Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
From MaRDI portal
Publication:2055571
DOI10.1016/j.ins.2020.08.124zbMath1478.93680OpenAlexW3085578532MaRDI QIDQ2055571
James Lam, Hong Lin, Zheng Wang
Publication date: 1 December 2021
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2020.08.124
Control/observation systems involving computers (process control, etc.) (93C83) Discrete-time control/observation systems (93C55) Estimation and detection in stochastic control theory (93E10) Linear systems in control theory (93C05) Networked control (93B70)
Related Items
Recursive state estimation for nonlinear coupling complex networks with time-varying topology and round-robin protocol, Partial-nodes-based state estimation for stochastic coupled complex networks with random sensor delay: an event-triggered communication method, Man-in-the-middle attack against cyber-physical systems under random access protocol, Secure state estimation for cyber-physical systems by unknown input observer with adaptive switching mechanism, Outlier-resistant sequential filtering fusion for cyber-physical systems with quantized measurements under denial-of-service attacks, DSC‐based finite‐time adaptive resilient control for a class of nonstrict‐feedback switched nonlinear systems with deception attacks, Centralized fusion estimation over wireless sensor-actuator networks with unobservable packet dropouts, Multi-sensor filtering fusion meets censored measurements under a constrained network environment: advances, challenges and prospects
Cites Work
- Unnamed Item
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
- State estimation under false data injection attacks: security analysis and system protection
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
- On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment
- Detection of replay attacks in cyber-physical systems using a frequency-based signature
- Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
- Optimal stealthy false data injection attacks in cyber-physical systems
- Distributed event-triggered control for networked control systems with stochastic cyber-attacks
- State estimation over non-acknowledgment networks with Markovian packet dropouts
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Optimal Estimation in UDP-Like Networked Control Systems With Intermittent Inputs: Stability Analysis and Suboptimal Filter Design
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Optimal Estimation and Control for Lossy Network: Stability, Convergence, and Performance
- Interacting Multiple Model Estimator for Networked Control Systems: Stability, Convergence, and Performance
- On model‐based detectors for linear time‐invariant stochastic systems under sensor attacks
- Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks
- Gaussian sum particle filtering
- Testing and Defending Methods Against DOS Attack in State Estimation
- The probabilistic data association filter