Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
From MaRDI portal
Publication:2288700
DOI10.1016/j.automatica.2019.108698zbMath1430.93140OpenAlexW2990170928WikidataQ126654733 ScholiaQ126654733MaRDI QIDQ2288700
Publication date: 20 January 2020
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2019.108698
Control/observation systems involving computers (process control, etc.) (93C83) Authentication, digital signatures and secret sharing (94A62) Networked control (93B70)
Related Items
Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems ⋮ Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks ⋮ Event-based leader-follower consensus of nonlinear multi-agent systems under denial-of-service ⋮ K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks ⋮ Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems ⋮ Static output-feedback control for cyber-physical LPV systems under DoS attacks ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints ⋮ Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy ⋮ Robust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode method ⋮ Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems ⋮ Resilient strategy design for cyber-physical system under active eavesdropping attack ⋮ A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer ⋮ Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation ⋮ System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy ⋮ Input-to-state stability of switched linear systems with unstabilizable modes under DoS attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Probability
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Attack Detection and Identification in Cyber-Physical Systems
- Signaling in Sensor Networks for Sequential Detection
- Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks