Stochastic coding detection scheme in cyber-physical systems against replay attack
From MaRDI portal
Publication:2005521
DOI10.1016/j.ins.2018.12.091zbMath1451.94035OpenAlexW2907018391WikidataQ128643833 ScholiaQ128643833MaRDI QIDQ2005521
Publication date: 8 October 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.12.091
Related Items (42)
Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems ⋮ Event-trigger-based recursive sliding-mode dynamic surface containment control with nonlinear gains for nonlinear multi-agent systems ⋮ Co-design of output-based security control and dynamic event-triggered mechanism for NCSs under hybrid cyber attacks ⋮ An event‐triggered approach to security control for networked systems using hybrid attack model ⋮ Static output feedback secure control for cyber‐physical systems based on multisensor scheme against replay attacks ⋮ Distributed filtering for nonlinear systems under Dempster–Shafer theory subject to malicious cyber attacks ⋮ Adaptive resilient control design for nonlinear time‐delay systems against unknown state‐dependent deception attacks ⋮ Adaptive event-triggered control for networked interconnected systems with cyber-attacks ⋮ K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks ⋮ Dynamic event‐triggered sliding mode security control for Markovian jump systems: Learning‐based iteration optimization method ⋮ Neural‐network‐based distributed security filtering for networked switched systems ⋮ Resilient leader tracking for networked Lagrangian systems under DoS attacks ⋮ A data‐based private learning framework for enhanced security against replay attacks in cyber‐physical systems ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Adaptive attack-resilient control for Markov jump system with additive attacks ⋮ Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach ⋮ Event-triggered consensus control of multi-agent systems under denial-of-service jamming attacks ⋮ Adaptive sliding-mode tracking control of networked control systems with false data injection attacks ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy ⋮ An adaptive control scheme for switched nonlinear cyber‐physical systems against state‐dependent sensor attacks and input‐dependent actuator attacks ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Static output feedback control for discrete‐time hidden Markov jump systems against deception attacks ⋮ Reliable filter design for discrete-time neural networks with Markovian jumping parameters and time-varying delay ⋮ Security control of cyber-physical switched systems under round-robin protocol: input-to-state stability in probability ⋮ Sliding-mode secure control for jump cyber-physical systems with malicious attacks ⋮ Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems ⋮ Adaptive neural-based control for non-strict feedback systems with full-state constraints and unmodeled dynamics ⋮ Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: the input-to-state stability ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks ⋮ Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks ⋮ Observer-based synchronization control for complex networks against asynchronous attacks ⋮ Optimal sensor attacks in cyber-physical systems with round-robin protocol ⋮ Event-triggered \(H_\infty\) control of networked switched systems subject to denial-of-service attacks ⋮ Event-triggered bipartite leader-following consensus of second-order nonlinear multi-agent systems under signed digraph ⋮ Frequency domain resilient consensus of multi-agent systems under IMP-based and non IMP-based attacks ⋮ Resilient adaptive event-triggered dissipative control for networked control systems with DoS attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme ⋮ Resilient event-triggered fault-tolerant control for networked control systems with randomly occurring nonlinearities and DoS attacks
Cites Work
- Unnamed Item
- Network-based \(H_\infty\) filtering using a logic jumping-like trigger
- Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
- Improved adaptive resilient control against sensor and actuator attacks
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Distributed consensus control for multi-agent systems under denial-of-service
- A secure control framework for resource-limited adversaries
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Resilient control under denial-of-service: robust design
- Input-to-State Stabilizing Control Under Denial-of-Service
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Detection in Adversarial Environments
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks
- Stealthy deception attacks on water SCADA systems
- A Lyapunov Redesign of Coordination Algorithms for Cyber-Physical Systems
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Attack Detection and Identification in Cyber-Physical Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
This page was built for publication: Stochastic coding detection scheme in cyber-physical systems against replay attack