On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
From MaRDI portal
Publication:4567028
DOI10.1109/TAC.2017.2714903zbMath1390.93776OpenAlexW2627024038MaRDI QIDQ4567028
Cheng-Zong Bai, Fabio Pasqualetti, Vijay Gupta
Publication date: 27 June 2018
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tac.2017.2714903
Filtering in stochastic control theory (93E11) Signal theory (characterization, reconstruction, filtering, etc.) (94A12)
Related Items (27)
Worst-case stealthy innovation-based linear attack on remote state estimation ⋮ Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Stability analysis of token-based wireless networked control systems under deception attacks ⋮ Deception attacks on event-triggered distributed consensus estimation for nonlinear systems ⋮ Design of false data injection attacks in cyber-physical systems ⋮ A class of stealthy attacks on remote state estimation with intermittent observation ⋮ Network steganography based security framework for cyber-physical systems ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Performance degradation of stealthy attacks against sensor measurements in vector systems ⋮ Securing state reconstruction under sensor and actuator attacks: theory and design ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Distributed Kalman filter for linear system with complex multi-channel stochastic uncertain parameter and decoupled local filters ⋮ Attack and estimator design for multi-sensor systems with undetectable adversary ⋮ Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems ⋮ Two-channel false data injection attacks on multi-sensor remote state estimation ⋮ Nonlinear stealthy attacks on remote state estimation ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Fusion estimation in clustering sensor networks under stochastic deception attacks
This page was built for publication: On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds