False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
From MaRDI portal
Publication:2203055
DOI10.1016/j.automatica.2020.109117zbMath1448.93125OpenAlexW3039187353MaRDI QIDQ2203055
Publication date: 1 October 2020
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2020.109117
Control/observation systems involving computers (process control, etc.) (93C83) Computer security (68M25) Networked control (93B70)
Related Items (52)
Neuroadaptive deferred full-state constraints control without feasibility conditions for uncertain nonlinear EASSs ⋮ Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach ⋮ Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks ⋮ Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems ⋮ Resilience to denial-of-service and integrity attacks: a structured systems approach ⋮ Sampled-data distributed state estimation with multiple transmission channels under denial-of-service attacks ⋮ Static output feedback secure control for cyber‐physical systems based on multisensor scheme against replay attacks ⋮ Man-in-the-middle attack against cyber-physical systems under random access protocol ⋮ Hidden Markov model‐based control for networked fuzzy Markov jump systems against randomly occurring multichannel attacks ⋮ Data‐driven resilient platooning control for vehicular platooning systems with denial‐of‐service attacks ⋮ Distributed resilient fusion estimation for resource-limited CPSs under hybrid attacks ⋮ Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks ⋮ Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Observer‐based event‐triggered secure synchronization control for multi‐agent systems under false data injection attacks ⋮ Static output-feedback control for cyber-physical LPV systems under DoS attacks ⋮ Resilient leader tracking for networked Lagrangian systems under DoS attacks ⋮ Dynamic event-triggered distributed filtering design for interval type-2 fuzzy systems over sensor networks under deception attacks ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Resilient control co-design for cyber-physical systems with DoS attacks via a successive convex optimization approach ⋮ Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Distributed secure consensus control of nonlinear multi-agent systems under sensor and actuator attacks ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach ⋮ Secure synchronization against link attacks in complex networks with event-triggered coupling ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Distributed multi-rate sampled-data \(H_\infty\) consensus filtering for cyber-physical systems under denial-of-service attacks ⋮ Robust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode method ⋮ Stealthy switching attacks on sensors against state estimation in cyber‐physical systems ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ A defense strategy for false data injection attacks in multi-agent systems ⋮ Finite time secure state estimation for linear cyber‐physical systems with actuator and sensor attacks ⋮ Design of false data injection attacks in cyber-physical systems ⋮ Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism ⋮ Distributed robust‐multivariate‐observer‐based FDI attacks estimation for nonlinear multi‐agent systems with directed graphs ⋮ Spatial‐temporal security stability analysis and regulation against different types of attacks on industrial control systems ⋮ Multi-channel transmission scheduling with hopping scheme under uncertain channel states ⋮ Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks ⋮ Model free optimal control of unknown nonaffine nonlinear systems with input quantization and DoS attack ⋮ Learning hidden Markov models for linear Gaussian systems with applications to event-based state estimation ⋮ Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems ⋮ Switching resilient control scheme for cyber-physical systems against DoS attacks ⋮ Resilient strategy design for cyber-physical system under active eavesdropping attack ⋮ Observer-based defense control for networked Takagi-Sugeno fuzzy systems against asynchronous DoS attacks ⋮ Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks ⋮ Fault-tolerant control for model-free networked control systems under DoS attacks ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ Distributed filtering for nonlinear systems under false data injection attack ⋮ Online routing for smart electricity network under hybrid uncertainty ⋮ Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization ⋮ A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
Cites Work
- Unnamed Item
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Distributed filtering under false data injection attacks
- Security of interdependent and identical networked control systems
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Sensor selection strategies for state estimation in energy constrained wireless sensor networks
- A secure control framework for resource-limited adversaries
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Accurate clock synchronization in wireless sensor networks with bounded noise
- Resilient control under denial-of-service: robust design
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism
- Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
This page was built for publication: False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach