Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges

MS Mahmoud, MM Hamdan, UA Baroudi - Neurocomputing, 2019 - Elsevier
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …

A dynamic event-triggered approach to observer-based PID security control subject to deception attacks

D Zhao, Z Wang, G Wei, QL Han - Automatica, 2020 - Elsevier
In this paper, the observer-based PID security control problem is investigated for a class of
linear discrete-time systems subject to deception attacks. A new index for security level is …

Identification of FIR systems with binary-valued observations against data tampering attacks

J Guo, R Jia, R Su, Y Zhao - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article addresses the security issue against data tampering attacks in the identification
of finite impulse response (FIR) systems with binary-valued observations. First, the data …

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020 - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …

Optimal denial-of-service attack energy management against state estimation over an SINR-based network

J Qin, M Li, J Wang, L Shi, Y Kang, WX Zheng - Automatica, 2020 - Elsevier
We consider a scenario in which a DoS attacker with the limited power resource and the
purpose of degrading the system performance, jams a wireless network through which the …

Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

Observer-based distributed secure consensus control of a class of linear multi-agent systems subject to random attacks

Y Yang, H Xu, D Yue - … Transactions on Circuits and Systems I …, 2019 - ieeexplore.ieee.org
This paper is concerned with an observer-based distributed secure consensus control
strategy for a class of linear multi-agent systems (MASs) with random attacks. Due to the fact …

Recursive filtering of distributed cyber-physical systems with attack detection

D Ding, QL Han, Z Wang, X Ge - IEEE transactions on systems …, 2020 - ieeexplore.ieee.org
This article is concerned with the distributed recursive filtering of cyber-physical systems
consisting of a set of spatially distributed subsystems. Due to the vulnerability of …

Design of stealthy deception attacks with partial system knowledge

Q Zhang, K Liu, D Han, G Su… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article investigates the design of stealthy deception attacks with the aim of destroying
the estimate performance without knowing the filter gain. The residual used to detect attacks …