The
design
of
a
robust
observer
under
denial-of-
service
attacks
is
addressed
for
linear
time
invariant
systems
in
the
bounded-error
framework.
cyber-attacks
occur
between
output
sensors
localized
on
physical
plant
and
cyber
part
embedding
observer.
data
required
by
are
thus
available
at
sporadic
measurement
instants.
In
this
setting,
an
interval
impulsive
synthesized.
stability
analysis
dynamics
state
estimation
error
done
leveraging
finite-gain
£1
theory
hybrid
systems.
gain
computed
combining
resolution
algebraic
inequalities
that
greatly
reduces
synthesis
complexity
when
compared
to
state-of-the-art
approaches
usually
rely
solving
many
bilinear
matrix
inequalities.
A
numerical
example
illustrates
approach
performance
designed
IEEE Transactions on Cybernetics,
Journal Year:
2023,
Volume and Issue:
53(10), P. 6714 - 6724
Published: March 27, 2023
Security
is
a
crucial
issue
for
cyber-physical
systems,
and
has
become
hot
topic
up
to
date.
From
the
perspective
of
malicious
attackers,
this
article
aims
devise
an
efficient
scheme
on
false
data-injection
(FDI)
attacks
such
that
performance
remote
state
estimation
degraded
as
much
possible.
First,
event-based
stealthy
FDI
attack
mechanism
introduced
selectively
inject
data
while
evading
residual-based
anomaly
detector.
Compared
with
some
existing
methods,
main
advantage
it
decides
when
launch
dynamically
according
real-time
residuals.
Second,
error
covariance
compromised
system
used
evaluate
degradation
under
attacks,
larger
covariance,
more
degradation.
Moreover,
stealthiness
constraints,
optimal
strategy
presented
maximize
trace
covariance.
Finally,
simulation
experiments
are
carried
out
illustrate
superiority
proposed
method
compared
ones.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2024,
Volume and Issue:
11(4), P. 851 - 865
Published: March 18, 2024
Cyber-physical
systems
(CPSs)
have
emerged
as
an
essential
area
of
research
in
the
last
decade,
providing
a
new
paradigm
for
integration
computational
and
physical
units
modern
control
systems.
Remote
state
estimation
(RSE)
is
indispensable
functional
module
CPSs.
Recently,
it
has
been
demonstrated
that
malicious
agents
can
manipulate
data
packets
transmitted
through
unreliable
channels
RSE,
leading
to
severe
performance
degradation.
This
paper
aims
present
overview
recent
advances
cyber-attacks
defensive
countermeasures,
with
specific
focus
on
integrity
attacks
against
RSE.
Firstly,
two
representative
frameworks
synthesis
optimal
deception
various
metrics
stealthiness
constraints
are
discussed,
which
provide
deeper
insight
into
vulnerabilities
Secondly,
detailed
review
typical
attack
detection
resilient
algorithms
included,
illustrating
latest
measures
safeguarding
RSE
from
adversaries.
Thirdly,
some
prevalent
impairing
confidentiality
availability
examined
both
attackers'
defenders'
perspectives.
Finally,
several
challenges
open
problems
presented
inspire
further
exploration
future
this
field.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2024,
Volume and Issue:
11(4), P. 1066 - 1068
Published: March 18, 2024
Dear
Editor,
This
letter
addresses
the
resilient
distributed
cooperative
control
problem
of
a
virtually
coupled
train
convoy
under
stochastic
disturbances
and
cyber
attacks.
The
main
purpose
is
to
achieve
coordination
high-speed
trains
with
prescribed
inter-train
distance
same
cruise
velocity,
while
preserving
driving
security
against
class
topological
First,
framework
established,
which
incorporates
longitudinal
dynamics,
disturbances,
attacks
on
information
flows.
Building
that,
protocol
topology
reconfiguration
algorithm
are
designed
for
attack-resilient
tracking.
Furthermore,
formal
stability
analysis
performed
exponential
convergence
tracking
errors.
Finally,
numerical
case
study
56
km-line
segment
real-world
railway
carried
out
validate
efficacy
our
results.
IEEE Transactions on Intelligent Transportation Systems,
Journal Year:
2024,
Volume and Issue:
25(9), P. 12835 - 12840
Published: Sept. 1, 2024
This
paper
investigates
the
problem
of
designing
stealthy
deception
attacks
against
networked
unmanned
surface
vehicles
(USVs)
equipped
with
watermarking
detection
modules.
To
overcome
limitations
existing
attack
methods
affected
by
technology,
an
anti-watermarking
method
is
proposed,
where
two
auxiliary
estimators
are
designed
to
indirectly
estimate
compromised
system
state
such
that
proposed
can
deteriorate
performance
USVs
without
being
detected
Compared
results,
exhibits
better
stealthiness.
improve
performance,
exponential
signal
model
adjustable
parameters
designed,
and
its
destructiveness
analyzed
under
different
conditions.
A
simulation
example
given
demonstrate
effectiveness
superiority
method.
IEEE/CAA Journal of Automatica Sinica,
Journal Year:
2024,
Volume and Issue:
11(4), P. 1054 - 1056
Published: March 18, 2024
Dear
Editor,
This
letter
investigates
a
novel
stealthy
false
data
injection
(FDI)
attack
scheme
based
on
side
information
to
deteriorate
the
multi-sensor
estimation
performance
of
cyber-physical
systems
(CPSs).
Compared
with
most
existing
works
depending
full
system
knowledge,
this
is
only
related
attackers'
sensor
and
physical
process
model.
The
design
principle
signal
derived
diverge
performance.
Next,
it
proven
that
proposed
can
successfully
bypass
residual-based
detector.
Finally,
all
theoretical
results
are
verified
by
numerical
simulation.