Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach

From MaRDI portal
Publication:2982577

DOI10.1109/TAC.2015.2461851zbMath1360.93674OpenAlexW1651728063MaRDI QIDQ2982577

Ling Shi, Peng Cheng, Daniel E. Quevedo, Yuzhe Li, Ji-Ming Chen

Publication date: 16 May 2017

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2015.2461851



Related Items

False data injection attack on consensus‐based distributed estimation, Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption, Worst-case stealthy innovation-based linear attack on remote state estimation, On the analysis of open-loop Nash equilibria admitting a feedback synthesis in nonlinear differential games, Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis, Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks, Defensive deception against reactive jamming attacks in remote state estimation, Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol, The Effect of Time-Varying Jamming Interference on Networked Stabilization, Secure control for cyber-physical systems with positive constraint under DoS attack, An event‐triggered approach to security control for networked systems using hybrid attack model, Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach, Energy efficient management for distributed state estimation under DoS attacks, Optimal filter design for cyber‐physical systems under stealthy hybrid attacks, Observer-based guaranteed cost control of cyber-physical systems under DoS jamming attacks, Event‐triggered security control for fuzzy‐model‐based cyber‐physical systems under Denial‐of‐Service attacks and actuator faults, Binary observation‐based FIR system identification under sequence denial of service attacks, Whittle's index based sensor scheduling for multiprocess systems under DoS attacks, Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework, Secure networked control under jamming attacks: an SINR-based approach, Differential privacy for symbolic systems with application to Markov chains, Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks, A data‐based event‐triggered control for switching topology nonlinear multiagent systems with DoS attacks, Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power, Data‐driven bipartite leader‐following consensus control for nonlinear multi‐agent systems under hybrid attacks, Filtering for systems subject to unknown inputs without a priori initial information, A dynamic event-triggered approach to observer-based PID security control subject to deception attacks, Optimal denial-of-service attack energy management against state estimation over an SINR-based network, Switched Stackelberg game analysis of false data injection attacks on networked control systems, Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework, Event-triggered resilient control for cyber-physical system under denial-of-service attacks, Timely detection and mitigation of IoT-based cyberattacks in the smart grid, SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information, Multi-sensor Kalman filtering over packet-dropping networks subject to round-robin protocol scheduling, Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution, Stackelberg game for secure estimation of linear systems subject to unknown input and smart jamming, A multi-channel transmission schedule for remote state estimation under DoS attacks, Secure remote state estimation against linear man-in-the-middle attacks using watermarking, Towards quantifying the impact of randomly occurred attacks on a class of networked control systems, Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data, A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control, Distributed formation control with open-loop Nash strategy, Distributed Krein space-based attack detection over sensor networks under deception attacks, Switching resilient control scheme for cyber-physical systems against DoS attacks, Secure analysis of dynamic networks under pinning attacks against synchronization, Dynamic games in cyber-physical security: an overview, Observer-based synchronization control for complex networks against asynchronous attacks, Secure state estimation for systems under mixed cyber-attacks: security and performance analysis, Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks, Optimal sensor attacks in cyber-physical systems with round-robin protocol, The vulnerability of distributed state estimator under stealthy attacks, Kalman filtering under unknown inputs and norm constraints, Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation, Optimal linear attack for multi-sensor network against state estimation, Sensor scheduling design for complex networks under a distributed state estimation framework, Security analysis and fault detection against stealthy replay attacks, Distributed secure estimation for cyber-physical systems with fading measurements and false data injection attacks