Optimal Denial-of-Service Attack Scheduling With Energy Constraint
From MaRDI portal
Publication:2982520
DOI10.1109/TAC.2015.2409905zbMath1360.68302WikidataQ56918379 ScholiaQ56918379MaRDI QIDQ2982520
Ling Shi, Peng Cheng, Heng Zhang, Ji-Ming Chen
Publication date: 16 May 2017
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Applications of mathematical programming (90C90) Deterministic scheduling theory in operations research (90B35) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20)
Related Items
False data injection attack on consensus‐based distributed estimation ⋮ Finite-time distributed resilient state estimation subject to hybrid cyber-attacks: a new dynamic event-triggered case ⋮ Multiple feature vectors based fault classification for WSN integrated bearing of rolling mill ⋮ Design a robust quantitative feedback theory controller for cyber-physical systems: ship course control problem ⋮ Worst-case stealthy innovation-based linear attack on remote state estimation ⋮ Networked control of nonlinear systems under denial-of-service ⋮ Rollout approach to sensor scheduling for remote state estimation under integrity attack ⋮ Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks ⋮ Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks ⋮ Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ Defensive deception against reactive jamming attacks in remote state estimation ⋮ Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems ⋮ Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol ⋮ Resilient decentralized sampled-data \(H_\infty\) filter design for linear interconnected systems subject to denial-of-service attacks ⋮ Networked control systems under denial-of-service: co-located vs. remote architectures ⋮ A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks ⋮ Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacks ⋮ Robust \(H_\infty\) filtering for semi-Markov jump systems encountering denial-of-service jamming attacks ⋮ Bumpless transfer distributed adaptive backstepping control of nonlinear multi-agent systems with circular filtering under DoS attacks ⋮ Optimal power control for sensors and DoS attackers over a fading channel network ⋮ Load frequency predictive control for power systems concerning wind turbine and communication delay ⋮ Periodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systems ⋮ Energy efficient management for distributed state estimation under DoS attacks ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids ⋮ Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks ⋮ Optimal filter design for cyber‐physical systems under stealthy hybrid attacks ⋮ Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Dynamic event‐triggered approach for networked control systems under denial of service attacks ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Event-triggered control for second-order multi-agent systems under denial-of-service attacks and white noises ⋮ Active control strategy for switched systems against asynchronous DoS attacks ⋮ Observer-based guaranteed cost control of cyber-physical systems under DoS jamming attacks ⋮ Probability-guaranteed state estimation for nonlinear delayed systems under mixed attacks ⋮ Whittle's index based sensor scheduling for multiprocess systems under DoS attacks ⋮ Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries ⋮ Identification of FIR systems with binary-valued observations against denial-of-service attacks ⋮ Optimal sensor scheduling for state estimation under limited channel resources ⋮ Event-triggered ℒ 2 − ℒ ∞ control for discrete-time Markov jump systems with DoS attacks and exogenous disturbance ⋮ Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power ⋮ Optimal completely stealthy attacks against remote estimation in cyber-physical systems ⋮ Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks ⋮ Network steganography based security framework for cyber-physical systems ⋮ Optimal denial-of-service attack energy management against state estimation over an SINR-based network ⋮ Observer-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacks ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Data-driven attacks and data recovery with noise on state estimation of smart grid ⋮ Distributed filtering under false data injection attacks ⋮ Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service ⋮ Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution ⋮ Secure remote state estimation against linear man-in-the-middle attacks using watermarking ⋮ Stochastic coding detection scheme in cyber-physical systems against replay attack ⋮ Optimal stealthy false data injection attacks in cyber-physical systems ⋮ Towards quantifying the impact of randomly occurred attacks on a class of networked control systems ⋮ Security-based resilient event-triggered control of networked control systems under denial of service attacks ⋮ ISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of service ⋮ Attack and estimator design for multi-sensor systems with undetectable adversary ⋮ Optimal jamming attack schedule for remote state estimation with two sensors ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Resilient observer-based control for cyber-physical systems under denial-of-service attacks ⋮ Secure state estimation for systems under mixed cyber-attacks: security and performance analysis ⋮ Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: a zonotopic approach ⋮ Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ The vulnerability of distributed state estimator under stealthy attacks ⋮ Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation ⋮ An adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacks ⋮ Optimal switching integrity attacks on sensors in Industrial control systems ⋮ A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks ⋮ Optimal linear attack for multi-sensor network against state estimation ⋮ Sensor scheduling design for complex networks under a distributed state estimation framework ⋮ Security analysis and fault detection against stealthy replay attacks ⋮ Secure state estimation for event-triggered cyber-physical systems against deception attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme ⋮ Non-fragile distributed state estimation over sensor networks subject to DoS attacks: the almost sure stability ⋮ Fusion estimation in clustering sensor networks under stochastic deception attacks ⋮ Remote observer-based robust control for cyber-physical systems under asynchronous DoS attacks: an intelligent approach