Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
From MaRDI portal
Publication:2021302
DOI10.1016/j.automatica.2021.109555zbMath1461.93190OpenAlexW3138139098MaRDI QIDQ2021302
Publication date: 26 April 2021
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.109555
Control/observation systems involving computers (process control, etc.) (93C83) Cryptography (94A60) Networked control (93B70)
Related Items (7)
Security of networked control systems subject to deception attacks: a survey ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ Integrity attacks on remote estimation with spatial-temporal information sources ⋮ Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Event-based state estimation of linear dynamic systems with unknown exogenous inputs
- Event-triggered maximum likelihood state estimation
- State estimation under false data injection attacks: security analysis and system protection
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Secure estimation based Kalman filter for cyber-physical systems against sensor attacks
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Defensive deception against reactive jamming attacks in remote state estimation
- Secure analysis of dynamic networks under pinning attacks against synchronization
- A secure control framework for resource-limited adversaries
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Resilient control under denial-of-service: robust design
- On stochastic and deterministic event-based state estimation
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Shorted Operators. II
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- DoS Attack Energy Management Against Remote State Estimation
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- Malicious Attacks on State Estimation Against Distributed Control Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Convex Optimization Based State Estimation Against Sparse Integrity Attacks
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Optimal Linear Cyber-Attack on Remote State Estimation
- An Event-Based Stealthy Attack on Remote State Estimation
This page was built for publication: Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data