Innovation-based stealthy attack against distributed state estimation over sensor networks

M Niu, G Wen, Y Lv, G Chen - Automatica, 2023 - Elsevier
This paper presents a new design of an innovation-based stealthy attack strategy against
distributed state estimation over a sensor network. In the absence of network attack, an …

Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2022 - Elsevier
Remote state estimation through a wireless communication network is usually vulnerable to
malicious cyber-attacks, which can manipulate transmitted data without even being …

Optimal deception attacks against remote state estimation: An information-based approach

J Zhou, J Shang, T Chen - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
This article studies the problem of deception attacks against remote state estimation from an
information perspective. The Kullback–Leibler divergence between the compromised …

Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation

Y Zhang, Z Peng, G Wen, J Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article studies the impact of constrained optimal stealthy attacks on the state estimator,
where man-in-the-middle attacks with a linear form can compromise innovations transmitted …

On information fusion in optimal linear FDI attacks against remote state estimation

J Zhou, J Shang, T Chen - IEEE Transactions on Control of …, 2023 - ieeexplore.ieee.org
This article studies the problem of false data injection (FDI) attacks against remote state
estimation. The scenario that malicious attackers can intercept original data packets and …

Analysis of replay attacks with countermeasure for state estimation of cyber-physical systems

H Guo, J Sun, ZH Pang - … on Circuits and Systems II: Express …, 2023 - ieeexplore.ieee.org
This brief studies the security issue of remote state estimation of cyber-physical systems
under replay attacks, where the measurement residual is computed in smart sensors and …

The Vulnerability Analysis of Remote Estimation with Batch-Data Detectors against Integrity Attacks

Y Yang, Y Li, Y Shi, DE Quevedo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The vulnerability analysis of remote state estimation with batch-data detectors is investigated
in this article. The considered scenario is that sensors measure the process state and …

Detection and Performance Compensation for Linear -Stealthy Attacks in Cyber-Physical Systems

P Li, D Ye - IEEE Transactions on Control of Network Systems, 2022 - ieeexplore.ieee.org
In this article, a precisely designed system framework for linear cyber-physical systems is
presented to address the detection and performance compensation problems caused by …

Nonlinear stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2024 - Elsevier
This paper investigates stealthy attacks on state estimation within linear time-invariant
systems, focusing on scenarios where transmitted measurements through wireless networks …

Optimal Stealthy Joint Attacks against Distributed State Estimation in Cyber-Physical Systems

G Su, K Liu, H Wang, Q Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article studies the design of the optimal stealthy joint attacks against distributed state
estimation in cyber-physical systems to steer the state estimates in all the sensors as close …