Event-based optimal stealthy false data-injection attacks against remote state estimation systems

H Guo, J Sun, ZH Pang, GP Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Security is a crucial issue for cyber–physical systems, and has become a hot topic up to
date. From the perspective of malicious attackers, this article aims to devise an efficient …

Data-driven false data-injection attack design and detection in cyber-physical systems

Z Zhao, Y Huang, Z Zhen, Y Li - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, a data-driven design scheme of undetectable false data-injection attacks
against cyber-physical systems is proposed first, with the aid of the subspace identification …

Detection of stealthy false data injection attacks against networked control systems via active data modification

ZH Pang, LZ Fan, J Sun, K Liu, GP Liu - Information Sciences, 2021 - Elsevier
This paper investigates the design and detection problems of stealthy false data injection
(FDI) attacks against networked control systems from the different perspectives of an attacker …

Distributed estimation with cross-verification under false data-injection attacks

Y Hua, F Wan, H Gan, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Under false data-injection (FDI) attacks, the data of some agents are tampered with by the
FDI attackers, which causes that the distributed algorithm cannot estimate the ideal unknown …

Security against false data-injection attack in cyber-physical systems

A Chattopadhyay, U Mitra - IEEE Transactions on Control of …, 2019 - ieeexplore.ieee.org
In this paper, secure, remote estimation of a linear Gaussian process via observations at
multiple sensors is considered. Such a framework is relevant to many cyber-physical …

Attack detection and distributed filtering for state-saturated systems under deception attack

L Li, H Yang, Y Xia, C Zhu - IEEE Transactions on Control of …, 2021 - ieeexplore.ieee.org
In this article, a secure distributed filtering problem is investigated for a state-saturated
system subject to random occurring nonlinearities and deception attack. To resist the hostile …

Optimal linear cyber-attack on remote state estimation

Z Guo, D Shi, KH Johansson… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recent years have witnessed the surge of interest of security issues in cyber-physical
systems. In this paper, we consider malicious cyber attacks in a remote state estimation …

Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems

JJ Yan, GH Yang, Y Wang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article investigates the problem of attack detection of false data injection attacks for a
class of large-scale smart grid systems in the context of cyber–physical systems. First, by …

Secure state estimation against sparse sensor attacks with adaptive switching mechanism

L An, GH Yang - IEEE Transactions on Automatic Control, 2017 - ieeexplore.ieee.org
This paper investigates the problem of secure state estimation for cyber-physical systems
modeled by continuous or discrete-time linear systems when some sensors are corrupted by …

State estimation under false data injection attacks: Security analysis and system protection

L Hu, Z Wang, QL Han, X Liu - Automatica, 2018 - Elsevier
The security issue in the state estimation problem is investigated for a networked control
system (NCS). The communication channels between the sensors and the remote estimator …