Man-in-the-middle attack against cyber-physical systems under random access protocol
From MaRDI portal
Publication:6066143
DOI10.1016/j.ins.2021.07.083zbMath1528.94087OpenAlexW3187445324MaRDI QIDQ6066143
Xiaoguang Zhang, Guang-Hong Yang, Saud Wasly
Publication date: 12 December 2023
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2021.07.083
Kalman filterKullback-Leibler divergenceman-in-the-middle attackcyber-physical systemsrandom access protocollinear quadratic Gaussian
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Networked control (93B70)
Related Items (2)
Security of networked control systems subject to deception attacks: a survey ⋮ Window-type detector for stealthy false data injection attack in cyber-physical systems
Cites Work
- Unnamed Item
- Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Sampled-position states based consensus of networked multi-agent systems with second-order dynamics subject to communication delays
- Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
- Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks
- Observer-based adaptive event-triggered sliding mode control of saturated nonlinear networked systems with cyber-attacks
- Observer-based event triggering \(H_\infty\) LFC for multi-area power systems under DoS attacks
- Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
- Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Global pinning synchronization of stochastic delayed complex networks
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- On convexification of system identification criteria
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Recursive Filtering for Time-Varying Systems with Random Access Protocol
- Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks
- Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks
- An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies
- Moving Horizon Estimation for Networked Time-Delay Systems Under Round-Robin Protocol
- Optimal Linear Cyber-Attack on Remote State Estimation
- Elements of Information Theory
This page was built for publication: Man-in-the-middle attack against cyber-physical systems under random access protocol