On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds

From MaRDI portal
Publication:4567028

DOI10.1109/TAC.2017.2714903zbMath1390.93776OpenAlexW2627024038MaRDI QIDQ4567028

Cheng-Zong Bai, Fabio Pasqualetti, Vijay Gupta

Publication date: 27 June 2018

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2017.2714903



Related Items

Worst-case stealthy innovation-based linear attack on remote state estimation, Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach, Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint, Security of networked control systems subject to deception attacks: a survey, Optimal stealthy attack with historical data on cyber-physical systems, Optimal deception attacks on remote state estimators equipped with interval anomaly detectors, Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems, Stability analysis of token-based wireless networked control systems under deception attacks, Deception attacks on event-triggered distributed consensus estimation for nonlinear systems, Design of false data injection attacks in cyber-physical systems, A class of stealthy attacks on remote state estimation with intermittent observation, Network steganography based security framework for cyber-physical systems, False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach, Optimal \(\epsilon\)-stealthy attack in cyber-physical systems, Performance degradation of stealthy attacks against sensor measurements in vector systems, Securing state reconstruction under sensor and actuator attacks: theory and design, Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data, Attack and estimator design for multi-sensor systems with undetectable adversary, Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems, A secure strategy for a cyber physical system with multi-sensor under linear deception attack, Optimal deception attacks against remote state estimation in cyber-physical systems, Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation, How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks, Fusion estimation in clustering sensor networks under stochastic deception attacks