State estimation under false data injection attacks: security analysis and system protection

From MaRDI portal
Revision as of 09:25, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:680516

DOI10.1016/j.automatica.2017.09.028zbMath1378.93119OpenAlexW2766003054WikidataQ115101002 ScholiaQ115101002MaRDI QIDQ680516

Qing-Long Han, Zidong Wang, Liang Hu, Xiao Hui Liu

Publication date: 23 January 2018

Published in: Automatica (Search for Journal in Brave)

Full work available at URL: https://pure.qub.ac.uk/en/publications/state-estimation-under-false-data-injection-attacks-security-analysis-and-system-protection(bad62bfc-f82a-4656-8727-5bd3e1f9d0f0).html




Related Items (81)

Security analysis and defense strategy of distributed filtering under false data injection attacksObserver-based sliding mode control for fuzzy stochastic switching systems with deception attacksLeaderless consensus control of uncertain multi-agents systems with sensor and actuator attacksAn improved reduction method based networked control against false data injection attacks and stochastic input delayFinite-region dissipative dynamic output feedback control for 2-D FM systems with missing measurementsWorst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systemsA robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacksAnnulus-event-based finite-time fault detection for discrete-time nonlinear systems with probabilistic interval delay and randomly occurring faultsEvent-based leader-follower consensus of nonlinear multi-agent systems under denial-of-serviceExponential synchronization of coupled neural networks under stochastic deception attacksMan-in-the-middle attack against cyber-physical systems under random access protocolReduced-order-asynchronous-based control for nonlinear jump networked systems with attacksStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachEvent‐triggered fault estimation and nonfragile synchronization control for multiweighted complex dynamical networks with deception attacksVulnerability analysis of distributed state estimation under joint deception attacksProbabilistic event-triggered protocol for switched power systems under multi-strategy deception attackActive resilient control for two‐dimensional systems under denial‐of‐service attacksOptimal filter design for cyber‐physical systems under stealthy hybrid attacksK‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacksDynamic event‐triggered sliding mode security control for Markovian jump systems: Learning‐based iteration optimization methodDynamic output feedback control for interval type-2 fuzzy systems against DoS attacks and sensor failuresProtocol-based variance-constrained distributed secure filtering with measurement censoringSecurity of networked control systems subject to deception attacks: a surveyFalse data injection attacks on sensors against state estimation in cyber-physical systemsOptimal stealthy attack with historical data on cyber-physical systemsOptimal deception attacks on remote state estimators equipped with interval anomaly detectorsProbability-guaranteed state estimation for nonlinear delayed systems under mixed attacksSecurity control of integral sliding modes for multi-agent systems under false data injection attacksSliding mode-based finite-time consensus tracking control for multi-agent systems under actuator attacksOptimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approachAdaptive sliding-mode tracking control of networked control systems with false data injection attacksComplete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systemsA dynamic encryption-decryption scheme for replay attack detection in cyber-physical systemsIntegrity attacks on remote estimation with spatial-temporal information sourcesDistributed Kalman filtering over sensor networks with fading measurements and random link failuresStability analysis of token-based wireless networked control systems under deception attacksRobust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode methodStealthy switching attacks on sensors against state estimation in cyber‐physical systemsA defense strategy for false data injection attacks in multi-agent systemsDistributed event‐triggered control for bipartite consensus under complex cyber‐attacksResilient time‐varying formation tracking for mobile robot networks under deception attacks on positioningSecurity control based on variable‐step predictive approach for networked control system with denial‐of‐service attacksSecure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observerOptimal completely stealthy attacks against remote estimation in cyber-physical systemsNetwork steganography based security framework for cyber-physical systemsFalse data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approachSwitched Stackelberg game analysis of false data injection attacks on networked control systemsEvent-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacksAdjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systemsVariance-constrained filtering for nonlinear systems with randomly occurring quantized measurements: recursive scheme and boundedness analysisA novel sparse false data injection attack method in smart grids with incomplete power network informationA novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) indexMobile robot localization under stochastic communication protocolSINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete informationSwitched projected gradient descent algorithms for secure state estimation under sparse sensor attacksSecurity control for Markov jump system with adversarial attacks and unknown transition rates via adaptive sliding mode techniqueRobust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of serviceSecurity control for T-S fuzzy systems with multi-sensor saturations and distributed event-triggered mechanismSecurity control of cyber-physical switched systems under round-robin protocol: input-to-state stability in probabilityResilient and secure remote monitoring for a class of cyber-physical systems against attacksAn overview of neuronal state estimation of neural networks with time-varying delaysOptimal stealthy false data injection attacks in cyber-physical systemsOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataAttack and estimator design for multi-sensor systems with undetectable adversaryDistributed Krein space-based attack detection over sensor networks under deception attacksOptimal DoS attack scheduling for multi-sensor remote state estimation over interference channelsA data-driven covert attack strategy in the closed-loop cyber-physical systemsAdaptive control of cyber-physical systems under deception and injection attacksOptimal deception attacks against remote state estimation in cyber-physical systemsObserver-based adaptive event-triggered sliding mode control of saturated nonlinear networked systems with cyber-attacksResilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacksSecure state estimation for systems under mixed cyber-attacks: security and performance analysisSampled-data-based consensus of multi-agent systems under asynchronous denial-of-service attacksSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationMalicious adversaries against secure state estimation: Sparse sensor attack designOptimal linear attack for multi-sensor network against state estimationFuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantizationA stealthy artificial noise strategy against eavesdropping for remote estimation sensor networksAnomaly detection and resilient control of networked control system with multi-hop routingRobust adaptive sliding mode control for discrete singular systems with randomly occurring mixed time-delays under uncertain occurrence probabilitiesThe safety region-based model predictive control for discrete-time systems under deception attacks



Cites Work




This page was built for publication: State estimation under false data injection attacks: security analysis and system protection