A secure control framework for resource-limited adversaries

From MaRDI portal
Publication:2342524

DOI10.1016/j.automatica.2014.10.067zbMath1309.93020arXiv1212.0226OpenAlexW1972523481WikidataQ60431883 ScholiaQ60431883MaRDI QIDQ2342524

Iman Shames, Henrik Sandberg, Karl Henrik Johansson, André M. H. Teixeira

Publication date: 28 April 2015

Published in: Automatica (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1212.0226



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (only showing first 100 items - show all)

Active resilient control for two‐dimensional systems under denial‐of‐service attacksOptimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systemsEvent-triggered resilient control for cyber-physical systems under periodic DoS jamming attacksSecure consensus of multiagent systems with DoS attacks via a graph-based approachFalse data injection attacks on sensors against state estimation in cyber-physical systemsResilient control co-design for cyber-physical systems with DoS attacks via a successive convex optimization approachOptimal stealthy attack with historical data on cyber-physical systemsQuantized control for networked switched systems under denial-of-service attacks via a barrier event-triggered mechanismSignaling games in multiple dimensions: geometric properties of equilibrium solutionsStability of networked switched systems in the presence of denial‐of‐service attacksOptimal resilient sensor placement problem for secure state estimationDistributed multi-rate sampled-data \(H_\infty\) consensus filtering for cyber-physical systems under denial-of-service attacksCyber-physical systems subject to false data injections: a model predictive control framework for resilience operationsA dynamic encryption-decryption scheme for replay attack detection in cyber-physical systemsProactive attack detection scheme based on watermarking and moving target defensePerformance based attack detection and security analysis for cyber‐physical systemsOptimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channelsTampering attack detection for remote interval observerEvent-triggered ℒ 2  − ℒ control for discrete-time Markov jump systems with DoS attacks and exogenous disturbanceSecure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observerResilient control for networked control systems with dynamic quantization and DoS attacksByzantine-resilient distributed observers for LTI systemsAttack-resilient state estimation with intermittent data authenticationStabilization of networked singular control systems under double-channel quantization and DoS attacksDetecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approachResilient quantized control under denial-of-service: variable bit rate quantizationBackstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurementsAdaptive finite-time control for cyber-physical systems with injection and deception attacksSliding mode-based adaptive resilient control for Markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacksApplication of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systemsResilient reinforcement learning and robust output regulation under denial-of-service attacksDistributed Kalman filter in a network of linear systemsSecure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approachData-dependent analysis of model validation errors for linear system identificationGeometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics AttacksSecurity weakness of dynamic watermarking-based detection for generalised replay attacksPeriodic event-triggered resilient control for cyber-physical systems under denial-of-service attacksAn optimal graph-search method for secure state estimationOn the confidentiality of controller states under sensor attacksNeutralizing zero dynamics attack on sampled-data systems via generalized holdsOptimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systemsEvent-triggered control for stochastic networked control systems against denial-of-service attacksResiliency in dynamic leader-follower multiagent systemsDistributed control under compromised measurements: resilient estimation, attack detection, and vehicle platooningResilient control under denial-of-service: robust designResilient decentralized sampled-data \(H_\infty\) filter design for linear interconnected systems subject to denial-of-service attacksNetworked control systems under denial-of-service: co-located vs. remote architecturesA robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacksDistributed set-membership filtering for time-varying systems under constrained measurements and replay attacksCooperative adaptive fault-tolerant control for multi-agent systems with deception attacksDesign of sampled-data controllers for the synchronization of complex dynamical networks under controller attacksA zonotopic characterization of cyber‐physical system vulnerabilitiesPeriodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systemsStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachEnergy efficient management for distributed state estimation under DoS attacksVulnerability analysis of distributed state estimation under joint deception attacksSparse attack reconstruction for cyber-physical systems via descriptor reduced-order observerEnhanced distributed state estimation with resilience to multiple disturbances and false data injection attacksEvent‐based secure leader‐following consensus for cyber‐physical systems under denial‐of‐service attacksHybrid event-based asynchronous finite-time control for cyber-physical switched systems under denial-of-service attacksActive control strategy for switched systems against asynchronous DoS attacksFinite time attack detection and supervised secure state estimation for CPSs with malicious adversariesDistributed consensus control for multi-agent systems under denial-of-serviceZeros of networked systems with time-invariant interconnectionsAdaptive dynamic programming for security of networked control systems with actuator saturationEvent-triggered resilient control for cyber-physical systems under asynchronous DoS attacksSecure Diagnosability of Hybrid Dynamical SystemsAn encoding mechanism for secrecy of remote state estimationFalse data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approachDual-terminal event triggered control for cyber-physical systems under false data injection attacksEvent-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacksAn adaptive learning and control architecture for mitigating sensor and actuator attacks in connected autonomous vehicle platoonsRobust fault tolerant explicit model predictive controlSecure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacksDetection and mitigation of biasing attacks on distributed estimation networksA secure control mechanism for network environmentsA novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) indexA unified modeling of muti-sources cyber-attacks with uncertainties for CPS security controlOptimal \(\epsilon\)-stealthy attack in cyber-physical systemsSecurity via multirate control in cyber-physical systemsA co-design methodology for cyber-physical systems under actuator fault and cyber attackLinear system security -- detection and correction of adversarial sensor attacks in the noise-free caseDistributed filtering under false data injection attacksDetection of replay attacks in cyber-physical systems using a frequency-based signatureAdaptive tuning of network traffic policing mechanisms for DDoS attack mitigation systemsFault-tolerant control in presence of disturbances based on fault estimationSecure and privacy preserving consensus for second-order systems based on Paillier encryptionState estimation under false data injection attacks: security analysis and system protectionResilient decentralized adaptive tracking control for nonlinear interconnected systems with unknown control directions against DoS attacksStochastic coding detection scheme in cyber-physical systems against replay attackTowards quantifying the impact of randomly occurred attacks on a class of networked control systemsOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataSecurity-based resilient event-triggered control of networked control systems under denial of service attacksA Stealth Integrity Targeted Cyber‐Attack in Distributed Electric Power Networks with Local Model InformationObserver-based distributed fault detection and isolation for second-order multi-agent systems using relative informationSecurity control for networked control systems with randomly occurring integrity check protection subject to randomly occurring zero-value attacksDistributed Krein space-based attack detection over sensor networks under deception attacksSwitching resilient control scheme for cyber-physical systems against DoS attacksResilient state estimation for control systems using multiple observers and median operationA data-driven covert attack strategy in the closed-loop cyber-physical systems



Cites Work


This page was built for publication: A secure control framework for resource-limited adversaries