{"id":"https://openalex.org/W2798841251","doi":"https://doi.org/10.1109/smartgridcomm.2017.8340720","title":"Physical watermarking for securing cyber physical systems via packet drop injections","display_name":"Physical watermarking for securing cyber physical systems via packet drop injections","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2798841251","doi":"https://doi.org/10.1109/smartgridcomm.2017.8340720","mag":"2798841251"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm.2017.8340720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2017.8340720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068190748","display_name":"Omur Ozel","orcid":"https://orcid.org/0000-0001-5756-0963"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Omur Ozel","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008076228","display_name":"Sean Weerakkody","orcid":"https://orcid.org/0000-0002-0133-696X"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sean Weerakkody","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006051783","display_name":"Bruno Sinopoli","orcid":"https://orcid.org/0000-0001-5778-4879"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bruno Sinopoli","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068190748"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":1.4081,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.8354455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"271","last_page":"276"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7047518491744995},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.695704996585846},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6755384802818298},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6627002954483032},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5925164818763733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5260969400405884},{"id":"https://openalex.org/keywords/drop","display_name":"Drop (telecommunication)","score":0.5088170170783997},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.4981961250305176},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49560534954071045},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.45791804790496826},{"id":"https://openalex.org/keywords/bernoullis-principle","display_name":"Bernoulli's principle","score":0.4315224289894104},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23042899370193481},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19111883640289307},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.15920016169548035},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09754213690757751}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7047518491744995},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.695704996585846},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6755384802818298},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6627002954483032},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5925164818763733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5260969400405884},{"id":"https://openalex.org/C2781345722","wikidata":"https://www.wikidata.org/wiki/Q5308388","display_name":"Drop (telecommunication)","level":2,"score":0.5088170170783997},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.4981961250305176},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49560534954071045},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.45791804790496826},{"id":"https://openalex.org/C152361515","wikidata":"https://www.wikidata.org/wiki/Q181328","display_name":"Bernoulli's principle","level":2,"score":0.4315224289894104},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23042899370193481},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19111883640289307},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.15920016169548035},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09754213690757751},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm.2017.8340720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2017.8340720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W137221814","https://openalex.org/W243364245","https://openalex.org/W1598852905","https://openalex.org/W2003530067","https://openalex.org/W2007955754","https://openalex.org/W2022406843","https://openalex.org/W2036033662","https://openalex.org/W2038651258","https://openalex.org/W2042960896","https://openalex.org/W2062132646","https://openalex.org/W2064284013","https://openalex.org/W2080662935","https://openalex.org/W2105773843","https://openalex.org/W2137243960","https://openalex.org/W2150436340","https://openalex.org/W2158469273","https://openalex.org/W2164522996","https://openalex.org/W2555431798","https://openalex.org/W2568342920","https://openalex.org/W2622952038","https://openalex.org/W6605546146","https://openalex.org/W6609413134","https://openalex.org/W6652353671","https://openalex.org/W6666735270"],"related_works":["https://openalex.org/W2369048989","https://openalex.org/W2142488199","https://openalex.org/W2387794751","https://openalex.org/W2367131347","https://openalex.org/W2031031029","https://openalex.org/W4286233224","https://openalex.org/W4312782971","https://openalex.org/W2539870919","https://openalex.org/W2125820283","https://openalex.org/W2137394636"],"abstract_inverted_index":{"Physical":[0],"watermarking":[1,97],"is":[2,25],"a":[3,21,51,94,139],"well":[4],"known":[5],"solution":[6],"for":[7,143],"detecting":[8,71],"integrity":[9,72],"attacks":[10],"on":[11,123],"Cyber-Physical":[12],"Systems":[13],"(CPSs)":[14],"such":[15],"as":[16,93,138],"the":[17,28,65,79,87,100,118,133],"smart":[18],"grid.":[19],"Here,":[20],"random":[22],"control":[23,88,127],"input":[24],"injected":[26],"into":[27,86],"system":[29],"in":[30,50,70,146],"order":[31],"to":[32,54,91],"authenticate":[33],"physical":[34,96,141],"dynamics":[35],"and":[36,106,109,126],"sensors":[37],"which":[38],"may":[39,47],"have":[40],"been":[41],"corrupted":[42],"by":[43],"adversaries.":[44],"Packet":[45],"drops":[46,69,85,122,135],"naturally":[48],"occur":[49],"CPS":[52],"due":[53],"network":[55],"imperfections.":[56],"To":[57],"our":[58],"knowledge,":[59],"previous":[60],"work":[61],"has":[62],"not":[63],"considered":[64],"role":[66],"of":[67,81,120],"packet":[68,84,112,121,134],"attacks.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77,116],"investigate":[78],"merit":[80],"injecting":[82],"Bernoulli":[83],"inputs":[89],"sent":[90],"actuators":[92],"new":[95],"scheme.":[98],"With":[99],"classical":[101],"linear":[102],"quadratic":[103],"objective":[104],"function":[105],"an":[107],"independent":[108],"identically":[110],"distributed":[111],"drop":[113],"injection":[114],"sequence,":[115],"study":[117],"effect":[119],"meeting":[124],"security":[125],"objectives.":[128],"Our":[129],"results":[130],"indicate":[131],"that":[132],"could":[136],"act":[137],"potential":[140],"watermark":[142],"attack":[144],"detection":[145],"CPSs.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
