Optimal Attack Energy Allocation against Remote State Estimation
From MaRDI portal
Publication:4682266
DOI10.1109/TAC.2017.2775344zbMath1423.93386OpenAlexW2770337865MaRDI QIDQ4682266
Lianghong Peng, Ling Shi, Xianghui Cao, Chang-Yin Sun
Publication date: 18 September 2018
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tac.2017.2775344
Filtering in stochastic control theory (93E11) Estimation and detection in stochastic control theory (93E10)
Related Items (19)
Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems ⋮ Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks ⋮ Optimal filter design for cyber‐physical systems under stealthy hybrid attacks ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal sensor scheduling for state estimation under limited channel resources ⋮ Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power ⋮ A dynamic event-triggered approach to observer-based PID security control subject to deception attacks ⋮ Optimal denial-of-service attack energy management against state estimation over an SINR-based network ⋮ Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Secure remote state estimation against linear man-in-the-middle attacks using watermarking ⋮ Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels ⋮ Optimal jamming attack schedule for remote state estimation with two sensors ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation ⋮ System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy ⋮ Optimal linear attack for multi-sensor network against state estimation ⋮ Scaled consensus for multiagent systems under denial-of-service attacks and exogenous disturbance
This page was built for publication: Optimal Attack Energy Allocation against Remote State Estimation