Optimal Linear Cyber-Attack on Remote State Estimation
From MaRDI portal
Publication:5358515
DOI10.1109/TCNS.2016.2570003zbMath1370.94137OpenAlexW2402911760WikidataQ60431874 ScholiaQ60431874MaRDI QIDQ5358515
Ziyang Guo, Dawei Shi, Ling Shi, Karl Henrik Johansson
Publication date: 21 September 2017
Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tcns.2016.2570003
Estimation and detection in stochastic control theory (93E10) Signal theory (characterization, reconstruction, filtering, etc.) (94A12)
Related Items (76)
Security analysis and defense strategy of distributed filtering under false data injection attacks ⋮ Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems ⋮ Adaptive event-triggered resilient control of industrial cyber physical systems under asynchronous data injection attack ⋮ Backstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurements ⋮ Worst-case stealthy innovation-based linear attack on remote state estimation ⋮ Consistent distributed state estimation with global observability over sensor network ⋮ Security weakness of dynamic watermarking-based detection for generalised replay attacks ⋮ Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis ⋮ Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ Encryption scheduling for remote state estimation under an operation constraint ⋮ Data-injection attacks in stochastic control systems: detectability and performance tradeoffs ⋮ Optimal acknowledgment signal attacks against remote estimation ⋮ Man-in-the-middle attack against cyber-physical systems under random access protocol ⋮ Distributed resilient fusion estimation for resource-limited CPSs under hybrid attacks ⋮ Dynamic event-triggered \(\mathcal{L}_\infty\) control for networked control systems under deception attacks: a switching method ⋮ Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ False data injection attacks on sensors against state estimation in cyber-physical systems ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ On consistency and stability of distributed Kalman filter under mismatched noise covariance and uncertain dynamics ⋮ Consensus-based filtering under false data injection attacks ⋮ Security control of integral sliding modes for multi-agent systems under false data injection attacks ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach ⋮ Whittle's index based sensor scheduling for multiprocess systems under DoS attacks ⋮ Adaptive fuzzy output feedback control for a class of uncertain nonlinear systems in the presence of sensor attacks ⋮ Performance analysis for cyber-physical systems under two types of stealthy deception attacks ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ Deep reinforcement learning control approach to mitigating actuator attacks ⋮ Proactive attack detection scheme based on watermarking and moving target defense ⋮ Integrity attacks on remote estimation with spatial-temporal information sources ⋮ Stability analysis of token-based wireless networked control systems under deception attacks ⋮ Optimal sensor scheduling for state estimation under limited channel resources ⋮ Optimal attack strategy against fault detectors for linear cyber-physical systems ⋮ Stealthy switching attacks on sensors against state estimation in cyber‐physical systems ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ Tampering attack detection for remote interval observer ⋮ A defense strategy for false data injection attacks in multi-agent systems ⋮ Design of false data injection attacks in cyber-physical systems ⋮ A class of stealthy attacks on remote state estimation with intermittent observation ⋮ Centralized approximate optimal estimation for cyber‐physical systems under joint cyber‐attacks ⋮ Optimal completely stealthy attacks against remote estimation in cyber-physical systems ⋮ Network steganography based security framework for cyber-physical systems ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Distributed filtering under false data injection attacks ⋮ State estimation under false data injection attacks: security analysis and system protection ⋮ Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution ⋮ Resilient decentralized adaptive tracking control for nonlinear interconnected systems with unknown control directions against DoS attacks ⋮ Secure remote state estimation against linear man-in-the-middle attacks using watermarking ⋮ Optimal stealthy false data injection attacks in cyber-physical systems ⋮ Towards quantifying the impact of randomly occurred attacks on a class of networked control systems ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems ⋮ Attack and estimator design for multi-sensor systems with undetectable adversary ⋮ Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels ⋮ Resilient strategy design for cyber-physical system under active eavesdropping attack ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Event-trigger-based adaptive output feedback approximately optimal tracking control of a class of MIMO non-affine nonlinear systems ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Detection against randomly occurring complex attacks on distributed state estimation ⋮ Optimal sensor attacks in cyber-physical systems with round-robin protocol ⋮ Probabilistic-constrained tracking control for stochastic time-varying systems under deception attacks: a round-robin protocol ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Reduced-order filtering for networks with Markovian jumping parameters and missing measurements ⋮ Improved adaptive resilient control against sensor and actuator attacks ⋮ Data-driven modeling of the temporal evolution of breakers' states in the French electrical transmission grid ⋮ A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks ⋮ Optimal linear attack for multi-sensor network against state estimation ⋮ Observer-based backstepping control for nonlinear cyber-physical systems with incomplete measurements ⋮ Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme ⋮ Fusion estimation in clustering sensor networks under stochastic deception attacks
This page was built for publication: Optimal Linear Cyber-Attack on Remote State Estimation