Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Observer-based attack detection and mitigation for cyberphysical systems: A review

M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …

Industry 4.0 Model for circular economy and cleaner production

S Rajput, SP Singh - Journal of cleaner production, 2020 - Elsevier
In today's competitive scenario, the manufacturing industries are lagging behind in
implementing the Industry 4.0 concept or in integrating smart, ubiquitous components due to …

False data injection attacks against partial sensor measurements of networked control systems

ZH Pang, LZ Fan, Z Dong, QL Han… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This brief concerns the problem of false data injection (FDI) attacks against partial sensor
measurements of a networked stochastic system. For a Kalman filter based output tracking …

Joint adversarial example and false data injection attacks for state estimation in power systems

J Tian, B Wang, Z Wang, K Cao, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although state estimation using a bad data detector (BDD) is a key procedure employed in
power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial …

Optimal stealthy deception attack against cyber-physical systems

Q Zhang, K Liu, Y Xia, A Ma - IEEE transactions on cybernetics, 2019 - ieeexplore.ieee.org
This paper studies the problem of designing the optimal deception attack to maximize a
utility function with the Kullback-Leibler divergence adopted as a detection constraint. The …

Saturated threshold event-triggered control for multiagent systems under sensor attacks and its application to UAVs

G Chen, D Yao, H Li, Q Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper investigates the secure consensus tracking problem for continuous-time
nonlinear multiagent systems with sensor attacks. By designing a secure data selector, the …

Analysis of stealthy false data injection attacks against networked control systems: Three case studies

Z Pang, Y Fu, H Guo, J Sun - Journal of Systems Science and Complexity, 2023 - Springer
This paper mainly investigates the security problem of a networked control system based on
a Kalman filter. A false data injection attack scheme is proposed to only tamper the …

Event-based optimal stealthy false data-injection attacks against remote state estimation systems

H Guo, J Sun, ZH Pang, GP Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Security is a crucial issue for cyber–physical systems, and has become a hot topic up to
date. From the perspective of malicious attackers, this article aims to devise an efficient …

State estimation under joint false data injection attacks: Dealing with constraints and insecurity

W Xu, Z Wang, L Hu, J Kurths - IEEE Transactions on Automatic …, 2021 - ieeexplore.ieee.org
This article is concerned with the security issue in the state estimation problem for a
networked control system (NCS). A new model of joint false data injection (FDI) attack is …