On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds

From MaRDI portal
Revision as of 11:38, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4567028

DOI10.1109/TAC.2017.2714903zbMath1390.93776OpenAlexW2627024038MaRDI QIDQ4567028

Cheng-Zong Bai, Fabio Pasqualetti, Vijay Gupta

Publication date: 27 June 2018

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2017.2714903






Related Items (27)

Worst-case stealthy innovation-based linear attack on remote state estimationStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachOptimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraintSecurity of networked control systems subject to deception attacks: a surveyOptimal stealthy attack with historical data on cyber-physical systemsOptimal deception attacks on remote state estimators equipped with interval anomaly detectorsComplete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systemsStability analysis of token-based wireless networked control systems under deception attacksDeception attacks on event-triggered distributed consensus estimation for nonlinear systemsDesign of false data injection attacks in cyber-physical systemsA class of stealthy attacks on remote state estimation with intermittent observationNetwork steganography based security framework for cyber-physical systemsFalse data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approachOptimal \(\epsilon\)-stealthy attack in cyber-physical systemsPerformance degradation of stealthy attacks against sensor measurements in vector systemsSecuring state reconstruction under sensor and actuator attacks: theory and designOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataDistributed Kalman filter for linear system with complex multi-channel stochastic uncertain parameter and decoupled local filtersAttack and estimator design for multi-sensor systems with undetectable adversaryOptimal periodic watermarking schedule for replay attack detection in cyber-physical systemsTwo-channel false data injection attacks on multi-sensor remote state estimationNonlinear stealthy attacks on remote state estimationA secure strategy for a cyber physical system with multi-sensor under linear deception attackOptimal deception attacks against remote state estimation in cyber-physical systemsSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationHow vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacksFusion estimation in clustering sensor networks under stochastic deception attacks







This page was built for publication: On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds