Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach

From MaRDI portal
Revision as of 21:03, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2982577

DOI10.1109/TAC.2015.2461851zbMath1360.93674OpenAlexW1651728063MaRDI QIDQ2982577

Ling Shi, Peng Cheng, Daniel E. Quevedo, Yuzhe Li, Ji-Ming Chen

Publication date: 16 May 2017

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2015.2461851






Related Items (69)

False data injection attack on consensus‐based distributed estimationObserver-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryptionWorst-case stealthy innovation-based linear attack on remote state estimationOn the analysis of open-loop Nash equilibria admitting a feedback synthesis in nonlinear differential gamesStochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysisPeriodic event-triggered resilient control for cyber-physical systems under denial-of-service attacksDefensive deception against reactive jamming attacks in remote state estimationOptimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocolThe Effect of Time-Varying Jamming Interference on Networked StabilizationSecure control for cyber-physical systems with positive constraint under DoS attackAn event‐triggered approach to security control for networked systems using hybrid attack modelStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachEnergy efficient management for distributed state estimation under DoS attacksOptimal filter design for cyber‐physical systems under stealthy hybrid attacksObserver-based guaranteed cost control of cyber-physical systems under DoS jamming attacksEvent‐triggered security control for fuzzy‐model‐based cyber‐physical systems under Denial‐of‐Service attacks and actuator faultsBinary observation‐based FIR system identification under sequence denial of service attacksWhittle's index based sensor scheduling for multiprocess systems under DoS attacksResilient strategy design for cyber-physical system under DoS attack over a multi-channel frameworkSecure networked control under jamming attacks: an SINR-based approachDifferential privacy for symbolic systems with application to Markov chainsEvent-triggered remote state estimation for cyber-physical systems under malicious DoS attacksA data‐based event‐triggered control for switching topology nonlinear multiagent systems with DoS attacksOptimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference powerData‐driven bipartite leader‐following consensus control for nonlinear multi‐agent systems under hybrid attacksFiltering for systems subject to unknown inputs without a priori initial informationA dynamic event-triggered approach to observer-based PID security control subject to deception attacksOptimal denial-of-service attack energy management against state estimation over an SINR-based networkSwitched Stackelberg game analysis of false data injection attacks on networked control systemsCyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based FrameworkEvent-triggered resilient control for cyber-physical system under denial-of-service attacksTimely detection and mitigation of IoT-based cyberattacks in the smart gridSINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete informationMulti-sensor Kalman filtering over packet-dropping networks subject to round-robin protocol schedulingAttack allocation on remote state estimation in multi-systems: structural results and asymptotic solutionStackelberg game for secure estimation of linear systems subject to unknown input and smart jammingA multi-channel transmission schedule for remote state estimation under DoS attacksSecure remote state estimation against linear man-in-the-middle attacks using watermarkingTowards quantifying the impact of randomly occurred attacks on a class of networked control systemsOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataA Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked ControlDistributed formation control with open-loop Nash strategyDistributed Krein space-based attack detection over sensor networks under deception attacksSwitching resilient control scheme for cyber-physical systems against DoS attacksGame learning-based system identification with binary-valued observations under DoS attacksSecure analysis of dynamic networks under pinning attacks against synchronizationGuaranteed cost control of cyber-physical systems with packet dropouts under DoS jamming attacksSecurity-aware optimal actuator placement in vehicle platooningIncentive-based fault-tolerant cooperative payoff design in weakly acyclic gamesThe detection mechanism for false data injection attack via the ellipsoidal set-membership approachOptimal resource allocation and feasible hexagonal topology for cyber-physical systemsObserver-based stability of switched system under jamming attack and random packet lossDynamic games in cyber-physical security: an overviewDistributed resilient adaptive consensus tracking control of nonlinear multi-agent systems dealing with deception attacks via K-filters approachCommand-governor-based stealthy attack design for estimation difference regulationOL-NE for LQ differential games: a port-controlled Hamiltonian system perspective and some computational strategiesTwo-channel stealthy false data injection attacks design without estimator knowledgeEvent-triggered generalized extended state observer-based control for nonlinear networked systems under gain variation and multi-channel attacksObserver-based synchronization control for complex networks against asynchronous attacksSecure state estimation for systems under mixed cyber-attacks: security and performance analysisAdaptive fault estimation for cyber-physical systems with intermittent DoS attacksOptimal sensor attacks in cyber-physical systems with round-robin protocolThe vulnerability of distributed state estimator under stealthy attacksKalman filtering under unknown inputs and norm constraintsTransmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimationOptimal linear attack for multi-sensor network against state estimationSensor scheduling design for complex networks under a distributed state estimation frameworkSecurity analysis and fault detection against stealthy replay attacksDistributed secure estimation for cyber-physical systems with fading measurements and false data injection attacks







This page was built for publication: Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach