Worst-case stealthy innovation-based linear attack on remote state estimation

From MaRDI portal
Publication:1640242

DOI10.1016/j.automatica.2017.11.018zbMath1387.93143OpenAlexW2780545917MaRDI QIDQ1640242

Ling Shi, Dawei Shi, Karl Henrik Johansson, Ziyang Guo

Publication date: 14 June 2018

Published in: Automatica (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.automatica.2017.11.018




Related Items

Network theoretic analysis of maximum a posteriori detectors for optimal input detectionWorst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systemsOn the confidentiality of controller states under sensor attacksA robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacksMan-in-the-middle attack against cyber-physical systems under random access protocolStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachVulnerability analysis of distributed state estimation under joint deception attacksOptimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systemsOptimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraintSecurity of networked control systems subject to deception attacks: a surveyFalse data injection attacks on sensors against state estimation in cyber-physical systemsOptimal stealthy attack with historical data on cyber-physical systemsOptimal deception attacks on remote state estimators equipped with interval anomaly detectorsComplete stealthiness false data injection attack design in multisensor systems with attack resource constraintsOptimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approachComplete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systemsInnovation-based stealthy attack against distributed state estimation over sensor networksIntegrity attacks on remote estimation with spatial-temporal information sourcesOptimal attack strategy against fault detectors for linear cyber-physical systemsPerformance based attack detection and security analysis for cyber‐physical systemsOptimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channelsRobust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimationDesign of false data injection attacks in cyber-physical systemsDesign of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanismOptimal completely stealthy attacks against remote estimation in cyber-physical systemsNetwork steganography based security framework for cyber-physical systemsAn encoding mechanism for secrecy of remote state estimationFalse data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approachA novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) indexPerformance degradation of stealthy attacks against sensor measurements in vector systemsStochastic coding detection scheme in cyber-physical systems against replay attackOptimal stealthy false data injection attacks in cyber-physical systemsOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataAttack and estimator design for multi-sensor systems with undetectable adversaryOptimal periodic watermarking schedule for replay attack detection in cyber-physical systemsA secure strategy for a cyber physical system with multi-sensor under linear deception attackOptimal deception attacks against remote state estimation in cyber-physical systemsOptimal sensor attacks in cyber-physical systems with round-robin protocolResilient synchronization of distributed multi-agent systems under attacksSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationMalicious adversaries against secure state estimation: Sparse sensor attack designHow vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacksOptimal linear attack for multi-sensor network against state estimationFuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantizationSecurity analysis and fault detection against stealthy replay attacksDetection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme



Cites Work