Innovation-based stealthy attack against distributed state estimation over sensor networks
From MaRDI portal
Publication:6160767
DOI10.1016/J.AUTOMATICA.2023.110962zbMATH Open1519.93091OpenAlexW4327831242MaRDI QIDQ6160767FDOQ6160767
Authors: Mengfei Niu, Guanghui Wen, Yuezu Lv, Guanrong Chen
Publication date: 26 June 2023
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2023.110962
Recommendations
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Optimal linear attack for multi-sensor network against state estimation
- Worst-case stealthy innovation-based linear attack on remote state estimation
- The vulnerability of distributed state estimator under stealthy attacks
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
Cites Work
- Consensus-Based Linear and Nonlinear Filtering
- Stochastic stability of the discrete-time extended Kalman filter
- Kullback-Leibler average, consensus on probability densities, and distributed state estimation with guaranteed stability
- Diffusion Strategies for Distributed Kalman Filtering and Smoothing
- Optimal Linear Cyber-Attack on Remote State Estimation
- Design of Stealthy Deception Attacks With Partial System Knowledge
- Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge
- On Kalman-Consensus Filtering With Random Link Failures Over Sensor Networks
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Consistent distributed state estimation with global observability over sensor network
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- <italic>Consensus+Innovations</italic> Distributed Kalman Filter With Optimized Gains
- Detection and mitigation of biasing attacks on distributed estimation networks
- Distributed filtering under false data injection attacks
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Attack and estimator design for multi-sensor systems with undetectable adversary
- How to Secure Distributed Filters Under Sensor Attacks
- Distributed control under compromised measurements: resilient estimation, attack detection, and vehicle platooning
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Deception Attacks on Remote Estimation with Disclosure and Disruption Resources
Cited In (14)
- Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms
- Performance degradation of stealthy attacks against sensor measurements in vector systems
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Optimal linear attack for multi-sensor network against state estimation
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Fast state estimation under sensor attacks: a sensor categorization approach
- Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
- A class of stealthy attacks on remote state estimation with intermittent observation
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- The vulnerability of distributed state estimator under stealthy attacks
- Interval observer design of discrete-time systems under stealthy attacks
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Stealthy attack against distributed state estimation for cyber-physical systems
This page was built for publication: Innovation-based stealthy attack against distributed state estimation over sensor networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6160767)