Optimal Denial-of-Service Attack Scheduling With Energy Constraint

From MaRDI portal
Publication:2982520

DOI10.1109/TAC.2015.2409905zbMath1360.68302WikidataQ56918379 ScholiaQ56918379MaRDI QIDQ2982520

Ling Shi, Peng Cheng, Heng Zhang, Ji-Ming Chen

Publication date: 16 May 2017

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)




Related Items

False data injection attack on consensus‐based distributed estimationFinite-time distributed resilient state estimation subject to hybrid cyber-attacks: a new dynamic event-triggered caseMultiple feature vectors based fault classification for WSN integrated bearing of rolling millDesign a robust quantitative feedback theory controller for cyber-physical systems: ship course control problemWorst-case stealthy innovation-based linear attack on remote state estimationNetworked control of nonlinear systems under denial-of-serviceRollout approach to sensor scheduling for remote state estimation under integrity attackPeriodic event-triggered resilient control for cyber-physical systems under denial-of-service attacksLeaderless consensus control of uncertain multi-agents systems with sensor and actuator attacksWorst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systemsDefensive deception against reactive jamming attacks in remote state estimationOptimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systemsOptimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocolResilient decentralized sampled-data \(H_\infty\) filter design for linear interconnected systems subject to denial-of-service attacksNetworked control systems under denial-of-service: co-located vs. remote architecturesA robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacksDesign of sampled-data controllers for the synchronization of complex dynamical networks under controller attacksRobust \(H_\infty\) filtering for semi-Markov jump systems encountering denial-of-service jamming attacksBumpless transfer distributed adaptive backstepping control of nonlinear multi-agent systems with circular filtering under DoS attacksOptimal power control for sensors and DoS attackers over a fading channel networkLoad frequency predictive control for power systems concerning wind turbine and communication delayPeriodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systemsEnergy efficient management for distributed state estimation under DoS attacksVulnerability analysis of distributed state estimation under joint deception attacksDesign and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgridsEnhanced distributed state estimation with resilience to multiple disturbances and false data injection attacksOptimal filter design for cyber‐physical systems under stealthy hybrid attacksOptimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systemsOptimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraintDynamic event‐triggered approach for networked control systems under denial of service attacksSecurity of networked control systems subject to deception attacks: a surveyEvent-triggered control for second-order multi-agent systems under denial-of-service attacks and white noisesActive control strategy for switched systems against asynchronous DoS attacksObserver-based guaranteed cost control of cyber-physical systems under DoS jamming attacksProbability-guaranteed state estimation for nonlinear delayed systems under mixed attacksWhittle's index based sensor scheduling for multiprocess systems under DoS attacksFinite time attack detection and supervised secure state estimation for CPSs with malicious adversariesIdentification of FIR systems with binary-valued observations against denial-of-service attacksOptimal sensor scheduling for state estimation under limited channel resourcesEvent-triggered ℒ 2  − ℒ control for discrete-time Markov jump systems with DoS attacks and exogenous disturbanceOptimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference powerOptimal completely stealthy attacks against remote estimation in cyber-physical systemsEvent-triggered resilient control for cyber-physical systems under asynchronous DoS attacksNetwork steganography based security framework for cyber-physical systemsOptimal denial-of-service attack energy management against state estimation over an SINR-based networkObserver-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacksA novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) indexData-driven attacks and data recovery with noise on state estimation of smart gridDistributed filtering under false data injection attacksRobust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of serviceAttack allocation on remote state estimation in multi-systems: structural results and asymptotic solutionSecure remote state estimation against linear man-in-the-middle attacks using watermarkingStochastic coding detection scheme in cyber-physical systems against replay attackOptimal stealthy false data injection attacks in cyber-physical systemsTowards quantifying the impact of randomly occurred attacks on a class of networked control systemsSecurity-based resilient event-triggered control of networked control systems under denial of service attacksISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of serviceAttack and estimator design for multi-sensor systems with undetectable adversaryOptimal jamming attack schedule for remote state estimation with two sensorsOptimal deception attacks against remote state estimation in cyber-physical systemsResilient observer-based control for cyber-physical systems under denial-of-service attacksSecure state estimation for systems under mixed cyber-attacks: security and performance analysisDistributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: a zonotopic approachAdaptive fault estimation for cyber-physical systems with intermittent DoS attacksSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationHow vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacksThe vulnerability of distributed state estimator under stealthy attacksTransmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimationAn adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacksOptimal switching integrity attacks on sensors in Industrial control systemsA game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacksOptimal linear attack for multi-sensor network against state estimationSensor scheduling design for complex networks under a distributed state estimation frameworkSecurity analysis and fault detection against stealthy replay attacksSecure state estimation for event-triggered cyber-physical systems against deception attacksDetection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding schemeNon-fragile distributed state estimation over sensor networks subject to DoS attacks: the almost sure stabilityFusion estimation in clustering sensor networks under stochastic deception attacksRemote observer-based robust control for cyber-physical systems under asynchronous DoS attacks: an intelligent approach