Abstract

Dynamic watermarking (DW)-based detection methods can effectively detect replay attacks, however these detection methods cannot achieve the desired effectiveness for generalised replay attacks (GRAs). The objectiveness of this paper is to investigate security weakness of DW-based detection for GRAs. Firstly, unlike replaying history data from replay attacks, data accuracy compromised by GRAs is analysed, where their characteristics are similar to that compromised by replay attacks, and the current data are distorted by typical GRAs such as injection, replacement and scaling attacks. Secondly, considering the corresponding hidden Markov models of different types of GRAs, the stealthiness is quantified by auto covariance of residuals and cross covariance between residuals and watermarking signals. It is found that if both auto and cross covariance keep unchanged or increase along with watermarking intensity increasing, GRAs cannot be detected effectively. Thirdly, after DW-based detection is invalid for GRAs, it is proved that the stability of closed-loop systems for open-loop unstable dynamics will be destroyed, or the admissible system state bounds can be crossed within a finite time. Finally, experiments are operated on a networked inverted pendulum platform, and experimental results confirm security weakness of DW-based detection for GRAs.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.