/MDM-2016-0656
dc.relation.projectidinfo:eu-repo/grantAgreement/CSIC/DEOCS/DPI2016-76493-C3-3-R
local.citation.authorSanchez, H.; Rotondo, D.; Escobet, T.; Puig, V.; Saludes, J.; Quevedo, J.
local.citation.publicationNameJournal of the Franklin Institute
local.citation.volume356
local.citation.number5
local.citation.startingPage2798
local.citation.endingPage2824


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Spain
Except where otherwise noted, content on this work is licensed under a Creative Commons license : Attribution-NonCommercial-NoDerivs 3.0 Spain