Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Memory-based adaptive event-triggered secure control of Markovian jumping neural networks suffering from deception attacks

L Yao, X Huang - Science China Technological Sciences, 2023 - Springer
In this article, we study the secure control of the Markovian jumping neural networks
(MJNNs) subject to deception attacks. Considering the limitation of the network bandwidth …

Ripple effect of cooperative attacks in multi-agent systems: Results on minimum attack targets

TY Zhang, D Ye, GH Yang - Automatica, 2024 - Elsevier
From the security of multi-agent systems (MASs), this paper investigates false-data injection
attacks that cooperatively compromise communication links to stealthily destabilize the …

Kinematic control of serial manipulators under false data injection attack

Y Zhang, S Li - IEEE/CAA Journal of Automatica Sinica, 2023 - ieeexplore.ieee.org
With advanced communication technologies, cyber-physical systems such as networked
industrial control systems can be monitored and controlled by a remote control center via …

An online Kullback–Leibler divergence-based stealthy attack against cyber-physical systems

Q Zhang, K Liu, AMH Teixeira, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article investigates the design of online stealthy attacks with the aim of moving the
system's state to the desired target. Different from the design of offline attacks, which is only …

Optimal stealthy attacks with energy constraint against remote state estimation

X Liu, GH Yang - IEEE Transactions on Cybernetics, 2023 - ieeexplore.ieee.org
This article investigates the problem of energy-constrained stealthy attack strategy against
remote state estimation for cyber-physical systems. Taking into account the energy …

Passive attack detection for a class of stealthy intermittent integrity attacks

K Zhang, C Keliris, T Parisini, B Jiang… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
This paper proposes a passive methodology for detecting a class of stealthy intermittent
integrity attacks in cyber-physical systems subject to process disturbances and …

Vulnerability analysis of distributed state estimation under joint deception attacks

H Wang, K Liu, D Han, Y Xia - Automatica, 2023 - Elsevier
This paper is concerned with the vulnerability of distributed state estimation under joint
deception attacks. We first consider that all the output measurements and state estimations …

Innovation-based stealthy attack against distributed state estimation over sensor networks

M Niu, G Wen, Y Lv, G Chen - Automatica, 2023 - Elsevier
This paper presents a new design of an innovation-based stealthy attack strategy against
distributed state estimation over a sensor network. In the absence of network attack, an …

Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint

SS Dong, YG Li, L An - International Journal of Systems Science, 2023 - Taylor & Francis
This work considers an innovation-based attack policy in cyber-physical systems with
multiple channels. The linear deception attack policy only allows the partial channels to be …