{"id":"https://openalex.org/W3113529384","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9302937","title":"Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures","display_name":"Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures","publication_year":2020,"publication_date":"2020-11-11","ids":{"openalex":"https://openalex.org/W3113529384","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9302937","mag":"3113529384"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm47815.2020.9302937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9302937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022408765","display_name":"Abel O. Gomez Rivera","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abel O. Gomez Rivera","raw_affiliation_strings":["Department of Computer Science, University of Texas at El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas at El Paso, TX, USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065745202","display_name":"Deepak K. Tosh","orcid":"https://orcid.org/0000-0001-8492-1066"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deepak K. Tosh","raw_affiliation_strings":["Department of Computer Science, University of Texas at El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas at El Paso, TX, USA","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029731437","display_name":"Jaime C. Acosta","orcid":"https://orcid.org/0000-0003-2555-9989"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jaime C. Acosta","raw_affiliation_strings":["CCDC Army Research Laboratory, El Paso, TX, USA"],"affiliations":[{"raw_affiliation_string":"CCDC Army Research Laboratory, El Paso, TX, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042072991","display_name":"Laurent Njilla","orcid":"https://orcid.org/0000-0001-8902-7418"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurent Njilla","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Lab, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Lab, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022408765"],"corresponding_institution_ids":["https://openalex.org/I164936912"],"apc_list":null,"apc_paid":null,"fwci":0.9241,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74230546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8847672939300537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6801062226295471},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5860708355903625},{"id":"https://openalex.org/keywords/modbus","display_name":"Modbus","score":0.5529428720474243},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.5474005341529846},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5333601832389832},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5219321250915527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5141404271125793},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5002281665802002},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4646773934364319},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.448991984128952},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43207040429115295},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.4171789586544037},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.32956618070602417},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2919332981109619},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2394050657749176},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13796856999397278},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09278920292854309}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8847672939300537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6801062226295471},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5860708355903625},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.5529428720474243},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.5474005341529846},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5333601832389832},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5219321250915527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5141404271125793},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5002281665802002},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4646773934364319},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.448991984128952},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43207040429115295},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4171789586544037},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32956618070602417},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2919332981109619},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2394050657749176},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13796856999397278},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09278920292854309},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm47815.2020.9302937","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9302937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2000171858","https://openalex.org/W2039427951","https://openalex.org/W2102976278","https://openalex.org/W2131060714","https://openalex.org/W2609047018","https://openalex.org/W2670040239","https://openalex.org/W2771537552","https://openalex.org/W2789746206","https://openalex.org/W2801237935","https://openalex.org/W2803288618","https://openalex.org/W2888413717","https://openalex.org/W3020448654","https://openalex.org/W6751546035"],"related_works":["https://openalex.org/W2117726577","https://openalex.org/W2361898737","https://openalex.org/W2115322934","https://openalex.org/W3011157599","https://openalex.org/W3030741396","https://openalex.org/W2765702057","https://openalex.org/W2480100730","https://openalex.org/W2392411935","https://openalex.org/W2499998484","https://openalex.org/W3013388283"],"abstract_inverted_index":{"Supervisory":[0],"Control":[1],"and":[2,55,71,79,118,133,157],"Data":[3],"Acquisition":[4],"(SCADA)":[5],"systems":[6],"are":[7,63,76,83],"commonly":[8,64],"found":[9],"at":[10],"National":[11],"Critical":[12],"Infrastructures":[13],"that":[14],"provide":[15],"necessary":[16],"cyber-enable":[17],"services":[18],"(e.g.,":[19],"energy)":[20],"for":[21],"society.":[22],"In":[23,42,86],"state-of-art":[24,80],"SCADA":[25,40,44,165],"systems,":[26],"the":[27,53,128,135,143,188,192],"physical":[28],"process":[29],"is":[30,168],"monitored":[31],"by":[32],"field":[33,58,61,138],"sensors,":[34],"which":[35,108],"transmit":[36],"data":[37,70,131],"to":[38,51,66,112,126,170],"a":[39,91,149,158,164,171],"master.":[41],"general,":[43],"communication":[45],"protocols":[46],"lack":[47],"proper":[48],"security":[49,56,95],"mechanisms":[50],"protect":[52,134],"integrity":[54,129],"of":[57,130,137,142],"sensors.":[59,139],"Thus":[60],"sensors":[62,75],"vulnerable":[65,169],"standard":[67,175],"cyber-attacks,":[68],"e.g.,":[69],"identity":[72,136],"spoofing.":[73],"Field":[74],"low-end":[77],"devices,":[78],"crypto":[81],"solutions":[82],"not":[84],"suitable.":[85],"this":[87],"paper,":[88],"we":[89,110,179],"discuss":[90],"novel":[92],"lightweight":[93],"hardware-based":[94],"mechanism,":[96,107],"namely,":[97],"Physical":[98],"Unclonable":[99],"Functions":[100],"(PUFs).":[101],"We":[102,161],"introduce":[103],"an":[104,114,155],"SRAM-based":[105],"PUF":[106,116,194],"then":[109],"use":[111],"design":[113],"SRAM":[115],"Authentication":[117],"Integrity":[119],"(SPAI)":[120],"protocol.":[121],"The":[122],"SPAI":[123,184],"protocol":[124,144,185],"aims":[125],"ensure":[127],"flow":[132],"A":[140],"prototype":[141],"has":[145],"been":[146],"implemented":[147],"in":[148],"Raspberry":[150],"Pi":[151],"3":[152],"Model":[153],"B,":[154],"SRAM,":[156],"temperature":[159],"sensor.":[160],"describe":[162],"how":[163,181],"system":[166],"emulation":[167],"man-in-the-middle":[172,189],"attack":[173,190],"using":[174],"eavesdropping":[176],"techniques.":[177],"Then":[178],"show":[180],"our":[182],"proposed":[183],"can":[186],"prevent":[187],"through":[191],"embedded":[193],"mechanism.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
