A secure strategy for a cyber physical system with multi-sensor under linear deception attack
From MaRDI portal
Publication:2047102
DOI10.1016/j.jfranklin.2021.06.029zbMath1470.93062OpenAlexW3178093549MaRDI QIDQ2047102
Publication date: 19 August 2021
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2021.06.029
Control/observation systems involving computers (process control, etc.) (93C83) Linear systems in control theory (93C05) Networked control (93B70)
Related Items (5)
Optimal power control for sensors and DoS attackers over a fading channel network ⋮ Sequential recovery of cyber-physical power systems based on improved Q-learning ⋮ An adaptive control scheme for switched nonlinear cyber‐physical systems against state‐dependent sensor attacks and input‐dependent actuator attacks ⋮ Design of false data injection attacks in cyber-physical systems ⋮ Quantized output feedback control for switched systems with DoS attacks and event-triggered sampling
Cites Work
- Worst-case stealthy innovation-based linear attack on remote state estimation
- A data-driven covert attack strategy in the closed-loop cyber-physical systems
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Remote Estimation With Noisy Measurements Subject to Packet Loss and Quantization Noise
- Optimal Linear Cyber-Attack on Remote State Estimation
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
This page was built for publication: A secure strategy for a cyber physical system with multi-sensor under linear deception attack