Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

Denial-of-service power dispatch against linear quadratic control via a fading channel

H Zhang, WX Zheng - IEEE Transactions on Automatic Control, 2018 - ieeexplore.ieee.org
This paper addresses the secure control problem of cyber-physical systems (CPSs) under
Denial-of-Service (DoS) attack with power constraint. The purpose of the attacker is to …

False data injection attack for cyber-physical systems with resource constraint

F Li, Y Tang - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since
CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one …

DoS attack in centralised sensor network against state estimation

C Yang, W Yang, H Shi - IET Control Theory & Applications, 2018 - Wiley Online Library
This study considers a model that a centralised sensor network is attacked by an invader,
who launches the denial‐of‐service (DoS) attack on the network. To understand the …

A secure strategy for a cyber physical system with multi-sensor under linear deception attack

C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …

Resilient control for wireless networked control systems under DoS attack via a hierarchical game

H Yuan, Y Xia, H Yang, Y Yuan - International Journal of …, 2018 - Wiley Online Library
In this paper, the resilient control problem is investigated for a wireless networked control
system (WNCS) under denial‐of‐service (DoS) attack via a hierarchical game approach. In …

Optimal linear attack for multi-sensor network against state estimation

T Li, Z Wang, C Huang, H Zhang - Journal of the Franklin Institute, 2022 - Elsevier
This paper is concerned with a security problem about malicious integrity attacks in state
estimation system, in which multiple smart sensors locally measure information and transmit …

A survey on the recent development of securing the networked control systems

Q Wang, H Yang - Systems Science & Control Engineering, 2019 - Taylor & Francis
Recent years witness an ever-increasing research interest in the study of securing the
Networked Control Systems due mainly to the trend of integrating the advanced …

Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game

H Zhang, J Yao, Z Wang, S Gao, H Yan - IEEE Systems Journal, 2024 - ieeexplore.ieee.org
This article studies the optimal distributed denial-of-service attack strategy for cyber–
physical systems with multiple attackers and multiple defenders. An advanced attack …

Optimal FDI and DoS attacks on CPSs with energy constraint

Y Du, S Xu, S Han - ICC 2022-IEEE International Conference …, 2022 - ieeexplore.ieee.org
To have a good understanding of attackers' behaviour and seek effective defensive
measures, an optimal strategy of false data injection (FDI) and denial-of-service (DoS) …