Security analysis and defense strategy of distributed filtering under false data injection attacks
From MaRDI portal
Publication:2123223
DOI10.1016/j.automatica.2021.110151zbMath1485.93601OpenAlexW4206920925WikidataQ113442951 ScholiaQ113442951MaRDI QIDQ2123223
Wen Yang, Wei Xing Zheng, Jiayu Zhou, Yang Tang, Heng Zhang, Yong Xu
Publication date: 8 April 2022
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.110151
Filtering in stochastic control theory (93E11) Fault detection; testing in circuits and networks (94C12) Networked control (93B70)
Related Items (7)
Event-triggered adaptive sliding mode control of cyber-physical systems under false data injection attack ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises ⋮ Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method ⋮ Deception attacks on event-triggered distributed consensus estimation for nonlinear systems ⋮ Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism ⋮ Reduced-order filtering for semi-Markovian jump systems against randomly occurring false data injection attacks
Cites Work
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Distributed filtering under false data injection attacks
- Distributed secure state estimation for cyber-physical systems under sensor attacks
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Stochastic link activation for distributed filtering under sensor power constraint
- Consensus based overlapping decentralized estimation with missing observations and communication faults
- Stochastic Event-Triggered Sensor Schedule for Remote State Estimation
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Reset Moving Horizon Estimation for Quantized Discrete Time Systems
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
- Malicious Attacks on State Estimation Against Distributed Control Systems
- Resilient Distributed Estimation: Sensor Attacks
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Optimal Linear Cyber-Attack on Remote State Estimation
- An Event-Based Stealthy Attack on Remote State Estimation
This page was built for publication: Security analysis and defense strategy of distributed filtering under false data injection attacks