Worst-case stealthy innovation-based linear attack on remote state estimation
From MaRDI portal
Publication:1640242
DOI10.1016/j.automatica.2017.11.018zbMath1387.93143OpenAlexW2780545917MaRDI QIDQ1640242
Ling Shi, Dawei Shi, Karl Henrik Johansson, Ziyang Guo
Publication date: 14 June 2018
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2017.11.018
semidefinite programmingKullback-Leibler divergenceremote state estimationcyber-physical system securityintegrity attack
Semidefinite programming (90C22) Communication networks in operations research (90B18) Control/observation systems involving computers (process control, etc.) (93C83) Optimal stochastic control (93E20) Stochastic systems in control theory (general) (93E03)
Related Items
Network theoretic analysis of maximum a posteriori detectors for optimal input detection ⋮ Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ On the confidentiality of controller states under sensor attacks ⋮ A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks ⋮ Man-in-the-middle attack against cyber-physical systems under random access protocol ⋮ Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ False data injection attacks on sensors against state estimation in cyber-physical systems ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ Integrity attacks on remote estimation with spatial-temporal information sources ⋮ Optimal attack strategy against fault detectors for linear cyber-physical systems ⋮ Performance based attack detection and security analysis for cyber‐physical systems ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ Robust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimation ⋮ Design of false data injection attacks in cyber-physical systems ⋮ Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism ⋮ Optimal completely stealthy attacks against remote estimation in cyber-physical systems ⋮ Network steganography based security framework for cyber-physical systems ⋮ An encoding mechanism for secrecy of remote state estimation ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Performance degradation of stealthy attacks against sensor measurements in vector systems ⋮ Stochastic coding detection scheme in cyber-physical systems against replay attack ⋮ Optimal stealthy false data injection attacks in cyber-physical systems ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Attack and estimator design for multi-sensor systems with undetectable adversary ⋮ Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Optimal sensor attacks in cyber-physical systems with round-robin protocol ⋮ Resilient synchronization of distributed multi-agent systems under attacks ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Optimal linear attack for multi-sensor network against state estimation ⋮ Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization ⋮ Security analysis and fault detection against stealthy replay attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
Cites Work
- Event-based state estimation of linear dynamic systems with unknown exogenous inputs
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Secure Control Systems: A Quantitative Risk Management Approach
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal Linear Cyber-Attack on Remote State Estimation