Secure trajectory planning against undetectable spoofing attacks
From MaRDI portal
Publication:2288665
DOI10.1016/j.automatica.2019.108655zbMath1430.93147arXiv1902.10869OpenAlexW2982793363WikidataQ126841907 ScholiaQ126841907MaRDI QIDQ2288665
Fabio Pasqualetti, Gianluca Bianchin, Yin-Chen Liu
Publication date: 20 January 2020
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1902.10869
nonlinear systemscyber-physical securityundetectable attackssecure trajectory planningspoofing attacks
Nonlinear systems in control theory (93C10) Automated systems (robots, etc.) in control theory (93C85)
Related Items (5)
Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol ⋮ Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach ⋮ Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems ⋮ Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Numerical computation of optimal control problems with unknown final time
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Energy based control of the Pendubot
- Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors
- Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems
- A Survey of the Maximum Principles for Optimal Control Problems with State Constraints
- Attack Detection and Identification in Cyber-Physical Systems
- Planning Algorithms
This page was built for publication: Secure trajectory planning against undetectable spoofing attacks