How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
From MaRDI portal
Publication:2063849
DOI10.1016/j.automatica.2021.110079zbMath1480.93171OpenAlexW4200503888MaRDI QIDQ2063849
Yuqing Ni, Hanxiao Liu, Karl Henrik Johansson, Xie, Lihua
Publication date: 3 January 2022
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.110079
Control/observation systems involving computers (process control, etc.) (93C83) Linear systems in control theory (93C05) Networked control (93B70)
Related Items (2)
Security of networked control systems subject to deception attacks: a survey ⋮ Innovation-based stealthy attack against distributed state estimation over sensor networks
Cites Work
- Unnamed Item
- Unnamed Item
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Optimal stealthy false data injection attacks in cyber-physical systems
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- SOI-KF: Distributed Kalman Filtering With Low-Cost Communications Using the Sign of Innovations
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Secure State Estimation Against Sensor Attacks in the Presence of Noise
- On Information and Sufficiency
This page was built for publication: How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks