Optimal Attack Energy Allocation against Remote State Estimation

From MaRDI portal
Publication:4682266

DOI10.1109/TAC.2017.2775344zbMath1423.93386OpenAlexW2770337865MaRDI QIDQ4682266

Lianghong Peng, Ling Shi, Xianghui Cao, Chang-Yin Sun

Publication date: 18 September 2018

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2017.2775344




Related Items (19)

Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systemsDistributed set-membership filtering for time-varying systems under constrained measurements and replay attacksOptimal filter design for cyber‐physical systems under stealthy hybrid attacksOptimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraintSecurity of networked control systems subject to deception attacks: a surveyOptimal sensor scheduling for state estimation under limited channel resourcesOptimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference powerA dynamic event-triggered approach to observer-based PID security control subject to deception attacksOptimal denial-of-service attack energy management against state estimation over an SINR-based networkAttack detection and secure state estimation for cyber-physical systems with finite-frequency observersOptimal \(\epsilon\)-stealthy attack in cyber-physical systemsSecure remote state estimation against linear man-in-the-middle attacks using watermarkingOptimal DoS attack scheduling for multi-sensor remote state estimation over interference channelsOptimal jamming attack schedule for remote state estimation with two sensorsSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationTransmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimationSystem identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategyOptimal linear attack for multi-sensor network against state estimationScaled consensus for multiagent systems under denial-of-service attacks and exogenous disturbance




This page was built for publication: Optimal Attack Energy Allocation against Remote State Estimation