Vulnerability analysis of distributed state estimation under joint deception attacks
From MaRDI portal
Publication:6073113
DOI10.1016/j.automatica.2023.111274zbMath1522.93075MaRDI QIDQ6073113
Haojun Wang, Kun Liu, Yuanqing Xia, Dongyu Han
Publication date: 15 September 2023
Published in: Automatica (Search for Journal in Brave)
Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Security of interdependent and identical networked control systems
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- The vulnerability of distributed state estimator under stealthy attacks
- Security analysis and defense strategy of distributed filtering under false data injection attacks
- A secure control framework for resource-limited adversaries
- Stochastic link activation for distributed filtering under sensor power constraint
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Diffusion Strategies for Distributed Kalman Filtering and Smoothing
- A Robust and Resilient State Estimation for Linear Systems
- Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Cyber Physical Attacks with Control Objectives
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Design of Stealthy Deception Attacks With Partial System Knowledge
- Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
This page was built for publication: Vulnerability analysis of distributed state estimation under joint deception attacks