Optimal Linear Cyber-Attack on Remote State Estimation

From MaRDI portal
Publication:5358515

DOI10.1109/TCNS.2016.2570003zbMath1370.94137OpenAlexW2402911760WikidataQ60431874 ScholiaQ60431874MaRDI QIDQ5358515

Ziyang Guo, Dawei Shi, Ling Shi, Karl Henrik Johansson

Publication date: 21 September 2017

Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tcns.2016.2570003




Related Items (76)

Security analysis and defense strategy of distributed filtering under false data injection attacksOptimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systemsAdaptive event-triggered resilient control of industrial cyber physical systems under asynchronous data injection attackBackstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurementsWorst-case stealthy innovation-based linear attack on remote state estimationConsistent distributed state estimation with global observability over sensor networkSecurity weakness of dynamic watermarking-based detection for generalised replay attacksStochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysisWorst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systemsEncryption scheduling for remote state estimation under an operation constraintData-injection attacks in stochastic control systems: detectability and performance tradeoffsOptimal acknowledgment signal attacks against remote estimationMan-in-the-middle attack against cyber-physical systems under random access protocolDistributed resilient fusion estimation for resource-limited CPSs under hybrid attacksDynamic event-triggered \(\mathcal{L}_\infty\) control for networked control systems under deception attacks: a switching methodEnhanced distributed state estimation with resilience to multiple disturbances and false data injection attacksOptimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraintSecurity of networked control systems subject to deception attacks: a surveyFalse data injection attacks on sensors against state estimation in cyber-physical systemsOptimal stealthy attack with historical data on cyber-physical systemsOptimal deception attacks on remote state estimators equipped with interval anomaly detectorsOn consistency and stability of distributed Kalman filter under mismatched noise covariance and uncertain dynamicsConsensus-based filtering under false data injection attacksSecurity control of integral sliding modes for multi-agent systems under false data injection attacksOptimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approachWhittle's index based sensor scheduling for multiprocess systems under DoS attacksAdaptive fuzzy output feedback control for a class of uncertain nonlinear systems in the presence of sensor attacksPerformance analysis for cyber-physical systems under two types of stealthy deception attacksComplete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systemsInnovation-based stealthy attack against distributed state estimation over sensor networksDeep reinforcement learning control approach to mitigating actuator attacksProactive attack detection scheme based on watermarking and moving target defenseIntegrity attacks on remote estimation with spatial-temporal information sourcesStability analysis of token-based wireless networked control systems under deception attacksOptimal sensor scheduling for state estimation under limited channel resourcesOptimal attack strategy against fault detectors for linear cyber-physical systemsStealthy switching attacks on sensors against state estimation in cyber‐physical systemsOptimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channelsTampering attack detection for remote interval observerA defense strategy for false data injection attacks in multi-agent systemsDesign of false data injection attacks in cyber-physical systemsA class of stealthy attacks on remote state estimation with intermittent observationCentralized approximate optimal estimation for cyber‐physical systems under joint cyber‐attacksOptimal completely stealthy attacks against remote estimation in cyber-physical systemsNetwork steganography based security framework for cyber-physical systemsOptimal \(\epsilon\)-stealthy attack in cyber-physical systemsDistributed filtering under false data injection attacksState estimation under false data injection attacks: security analysis and system protectionAttack allocation on remote state estimation in multi-systems: structural results and asymptotic solutionResilient decentralized adaptive tracking control for nonlinear interconnected systems with unknown control directions against DoS attacksSecure remote state estimation against linear man-in-the-middle attacks using watermarkingOptimal stealthy false data injection attacks in cyber-physical systemsTowards quantifying the impact of randomly occurred attacks on a class of networked control systemsOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataPermutation entropy based detection scheme of replay attacks in industrial cyber-physical systemsAttack and estimator design for multi-sensor systems with undetectable adversaryOptimal DoS attack scheduling for multi-sensor remote state estimation over interference channelsResilient strategy design for cyber-physical system under active eavesdropping attackA secure strategy for a cyber physical system with multi-sensor under linear deception attackEvent-trigger-based adaptive output feedback approximately optimal tracking control of a class of MIMO non-affine nonlinear systemsOptimal deception attacks against remote state estimation in cyber-physical systemsDetection against randomly occurring complex attacks on distributed state estimationOptimal sensor attacks in cyber-physical systems with round-robin protocolProbabilistic-constrained tracking control for stochastic time-varying systems under deception attacks: a round-robin protocolSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationMalicious adversaries against secure state estimation: Sparse sensor attack designHow vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacksReduced-order filtering for networks with Markovian jumping parameters and missing measurementsImproved adaptive resilient control against sensor and actuator attacksData-driven modeling of the temporal evolution of breakers' states in the French electrical transmission gridA game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacksOptimal linear attack for multi-sensor network against state estimationObserver-based backstepping control for nonlinear cyber-physical systems with incomplete measurementsGuaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacksDetection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding schemeFusion estimation in clustering sensor networks under stochastic deception attacks




This page was built for publication: Optimal Linear Cyber-Attack on Remote State Estimation