Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems

From MaRDI portal
Publication:2288700

DOI10.1016/j.automatica.2019.108698zbMath1430.93140OpenAlexW2990170928WikidataQ126654733 ScholiaQ126654733MaRDI QIDQ2288700

Yanyan Li

Publication date: 20 January 2020

Published in: Automatica (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.automatica.2019.108698




Related Items

Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systemsGeometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics AttacksEvent-based leader-follower consensus of nonlinear multi-agent systems under denial-of-serviceK‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacksOptimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systemsStatic output-feedback control for cyber-physical LPV systems under DoS attacksSecurity of networked control systems subject to deception attacks: a surveyQuickest physical watermarking-based detection of measurement replacement attacks in networked control systemsOptimal stealthy attack with historical data on cyber-physical systemsComplete stealthiness false data injection attack design in multisensor systems with attack resource constraintsFinite-time covert attacks on reference tracking systems with unknown-but-bounded noisesA dynamic encryption-decryption scheme for replay attack detection in cyber-physical systemsQuickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policyRobust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode methodPermutation entropy based detection scheme of replay attacks in industrial cyber-physical systemsResilient strategy design for cyber-physical system under active eavesdropping attackA zonotopic set-invariance analysis of replay attacks affecting the supervisory layerSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationSystem identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategyInput-to-state stability of switched linear systems with unstabilizable modes under DoS attacks



Cites Work