Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review

J Zhou, J Shang, T Chen - IEEE/CAA Journal of Automatica …, 2024 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …

Linear encryption against eavesdropping on remote state estimation

J Shang, T Chen - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
This article considers the problem of eavesdropping on remote state estimation. Linear
encryption strategies are used to protect the transmitted data. Two types of data transmission …

Innovation-based stealthy attack against distributed state estimation over sensor networks

M Niu, G Wen, Y Lv, G Chen - Automatica, 2023 - Elsevier
This paper presents a new design of an innovation-based stealthy attack strategy against
distributed state estimation over a sensor network. In the absence of network attack, an …

Distributed encryption fusion estimation against full eavesdropping

X Yan, B Chen, Y Zhang, L Yu - Automatica, 2023 - Elsevier
This paper is concerned with the privacy-preserving distributed fusion estimation problem
against full eavesdropping, where the eavesdropper can completely and precisely obtain …

Anti-Watermarking Stealthy Deception Attacks Against Networked Unmanned Surface Vehicles

XY Kong, GH Yang - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
This paper investigates the problem of designing stealthy deception attacks against
networked unmanned surface vehicles (USVs) equipped with watermarking detection …

Nonlinear stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2024 - Elsevier
This paper investigates stealthy attacks on state estimation within linear time-invariant
systems, focusing on scenarios where transmitted measurements through wireless networks …

A defense strategy for false data injection attacks in multi-agent systems

L Sun, T Wu, Y Zhang - International Journal of Systems Science, 2023 - Taylor & Francis
The issue of defense strategy for cooperative control in multi-agent systems under false data
injection attacks is investigated in this paper. False data injection attacks are typical cyber …

Replay attack detection and mitigation for cyber–physical systems via RADIR algorithm with encryption scheduling

Y Song, D Ye - Neurocomputing, 2023 - Elsevier
This paper investigates the security state estimation issue facing replay attacks in
confidential cyber–physical systems. Smart sensor equipped with a power harvester …

Optimal deception attacks on remote state estimators equipped with interval anomaly detectors

J Zhou, J Shang, T Chen - Automatica, 2023 - Elsevier
This paper studies the problem of optimal deception attacks on remote state estimation,
where an interval χ 2 detector is deployed to reveal anomalies. The information-based attack …

Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme

H Liu, Y Ni, X Wang, L Xie - IEEE Transactions on Control of …, 2024 - ieeexplore.ieee.org
This paper is concerned with the performance analysis of innovation-based remote state
estimation with an encryption scheme under linear attacks. We investigate performances …