Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Event-based optimal stealthy false data-injection attacks against remote state estimation systems

H Guo, J Sun, ZH Pang, GP Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Security is a crucial issue for cyber–physical systems, and has become a hot topic up to
date. From the perspective of malicious attackers, this article aims to devise an efficient …

Analysis of stealthy false data injection attacks against networked control systems: Three case studies

Z Pang, Y Fu, H Guo, J Sun - Journal of Systems Science and Complexity, 2023 - Springer
This paper mainly investigates the security problem of a networked control system based on
a Kalman filter. A false data injection attack scheme is proposed to only tamper the …

Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review

J Zhou, J Shang, T Chen - IEEE/CAA Journal of Automatica …, 2024 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …

Resilient distributed state estimation under stealthy attack

Y Lv, J Lu, Y Liu, J Lou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Network security issues are significant for cyber-physical systems while existing wireless
networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy …

Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2022 - Elsevier
Remote state estimation through a wireless communication network is usually vulnerable to
malicious cyber-attacks, which can manipulate transmitted data without even being …

Residual-based false data injection attacks against multi-sensor estimation systems

H Guo, J Sun, ZH Pang - IEEE/CAA Journal of Automatica …, 2023 - ieeexplore.ieee.org
This paper investigates the security issue of multi-sensor remote estimation systems. An
optimal stealthy false data injection (FDI) attack scheme based on historical and current …

Deception attacks on remote estimation with disclosure and disruption resources

Y Li, Y Yang, Z Zhao, J Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The problem of deception attacks utilizing both disclosure and disruption resources in the
multiple types of sensors setting against remote state estimation is investigated in this article …

Innovation-based stealthy attack against distributed state estimation over sensor networks

M Niu, G Wen, Y Lv, G Chen - Automatica, 2023 - Elsevier
This paper presents a new design of an innovation-based stealthy attack strategy against
distributed state estimation over a sensor network. In the absence of network attack, an …

Optimal stealthy attack with historical data on cyber–physical systems

XX Ren, GH Yang, XG Zhang - Automatica, 2023 - Elsevier
This paper investigates the strictly stealthy attack on cyber–physical systems (CPSs), where
the attacker aims to degrade the remote estimation performance maximally while bypassing …