Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
From MaRDI portal
Publication:680517
DOI10.1016/j.automatica.2017.09.021zbMath1378.93122arXiv1609.00887OpenAlexW2962909029MaRDI QIDQ680517
Junfeng Wu, Ling Shi, Xiaoqiang Ren, Subhrakanti Dey
Publication date: 23 January 2018
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1609.00887
Filtering in stochastic control theory (93E11) Application models in control theory (93C95) Estimation and detection in stochastic control theory (93E10) Optimal stochastic control (93E20) Markov and semi-Markov decision processes (90C40)
Related Items
Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints ⋮ Whittle's index based sensor scheduling for multiprocess systems under DoS attacks ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Optimal scheduling of multiple sensors over shared channels with packet transmission constraint ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ Transmission scheduling for multi-process multi-sensor remote estimation via approximate dynamic programming ⋮ Sensor scheduling design for complex networks under a distributed state estimation framework
Cites Work
- Dynamic sensor transmission power scheduling for remote state estimation
- Markov chains and stochastic stability
- Computable bounds for geometric convergence rates of Markov chains
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Secure Control Systems: A Quantitative Risk Management Approach
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- Average optimality for Markov decision processes in borel spaces: a new condition and approach
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- On an index policy for restless bandits
- Optimal Linear Cyber-Attack on Remote State Estimation
- Partially Ordered Sets
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item