Medium access scheduling for input reconstruction under deception attacks
DOI10.1016/J.JFRANKLIN.2016.08.023zbMATH Open1367.93662OpenAlexW2515183578MaRDI QIDQ2012091FDOQ2012091
Authors: Mohamed Amine Sid, Shaikshavali Chitraganti, Karim Chabir
Publication date: 28 July 2017
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2016.08.023
Recommendations
- Input reconstruction for networked control systems subject to deception attacks and data losses on control signals
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks
- Recent advances on filtering and control for cyber-physical systems under security and resource constraints
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
communication networkcyber-physical systemsmodified Kalman filterrandom deception attacksensor scheduling co-designstate filtering scheme
Filtering in stochastic control theory (93E11) Communication networks in operations research (90B18) Estimation and detection in stochastic control theory (93E10) Stochastic scheduling theory in operations research (90B36) Computer system organization (68M99)
Cites Work
- Unbiased minimum variance estimation for systems with unknown exogenous inputs
- Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy - a survey and some new results
- Communication and control co-design for networked control systems
- A stochastic game approach to the security issue of networked control systems under jamming attacks
- Design of robust \(H\infty\) fault detection filter for uncertain time-delay systems using canonical form approach
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- Schedule and control co-design for networked control systems with bandwidth constraints
- Co-design of dynamic scheduling and quantized control for networked control systems
- Optimal fault detection design via iterative estimation methods for industrial control systems
- Kalman Filter for Discrete-Time Stochastic Linear Systems Subject to Intermittent Unknown Inputs
- Title not available (Why is that?)
- Fault diagnosis in a networked control system under communication constraints: a quadrotor application
Cited In (5)
- \(H_\infty\) filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks
- Data-driven attacks and data recovery with noise on state estimation of smart grid
- Detection of replay attacks in cyber-physical systems using a frequency-based signature
- Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks
- Input reconstruction for networked control systems subject to deception attacks and data losses on control signals
This page was built for publication: Medium access scheduling for input reconstruction under deception attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2012091)