Finite-Gain £1 Interval Impulsive Observer Design Under Denial-of-Service Attacks DOI
Ruth Line Tagne Mogue,

Estelle Courtial,

Yasmina Becis

et al.

Published: Dec. 13, 2023

The design of a robust observer under denial-of- service attacks is addressed for linear time invariant systems in the bounded-error framework. cyber-attacks occur between output sensors localized on physical plant and cyber part embedding observer. data required by are thus available at sporadic measurement instants. In this setting, an interval impulsive synthesized. stability analysis dynamics state estimation error done leveraging finite-gain £1 theory hybrid systems. gain computed combining resolution algebraic inequalities that greatly reduces synthesis complexity when compared to state-of-the-art approaches usually rely solving many bilinear matrix inequalities. A numerical example illustrates approach performance designed

Language: Английский

Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

et al.

IEEE Transactions on Cybernetics, Journal Year: 2023, Volume and Issue: 53(10), P. 6714 - 6724

Published: March 27, 2023

Security is a crucial issue for cyber-physical systems, and has become hot topic up to date. From the perspective of malicious attackers, this article aims devise an efficient scheme on false data-injection (FDI) attacks such that performance remote state estimation degraded as much possible. First, event-based stealthy FDI attack mechanism introduced selectively inject data while evading residual-based anomaly detector. Compared with some existing methods, main advantage it decides when launch dynamically according real-time residuals. Second, error covariance compromised system used evaluate degradation under attacks, larger covariance, more degradation. Moreover, stealthiness constraints, optimal strategy presented maximize trace covariance. Finally, simulation experiments are carried out illustrate superiority proposed method compared ones.

Language: Английский

Citations

27

Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review DOI
Jing Zhou, Jun Shang, Tongwen Chen

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2024, Volume and Issue: 11(4), P. 851 - 865

Published: March 18, 2024

Cyber-physical systems (CPSs) have emerged as an essential area of research in the last decade, providing a new paradigm for integration computational and physical units modern control systems. Remote state estimation (RSE) is indispensable functional module CPSs. Recently, it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels RSE, leading to severe performance degradation. This paper aims present overview recent advances cyber-attacks defensive countermeasures, with specific focus on integrity attacks against RSE. Firstly, two representative frameworks synthesis optimal deception various metrics stealthiness constraints are discussed, which provide deeper insight into vulnerabilities Secondly, detailed review typical attack detection resilient algorithms included, illustrating latest measures safeguarding RSE from adversaries. Thirdly, some prevalent impairing confidentiality availability examined both attackers' defenders' perspectives. Finally, several challenges open problems presented inspire further exploration future this field.

Language: Английский

Citations

7

An attack-resistant target localization in underwater based on consensus fusion DOI
Chenlu Gao,

Jing Nathan Yan,

Xian Yang

et al.

Computer Communications, Journal Year: 2024, Volume and Issue: 218, P. 131 - 147

Published: Feb. 19, 2024

Language: Английский

Citations

4

Attack-Resilient Distributed Cooperative Control of Virtually Coupled High-Speed Trains via Topology Reconfiguration DOI Open Access
Shunyuan Xiao, Xiaohua Ge, Qing Wu

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2024, Volume and Issue: 11(4), P. 1066 - 1068

Published: March 18, 2024

Dear Editor, This letter addresses the resilient distributed cooperative control problem of a virtually coupled train convoy under stochastic disturbances and cyber attacks. The main purpose is to achieve coordination high-speed trains with prescribed inter-train distance same cruise velocity, while preserving driving security against class topological First, framework established, which incorporates longitudinal dynamics, disturbances, attacks on information flows. Building that, protocol topology reconfiguration algorithm are designed for attack-resilient tracking. Furthermore, formal stability analysis performed exponential convergence tracking errors. Finally, numerical case study 56 km-line segment real-world railway carried out validate efficacy our results.

Language: Английский

Citations

4

Integrity attacks on state estimation with varying data access: From visibility to full restriction DOI
Jinyuan Wei, Jing Zhou, Tongwen Chen

et al.

Automatica, Journal Year: 2025, Volume and Issue: 174, P. 112162 - 112162

Published: Jan. 31, 2025

Language: Английский

Citations

0

Stealthy Deception Attack for One-on-One Unmanned Aerial Vehicle Air Combat DOI

Wenya Wan,

Yijie Liu, Yingmin Yi

et al.

Lecture notes in electrical engineering, Journal Year: 2025, Volume and Issue: unknown, P. 575 - 583

Published: Jan. 1, 2025

Language: Английский

Citations

0

Optimal Non-strict Stealthy Attacks With Utilization of Side Information and Maximum Integration of Historical Data in Cyber-physical Systems DOI

Hua-Sheng Shan,

Yi-Gang Li,

Ping Sun

et al.

International Journal of Control Automation and Systems, Journal Year: 2025, Volume and Issue: 23(4), P. 1118 - 1128

Published: April 12, 2025

Language: Английский

Citations

0

Anti-Watermarking Stealthy Deception Attacks Against Networked Unmanned Surface Vehicles DOI
Xiangyu Kong, Guang‐Hong Yang

IEEE Transactions on Intelligent Transportation Systems, Journal Year: 2024, Volume and Issue: 25(9), P. 12835 - 12840

Published: Sept. 1, 2024

This paper investigates the problem of designing stealthy deception attacks against networked unmanned surface vehicles (USVs) equipped with watermarking detection modules. To overcome limitations existing attack methods affected by technology, an anti-watermarking method is proposed, where two auxiliary estimators are designed to indirectly estimate compromised system state such that proposed can deteriorate performance USVs without being detected Compared results, exhibits better stealthiness. improve performance, exponential signal model adjustable parameters designed, and its destructiveness analyzed under different conditions. A simulation example given demonstrate effectiveness superiority method.

Language: Английский

Citations

3

Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation DOI Open Access
Haibin Guo, Zhong‐Hua Pang, Li Chao

et al.

IEEE/CAA Journal of Automatica Sinica, Journal Year: 2024, Volume and Issue: 11(4), P. 1054 - 1056

Published: March 18, 2024

Dear Editor, This letter investigates a novel stealthy false data injection (FDI) attack scheme based on side information to deteriorate the multi-sensor estimation performance of cyber-physical systems (CPSs). Compared with most existing works depending full system knowledge, this is only related attackers' sensor and physical process model. The design principle signal derived diverge performance. Next, it proven that proposed can successfully bypass residual-based detector. Finally, all theoretical results are verified by numerical simulation.

Language: Английский

Citations

2

Encryption-Based Attack Detection Scheme for Multi-Sensor Secure Fusion Estimation DOI
Tongxiang Li,

Pindi Weng,

Bo Chen

et al.

IEEE Transactions on Aerospace and Electronic Systems, Journal Year: 2024, Volume and Issue: 60(5), P. 7548 - 7554

Published: July 8, 2024

Language: Английский

Citations

2