Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
From MaRDI portal
Publication:2063783
DOI10.1016/j.automatica.2021.110015zbMath1480.93175OpenAlexW3217004556WikidataQ121975436 ScholiaQ121975436MaRDI QIDQ2063783
Yun Shang, Jing Zhou, Tongwen Chen
Publication date: 3 January 2022
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.110015
Control/observation systems involving computers (process control, etc.) (93C83) Cryptography (94A60) Computer security (68M25) Networked control (93B70)
Related Items (4)
Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Distributed encryption fusion estimation against full eavesdropping ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks ⋮ A defense strategy for false data injection attacks in multi-agent systems
Cites Work
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Distributed filtering under false data injection attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Defensive deception against reactive jamming attacks in remote state estimation
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Attack Energy Allocation against Remote State Estimation
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- State-Secrecy Codes for Networked Linear Systems
- Secure State Estimation With Byzantine Sensors: A Probabilistic Approach
- An Online Approach to Physical Watermark Design
- Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Homomorphic Encryption and Applications
- Resilient Distributed Optimization Algorithm Against Adversarial Attacks
- An Event-Based Stealthy Attack on Remote State Estimation
- Remote State Estimation in the Presence of an Active Eavesdropper
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
This page was built for publication: Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation