Secure remote state estimation against linear man-in-the-middle attacks using watermarking
From MaRDI portal
Publication:2003830
DOI10.1016/j.automatica.2020.109182zbMath1448.93317OpenAlexW3048112693MaRDI QIDQ2003830
Wen Yang, Yang Tang, Jiahao Huang, Fangfei Li, Daniel W. C. Ho
Publication date: 5 October 2020
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2020.109182
Control/observation systems involving computers (process control, etc.) (93C83) Estimation and detection in stochastic control theory (93E10) Computer security (68M25) Networked control (93B70)
Related Items (14)
An active approach for isolating replay attack from sensor faults ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Distributed encryption fusion estimation against full eavesdropping ⋮ Outlier-resistant sequential filtering fusion for cyber-physical systems with quantized measurements under denial-of-service attacks ⋮ Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ Distributed secure state estimation for linear systems against malicious agents through sorting and filtering ⋮ Proactive attack detection scheme based on watermarking and moving target defense ⋮ Tampering attack detection for remote interval observer ⋮ Trust-based distributed state estimation for microgrids with encoding-decoding mechanisms ⋮ State estimation for jump Markov nonlinear systems of unknown measurement data covariance ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Multi-sensor filtering fusion meets censored measurements under a constrained network environment: advances, challenges and prospects
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- A survey of design methods for failure detection in dynamic systems
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Cyberphysical Security in Networked Control Systems: An Introduction to the Issue
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems
- Optimal Attack Energy Allocation against Remote State Estimation
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality
- Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems
- Optimal Linear Cyber-Attack on Remote State Estimation
This page was built for publication: Secure remote state estimation against linear man-in-the-middle attacks using watermarking