Improved Stealthy False Data Injection Attacks in Networked Control Systems

C Ning, Z Xi - IEEE Systems Journal, 2024 - ieeexplore.ieee.org
This article addresses the issues of deception attacks design against state estimations and
some key states in networked control systems (NCSs). Considering that the traditional …

Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme

H Liu, Y Ni, X Wang, L Xie - IEEE Transactions on Control of …, 2024 - ieeexplore.ieee.org
This paper is concerned with the performance analysis of innovation-based remote state
estimation with an encryption scheme under linear attacks. We investigate performances …

Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks

XY Zhang, GH Yang - IEEE Transactions on Network Science …, 2024 - ieeexplore.ieee.org
This paper studies the distributed secure state estimation problem for cyber-physical
systems subjected to false data injection attacks. A novel distributed framework is proposed …

Secure state estimation via robust optimization for nonlinear cyber‐physical systems

L Chen, Y Li, S Tong - Optimal Control Applications and …, 2024 - Wiley Online Library
This article proposes secure state estimation for cyber‐physical systems against sensor
attacks. The attack and defense strategies are established via additional historical data, and …

Asymmetric vulnerability of measurement and control channels in closed-loop systems

J Shang, D Cheng, J Zhou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article studies the vulnerability of measurement and control channels in closed-loop
systems. The problem of optimal stealthy attacks on linear quadratic Gaussian (LQG) control …

Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels

RR Liu, H Yu, F Hao - … Journal of Robust and Nonlinear Control, 2023 - Wiley Online Library
In this paper, a security problem in networked control systems which are modeled as linear
quadratic Gaussian control systems is investigated from the perspective of attackers. We …

Stealthy Linear Deception Attacks against Kalman Filtering with Partially Secured Measurements

J Zhou, T Chen - 2023 62nd IEEE Conference on Decision and …, 2023 - ieeexplore.ieee.org
In this paper, we investigate an optimal strategy for malicious agents to compromise remote
state estimators where only a portion of the transmitted packets is secured. First, the analysis …

Deception attacks on Kalman filtering with interval estimation performance loss

J Zhou, J Shang, T Chen - IFAC-PapersOnLine, 2022 - Elsevier
This paper studies the problem of optimal deception attacks against remote state estimation,
where the measurement data is transmitted through an unreliable wireless channel. A …

Worst-case stealthy false-data injection attacks on remote state estimation

J Zhou, J Shang, T Chen - … 47th Annual Conference of the IEEE …, 2021 - ieeexplore.ieee.org
This paper studies the problem of false-data injection attacks on remote state estimation. In
contrast to existing work that presupposed linear attack models, the optimal information …

A Model-Free Detection Strategy for False Data Injection Attacks in Networked Control Systems

C Ning, Z Xi - 2023 China Automation Congress (CAC), 2023 - ieeexplore.ieee.org
In this paper, a model-free detection strategy is proposed for stealthy false data injection
(FDI) attacks targeted at setpoints of control systems. A redundant item is added to the …