A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arXiv preprint arXiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

Learning-based secure control for multichannel networked systems under smart attacks

Y Yu, GP Liu, W Hu - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article is concerned with the security control of a class of discrete-time linear
cyberphysical systems (CPSs) subject to denial-of-service attacks. To enhance the inherent …

Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2022 - Elsevier
Remote state estimation through a wireless communication network is usually vulnerable to
malicious cyber-attacks, which can manipulate transmitted data without even being …

Event-triggered data-driven control for nonlinear systems under frequency-duration-constrained DoS attacks

X Bu, W Yu, Y Yin, Z Hou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper addresses the event-triggered model free adaptive control (MFAC) problem for
unknown nonlinear systems under denial-of-service (DoS) attacks, where the design and …

Cybersecurity threat assessment integrating qualitative differential and evolutionary games

H Zhang, J Tan, X Liu, S Huang, H Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most current game theory-based cybersecurity analysis methods use traditional game
models, which do not meet realistic conditions of continuous dynamic changes in attack …

Rollout approach to sensor scheduling for remote state estimation under integrity attack

H Liu, Y Li, KH Johansson, J Mårtensson, L Xie - Automatica, 2022 - Elsevier
We consider the sensor scheduling problem for remote state estimation under integrity
attacks. We seek to optimize a trade-off between the energy consumption of communications …

Measurement-based optimal stealthy attacks on remote state estimation

P Li, D Ye - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
This paper focuses on designing measurement-based optimal stealthy attacks for linear
cyber-physical systems (CPSs), where attackers aim to deteriorate the performance of …

[HTML][HTML] Entice to trap: enhanced protection against a rate-aware intelligent jammer in cognitive radio networks

K Ibrahim, AM Alnajim, A Naveed Malik, A Waseem… - Sustainability, 2022 - mdpi.com
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine
learning techniques in the domains of frequency, coding, power and rate. Jamming is a …

The noise covariances of linear Gaussian systems with unknown inputs are not uniquely identifiable using autocovariance least-squares

H Kong, S Sukkarieh, TJ Arnold, T Chen… - Systems & Control …, 2022 - Elsevier
Existing works in optimal filtering for linear Gaussian systems with arbitrary unknown inputs
assume perfect knowledge of the noise covariances in the filter design. This is impractical …

Jamming-Resilient Over-the-Air Computation for Federated Learning in Edge Intelligence

Y Zou, M Xu, H Li, Q Hu, X Deng, D Yu… - 2022 IEEE Smartworld …, 2022 - ieeexplore.ieee.org
By making full use of the accumulative feature of wireless signals, the over-the-air
computation makes it possible for the federated learning to aggregate all the parameters …