A secure control framework for resource-limited adversaries
From MaRDI portal
Publication:2342524
DOI10.1016/j.automatica.2014.10.067zbMath1309.93020arXiv1212.0226OpenAlexW1972523481WikidataQ60431883 ScholiaQ60431883MaRDI QIDQ2342524
Iman Shames, Henrik Sandberg, Karl Henrik Johansson, André M. H. Teixeira
Publication date: 28 April 2015
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1212.0226
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (only showing first 100 items - show all)
Active resilient control for two‐dimensional systems under denial‐of‐service attacks ⋮ Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems ⋮ Event-triggered resilient control for cyber-physical systems under periodic DoS jamming attacks ⋮ Secure consensus of multiagent systems with DoS attacks via a graph-based approach ⋮ False data injection attacks on sensors against state estimation in cyber-physical systems ⋮ Resilient control co-design for cyber-physical systems with DoS attacks via a successive convex optimization approach ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Quantized control for networked switched systems under denial-of-service attacks via a barrier event-triggered mechanism ⋮ Signaling games in multiple dimensions: geometric properties of equilibrium solutions ⋮ Stability of networked switched systems in the presence of denial‐of‐service attacks ⋮ Optimal resilient sensor placement problem for secure state estimation ⋮ Distributed multi-rate sampled-data \(H_\infty\) consensus filtering for cyber-physical systems under denial-of-service attacks ⋮ Cyber-physical systems subject to false data injections: a model predictive control framework for resilience operations ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ Proactive attack detection scheme based on watermarking and moving target defense ⋮ Performance based attack detection and security analysis for cyber‐physical systems ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ Tampering attack detection for remote interval observer ⋮ Event-triggered ℒ 2 − ℒ ∞ control for discrete-time Markov jump systems with DoS attacks and exogenous disturbance ⋮ Secure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observer ⋮ Resilient control for networked control systems with dynamic quantization and DoS attacks ⋮ Byzantine-resilient distributed observers for LTI systems ⋮ Attack-resilient state estimation with intermittent data authentication ⋮ Stabilization of networked singular control systems under double-channel quantization and DoS attacks ⋮ Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach ⋮ Resilient quantized control under denial-of-service: variable bit rate quantization ⋮ Backstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurements ⋮ Adaptive finite-time control for cyber-physical systems with injection and deception attacks ⋮ Sliding mode-based adaptive resilient control for Markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacks ⋮ Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems ⋮ Resilient reinforcement learning and robust output regulation under denial-of-service attacks ⋮ Distributed Kalman filter in a network of linear systems ⋮ Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach ⋮ Data-dependent analysis of model validation errors for linear system identification ⋮ Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks ⋮ Security weakness of dynamic watermarking-based detection for generalised replay attacks ⋮ Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks ⋮ An optimal graph-search method for secure state estimation ⋮ On the confidentiality of controller states under sensor attacks ⋮ Neutralizing zero dynamics attack on sampled-data systems via generalized holds ⋮ Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems ⋮ Event-triggered control for stochastic networked control systems against denial-of-service attacks ⋮ Resiliency in dynamic leader-follower multiagent systems ⋮ Distributed control under compromised measurements: resilient estimation, attack detection, and vehicle platooning ⋮ Resilient control under denial-of-service: robust design ⋮ Resilient decentralized sampled-data \(H_\infty\) filter design for linear interconnected systems subject to denial-of-service attacks ⋮ Networked control systems under denial-of-service: co-located vs. remote architectures ⋮ A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks ⋮ Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks ⋮ Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks ⋮ Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacks ⋮ A zonotopic characterization of cyber‐physical system vulnerabilities ⋮ Periodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systems ⋮ Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach ⋮ Energy efficient management for distributed state estimation under DoS attacks ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Sparse attack reconstruction for cyber-physical systems via descriptor reduced-order observer ⋮ Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks ⋮ Event‐based secure leader‐following consensus for cyber‐physical systems under denial‐of‐service attacks ⋮ Hybrid event-based asynchronous finite-time control for cyber-physical switched systems under denial-of-service attacks ⋮ Active control strategy for switched systems against asynchronous DoS attacks ⋮ Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries ⋮ Distributed consensus control for multi-agent systems under denial-of-service ⋮ Zeros of networked systems with time-invariant interconnections ⋮ Adaptive dynamic programming for security of networked control systems with actuator saturation ⋮ Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks ⋮ Secure Diagnosability of Hybrid Dynamical Systems ⋮ An encoding mechanism for secrecy of remote state estimation ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Dual-terminal event triggered control for cyber-physical systems under false data injection attacks ⋮ Event-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacks ⋮ An adaptive learning and control architecture for mitigating sensor and actuator attacks in connected autonomous vehicle platoons ⋮ Robust fault tolerant explicit model predictive control ⋮ Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks ⋮ Detection and mitigation of biasing attacks on distributed estimation networks ⋮ A secure control mechanism for network environments ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ A unified modeling of muti-sources cyber-attacks with uncertainties for CPS security control ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Security via multirate control in cyber-physical systems ⋮ A co-design methodology for cyber-physical systems under actuator fault and cyber attack ⋮ Linear system security -- detection and correction of adversarial sensor attacks in the noise-free case ⋮ Distributed filtering under false data injection attacks ⋮ Detection of replay attacks in cyber-physical systems using a frequency-based signature ⋮ Adaptive tuning of network traffic policing mechanisms for DDoS attack mitigation systems ⋮ Fault-tolerant control in presence of disturbances based on fault estimation ⋮ Secure and privacy preserving consensus for second-order systems based on Paillier encryption ⋮ State estimation under false data injection attacks: security analysis and system protection ⋮ Resilient decentralized adaptive tracking control for nonlinear interconnected systems with unknown control directions against DoS attacks ⋮ Stochastic coding detection scheme in cyber-physical systems against replay attack ⋮ Towards quantifying the impact of randomly occurred attacks on a class of networked control systems ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Security-based resilient event-triggered control of networked control systems under denial of service attacks ⋮ A Stealth Integrity Targeted Cyber‐Attack in Distributed Electric Power Networks with Local Model Information ⋮ Observer-based distributed fault detection and isolation for second-order multi-agent systems using relative information ⋮ Security control for networked control systems with randomly occurring integrity check protection subject to randomly occurring zero-value attacks ⋮ Distributed Krein space-based attack detection over sensor networks under deception attacks ⋮ Switching resilient control scheme for cyber-physical systems against DoS attacks ⋮ Resilient state estimation for control systems using multiple observers and median operation ⋮ A data-driven covert attack strategy in the closed-loop cyber-physical systems
Cites Work
- Unnamed Item
- Unnamed Item
- A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
- Nonlinear control systems: An introduction
- Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints
- Stealthy deception attacks on water SCADA systems
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- Linear Matrix Inequalities in System and Control Theory
- To Zero or to Hold Control Inputs With Lossy Links?
- A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems
This page was built for publication: A secure control framework for resource-limited adversaries