Malicious adversaries against secure state estimation: Sparse sensor attack design
From MaRDI portal
Publication:2063792
DOI10.1016/j.automatica.2021.110037zbMath1480.93172OpenAlexW3216772099MaRDI QIDQ2063792
Publication date: 3 January 2022
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.110037
cyber-physical systemssecure state estimationsparse sensor attacksundetectable attacksunidentifiable attacks
Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Related Items
Cites Work
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks
- Linear system security -- detection and correction of adversarial sensor attacks in the noise-free case
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Secure trajectory planning against undetectable spoofing attacks
- An adaptive extraction of generalized eigensubspace by using exact nested orthogonal complement structure
- Partial state observers for linear systems with unknown inputs
- Event-Triggered State Observers for Sparse Sensor Noise/Attacks
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information
- Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Adaptive Reliable Coordination Control for Linear Agent Networks With Intermittent Communication Constraints
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
- Malicious Attacks on State Estimation Against Distributed Control Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Attack Detection and Identification in Cyber-Physical Systems
- Optimal Linear Cyber-Attack on Remote State Estimation
- Attack-Resilient State Estimation for Noisy Dynamical Systems
- Minimum Sparsity of Unobservable Power Network Attacks
- Cyber Physical Attacks with Control Objectives