Optimal stealthy attacks with energy constraint against remote state estimation

X Liu, GH Yang - IEEE Transactions on Cybernetics, 2023 - ieeexplore.ieee.org
stealthy attacks are not considered in this article since the stealthy attacker needs to design
attacks … Since this article studies the stealthy attacks only based on the assumption that the …

The impact of stealthy attacks on smart grid performance: Tradeoffs and implications

Y Abdallah, Z Zheng, NB Shroff… - … on Control of …, 2016 - ieeexplore.ieee.org
… To the best of our knowledge, however, the impact of stealthy attacks on the energy
constraint that depends on the concrete statistical testing used, we consider a simple constraint

Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint

SS Dong, YG Li, L An - International Journal of Systems Science, 2023 - Taylor & Francis
… attackers allocate the energy to each channel with every step, the stealthy attacks in this
work can only selectively invade the partial channels. Thus, the attack matrices and positions …

Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach

X Liu, GH Yang - Information Sciences, 2022 - Elsevier
… Besides, the energy constraints are introduced to limit the attack times and encryption rank,
… to maximize the impact of the stealthy attacks on the remote state estimation in this paper. …

Optimal Intermittent Deception Attacks With Energy Constraints for Cyber–Physical Systems

X Liu, GH Yang - IEEE Transactions on Systems, Man, and …, 2024 - ieeexplore.ieee.org
… In this section, the optimal strictly stealthy and optimal δstealthy attack matrices are
designed. Moreover, the energy constraint conditions are further analyzed such that the optimal …

Stealth attacks on the smart grid

K Sun, I Esnaola, SM Perlaza… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… Consistency between the physical layer of the power grid and the energy management …
subject to the probability of detection constraint being satisfied. By increasing the value of λ the …

Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems

X Liu, GH Yang - Information Sciences, 2024 - Elsevier
… Motivated by the above results, the optimal stealthy attacks under energy constraints are …
are vulnerable to stealthy attacks. To maximize the attack effect under energy limitation, the …

Mitigating stealthy collision attack in energy harvesting motivated networks

C Pu, S Lim, B Jung, M Min - MILCOM 2017-2017 IEEE Military …, 2017 - ieeexplore.ieee.org
… We assume that the malicious node has no constraint in terms of energy and memory.
Here, we consider a dense network where multiple forwarding candidate nodes are available. …

An event-based stealthy attack on remote state estimation

P Cheng, Z Yang, J Chen, Y Qi… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… the attack mechanisms in the absence of the DoS attack detector, eg… an intelligent online
stealthy attack strategy against RSE, in … rate constraint caused by the limited sensor’s energy or …

Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation

Y Zhang, Z Peng, G Wen, J Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… 1) A novel resource-constrained linear MITM attack model is … resource constraint is considered
in the worst-based stealthy attack … In particular, the attacker without energy constraints can …