Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
From MaRDI portal
Publication:2409156
DOI10.1016/j.automatica.2017.04.047zbMath1372.93179arXiv1704.00748OpenAlexW2613841561MaRDI QIDQ2409156
Vijay Gupta, Fabio Pasqualetti, Cheng-Zong Bai
Publication date: 11 October 2017
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1704.00748
Communication networks in operations research (90B18) Stochastic systems in control theory (general) (93E03) Computer system organization (68M99)
Related Items (38)
Worst-case stealthy innovation-based linear attack on remote state estimation ⋮ Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ Event-triggered control for stochastic networked control systems against denial-of-service attacks ⋮ Security index based on perfectly undetectable attacks: graph-theoretic conditions ⋮ A zonotopic characterization of cyber‐physical system vulnerabilities ⋮ Stabilization of random nonlinear systems subject to deception attacks ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ False data injection attacks on sensors against state estimation in cyber-physical systems ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Consensus-based filtering under false data injection attacks ⋮ Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ Stealthy switching attacks on sensors against state estimation in cyber‐physical systems ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ Distributed robust‐multivariate‐observer‐based FDI attacks estimation for nonlinear multi‐agent systems with directed graphs ⋮ Byzantine-resilient distributed observers for LTI systems ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Performance degradation of stealthy attacks against sensor measurements in vector systems ⋮ SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information ⋮ Distributed filtering under false data injection attacks ⋮ Securing state reconstruction under sensor and actuator attacks: theory and design ⋮ Stochastic coding detection scheme in cyber-physical systems against replay attack ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Attack and estimator design for multi-sensor systems with undetectable adversary ⋮ Secure trajectory planning against undetectable spoofing attacks ⋮ Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Optimal sensor attacks in cyber-physical systems with round-robin protocol ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Security analysis and fault detection against stealthy replay attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme ⋮ Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Controlled and conditioned invariant subspaces in linear system theory
- Game theory meets network security and privacy
- Differential Game-Theoretic Approach to a Spatial Jamming Problem
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Network Information Theory
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Attack Detection and Identification in Cyber-Physical Systems
- Optimal Linear Cyber-Attack on Remote State Estimation
- Elements of Information Theory
This page was built for publication: Data-injection attacks in stochastic control systems: detectability and performance tradeoffs