Two-channel false data injection attacks on multi-sensor remote state estimation
From MaRDI portal
Publication:6583191
DOI10.1002/ASJC.3067MaRDI QIDQ6583191FDOQ6583191
Authors: Jinxing Hua, Ruirui Liu, Fei Hao
Publication date: 6 August 2024
Published in: Asian Journal of Control (Search for Journal in Brave)
Recommendations
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Secure nonlinear fusion estimation for cyber-physical systems under FDI attacks
- Optimal stealthy false data injection attacks in cyber-physical systems
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints
false data injection attackscyber physical systems\((\epsilon, \delta)\)-stealthinessmulti-sensor fusion Kalman filter
Cites Work
- Title not available (Why is that?)
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Collisions-Free Distributed Optimal Coordination for Multiple Euler-Lagrangian Systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Distributed Optimal Coordination for Heterogeneous Linear Multiagent Systems
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations
- Secure consensus of multi-agent systems under denial-of-service attacks
- Observer-based sensor attack diagnosis for cyber-physical systems via zonotope theory
- Deception attack monitoring in vulnerable hydroelectric generator system
- Interval observer-based consensus control of discrete-time multi-agent systems under stealthy attacks
Cited In (9)
- Secure state estimation for unmanned aircraft cyber-physical systems under multiple attacks
- Secured filters based on saturated innovations
- Scheduler-Pointed False Data Injection Attack for Event-Based Remote State Estimation
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels
- Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids
- Two-channel stealthy false data injection attacks design without estimator knowledge
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints
- Improving Kalman filter for cyber physical systems subject to replay attacks: an attack-detection-based compensation strategy
- Set-membership multi-sensor secure fusion estimation against two-channel malicious attacks
This page was built for publication: Two-channel false data injection attacks on multi-sensor remote state estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6583191)