Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
From MaRDI portal
Publication:6137552
DOI10.1109/TAC.2022.3171422OpenAlexW4225630785MaRDI QIDQ6137552FDOQ6137552
Wen Yang, Yong Xu, Jiayu Zhou, Wei Xing Zheng, Wenjie Ding
Publication date: 4 September 2023
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tac.2022.3171422
Recommendations
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- The vulnerability of distributed state estimator under stealthy attacks
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Distributed Secure State Estimation in the Presence of Malicious Agents
- Detection against randomly occurring complex attacks on distributed state estimation
- Distributed secure state estimation for cyber-physical systems under sensor attacks
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Distributed secure state estimation for linear systems against malicious agents through sorting and filtering
- A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
Cited In (3)
This page was built for publication: Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6137552)