Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only...
Saved in:
Published in | Information sciences Vol. 546; pp. 943 - 960 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
06.02.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 0020-0255 1872-6291 |
DOI | 10.1016/j.ins.2020.08.124 |
Cover
Loading…
Abstract | We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyber-attacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks. |
---|---|
AbstractList | We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyber-attacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks. |
Author | Lin, Hong Lam, James Wang, Zheng |
Author_xml | – sequence: 1 givenname: Hong orcidid: 0000-0003-2207-2294 surname: Lin fullname: Lin, Hong organization: Institute of Intelligence Science and Engineering, Shenzhen Polytechnic, Shenzhen 518055, China – sequence: 2 givenname: James orcidid: 0000-0002-0294-0640 surname: Lam fullname: Lam, James email: james.lam@hku.hk organization: Department of Mechanical Engineering, The University of Hong Kong, Pokfulam, Hong Kong – sequence: 3 givenname: Zheng surname: Wang fullname: Wang, Zheng email: zwangski@hku.hk, wangz@sustech.edu.cn organization: Department of Mechanical Engineering, The University of Hong Kong, Pokfulam, Hong Kong |
BookMark | eNp9kMtOwzAQAC1UJNrCB3DzDyTYbuIkcEIVL6kSB-BsHGctuTRO5XUR-XvclhOHnrzWalaamZGJHzwQcs1ZzhmXN-vcecwFEyxndc5FcUamvK5EJkXDJ2TK0iZjoiwvyAxxzRgrKimn5PMNzC4AxagjUMDoeh3d4KkdAsURI_RId76DQHv3Ax01Ywsh0zFq84W39IC7OFLtO7qFkLBeewPprzcjOrwk51ZvEK7-3jn5eHx4Xz5nq9enl-X9KjOiqWLWiLaBriqELdtmIY1s6pK31pqCNwws19zYeiGEBWZqqYGDbqs0dtK2oijbxZzw410TBsQAVm1Dcgmj4kztE6m1SonUPpFitUqJElP9Y4yLB_0YtNucJO-OJCSlbwdBoXGQvDsXwETVDe4E_Qu6rIYD |
CitedBy_id | crossref_primary_10_1109_JAS_2024_124257 crossref_primary_10_1049_cth2_12172 crossref_primary_10_1002_rnc_6800 crossref_primary_10_1109_TFUZZ_2023_3239930 crossref_primary_10_1016_j_jfranklin_2021_11_002 crossref_primary_10_3390_s23010335 crossref_primary_10_1016_j_ins_2021_07_083 crossref_primary_10_1007_s00202_023_01978_1 crossref_primary_10_1109_TCNS_2022_3233927 crossref_primary_10_1080_00207721_2021_2005178 crossref_primary_10_1016_j_ins_2024_120584 crossref_primary_10_1016_j_ins_2025_122002 crossref_primary_10_1109_ACCESS_2022_3227076 crossref_primary_10_1002_asjc_2962 crossref_primary_10_1109_TSMC_2024_3354883 crossref_primary_10_1016_j_jfranklin_2024_107264 crossref_primary_10_1109_TSIPN_2021_3139351 crossref_primary_10_1016_j_ins_2021_08_098 crossref_primary_10_1109_TII_2022_3193955 crossref_primary_10_1016_j_jfranklin_2022_05_009 crossref_primary_10_1049_cth2_12261 crossref_primary_10_1016_j_nahs_2023_101445 crossref_primary_10_1109_JSEN_2023_3306080 crossref_primary_10_1109_TCNS_2022_3203903 crossref_primary_10_1109_TCYB_2024_3454053 crossref_primary_10_1016_j_isatra_2024_10_025 crossref_primary_10_1049_cth2_12703 crossref_primary_10_1109_TSMC_2022_3227607 crossref_primary_10_1016_j_ins_2024_120251 crossref_primary_10_1109_TICPS_2024_3435648 crossref_primary_10_1016_j_ins_2023_01_142 crossref_primary_10_1016_j_ins_2023_119452 crossref_primary_10_1016_j_ins_2023_119172 crossref_primary_10_1109_TNSE_2024_3491823 crossref_primary_10_1109_TAC_2023_3298527 crossref_primary_10_1109_TSMC_2023_3330946 |
Cites_doi | 10.1109/TSIPN.2017.2749959 10.1109/TAC.2014.2303233 10.1049/iet-cta.2017.0819 10.1109/TSMC.2019.2905253 10.1016/j.jfranklin.2017.11.010 10.1109/TSMC.2019.2896292 10.1109/TAC.2015.2409905 10.1049/iet-cta.2019.1140 10.1109/7.640267 10.1016/j.automatica.2019.108557 10.1002/rnc.3623 10.1016/j.jfranklin.2018.10.030 10.1049/iet-cta.2018.5970 10.1109/TAC.2015.2498708 10.1109/TSP.2003.816754 10.1016/j.jfranklin.2018.01.048 10.1016/j.ins.2019.12.029 10.1109/TAC.2018.2831620 10.1109/TAC.2015.2479195 10.1016/j.jfranklin.2019.11.001 10.1109/TAC.2017.2672729 10.1109/TSMC.2019.2896249 10.1115/1.2906789 10.1016/j.ins.2019.01.001 10.1049/iet-cta.2018.5167 10.1016/j.automatica.2017.12.059 10.1016/j.automatica.2016.12.020 10.1016/j.automatica.2017.09.028 10.1016/j.ins.2019.10.057 10.1049/iet-cta.2018.5954 10.1109/TCNS.2016.2549640 10.1109/MCS.2009.934469 10.1016/j.jfranklin.2019.01.006 10.1109/TCYB.2019.2917179 10.1109/TAC.2015.2461851 10.1016/j.jfranklin.2019.01.005 10.1109/MSMC.2018.2882145 10.1016/j.automatica.2016.12.026 10.1049/iet-cta.2019.0914 10.1016/j.automatica.2019.06.036 10.1002/asjc.1441 |
ContentType | Journal Article |
Copyright | 2020 Elsevier Inc. |
Copyright_xml | – notice: 2020 Elsevier Inc. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.ins.2020.08.124 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Library & Information Science |
EISSN | 1872-6291 |
EndPage | 960 |
ExternalDocumentID | 10_1016_j_ins_2020_08_124 S0020025520308902 |
GroupedDBID | --K --M --Z -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABAOU ABBOA ABFNM ABJNI ABMAC ABUCO ABYKQ ACAZW ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADGUI ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGVJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM ARUGR AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX IHE J1W JJJVA KOM LG9 LY1 M41 MHUIS MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ SDF SDG SDP SES SPC SPCBC SSB SSD SST SSV SSW SSZ T5K TN5 TWZ WH7 XPP ZMT ~02 ~G- 1OL 29I AAAKG AAQXK AATTM AAXKI AAYWO AAYXX ABEFU ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO ADVLN AEIPS AEUPX AFFNX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN BNPGV CITATION EJD FEDTE FGOYB HLZ HVGLF HZ~ H~9 R2- RIG SBC SDS SEW SSH UHS WUQ YYP ZY4 |
ID | FETCH-LOGICAL-c297t-92b9ed742f5b936c69851bffc4190ef1a1cf8322fe0c86ae1eab70c8d6fb245b3 |
IEDL.DBID | AIKHN |
ISSN | 0020-0255 |
IngestDate | Tue Jul 01 01:26:43 EDT 2025 Thu Apr 24 23:10:32 EDT 2025 Fri Feb 23 02:46:43 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Cyber-physical systems Cyber-attacks Security Optimal estimator Approximate estimator |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c297t-92b9ed742f5b936c69851bffc4190ef1a1cf8322fe0c86ae1eab70c8d6fb245b3 |
ORCID | 0000-0003-2207-2294 0000-0002-0294-0640 |
PageCount | 18 |
ParticipantIDs | crossref_primary_10_1016_j_ins_2020_08_124 crossref_citationtrail_10_1016_j_ins_2020_08_124 elsevier_sciencedirect_doi_10_1016_j_ins_2020_08_124 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-02-06 |
PublicationDateYYYYMMDD | 2021-02-06 |
PublicationDate_xml | – month: 02 year: 2021 text: 2021-02-06 day: 06 |
PublicationDecade | 2020 |
PublicationTitle | Information sciences |
PublicationYear | 2021 |
Publisher | Elsevier Inc |
Publisher_xml | – name: Elsevier Inc |
References | Liu, Tian, Xie, Lin (b0155) 2019; 356 Oke, Loukas, Gelenbe (b0175) 2007 Ge, Han, Zhang, Ding, Yang (b0055) 2020; 512 Kotecha, Djuric (b0095) 2003; 51 Fawzi, Tabuada, Diggavi (b0045) 2014; 59 Lin, Su, Shi, Shu, Lu, Wu (b0145) 2017; 62 Lin, Su, Shu, Wu, Xu (b0150) 2016; 61 Li, Yang (b0115) 2019; 481 Mo, Sinopoli (b0165) 2015; 61 Chen, Ding, Dong, Wei (b0020) 2019 S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient Lin, Su, Chen, Shu, Lu, Wu (b0140) 2018; 90 Wang, Wang, Shen, Alsaadi (b0200) 2017; 27 Li, Quevedo, Dey, Shi (b0105) 2016; 4 Bar-Shalom, Daum, Huang (b0015) 2009; 29 Zhang, Cheng, Shi, Chen (b0220) 2015; 60 Eustace, Woodyatt, Merrington, Runacres (b0040) 1994; 116 Zhang, Qi, Zhou, Zhang, Sun (b0225) 2017; 19 Anderson, Moore (b0010) 1979 Sanchez, Rotondo, Escobet, Puig, Saludes, Quevedo (b0190) 2019; 356 Qu, Zhao (b0185) 2020; 14 Lin, Lam, Chen, Shu, Wu (b0130) 2017; 64 Pitre, Jilkov, Li (b0180) 2005; vol. 5809 Ahn, Shi, Shmaliy, Liu (b0005) 2019; 5 Ge, Han, Zhang, Ding, Yang (b0060) 2019; 50 Ge, Han, Zhong, Zhang (b0065) 2019; 109 Guan, Ge (b0075) 2017; 4 Li, Yang, Xia, Yang (b0100) 2019; 13 Li, Yang (b0125) 2020; 515 Sun, Peng, Wang, Tian (b0195) 2019; 13 Wang, Wang, Shen, Alsaadi (b0205) 2018; 355 Du, Li, Li, Chen, Fei, Wu (b0035) 2019; 49 Hu, Wang, Han, Liu (b0085) 2018; 87 Xie, Peng, Yang, Kong, Zhang (b0210) 2019 Ding, Wang, Ho, Wei (b0025) 2017; 78 Murguia, Ruths (b0170) 2019; 13 Li, Yang (b0120) 2020; 357 Yang, Yang, Shi (b0215) 2018; 12 Lin, Lam, Wang, Lam (b0135) 2019; 109 N. Hashemi, J. Ruths, Co-design for performance and security: Geometric tools, https://arxiv.org/abs/2006.08739, 2020. Ding, Li, Quevedo, Dey, Shi (b0030) 2017; 78 filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. Li, Shi, Cheng, Chen, Quevedo (b0110) 2015; 60 Mazor, Averbuch, Bar-Shalom, Dayan (b0160) 1998; 34 Gu, Zhu, Zhang, Yu (b0070) 2020; 14 Ge, Yue, Xie, Deng, Dou (b0050) 2019 Guan (10.1016/j.ins.2020.08.124_b0075) 2017; 4 Liu (10.1016/j.ins.2020.08.124_b0155) 2019; 356 Murguia (10.1016/j.ins.2020.08.124_b0170) 2019; 13 Zhang (10.1016/j.ins.2020.08.124_b0225) 2017; 19 Ding (10.1016/j.ins.2020.08.124_b0030) 2017; 78 Anderson (10.1016/j.ins.2020.08.124_b0010) 1979 Lin (10.1016/j.ins.2020.08.124_b0145) 2017; 62 Lin (10.1016/j.ins.2020.08.124_b0140) 2018; 90 Eustace (10.1016/j.ins.2020.08.124_b0040) 1994; 116 Li (10.1016/j.ins.2020.08.124_b0105) 2016; 4 Kotecha (10.1016/j.ins.2020.08.124_b0095) 2003; 51 Sun (10.1016/j.ins.2020.08.124_b0195) 2019; 13 Lin (10.1016/j.ins.2020.08.124_b0135) 2019; 109 Li (10.1016/j.ins.2020.08.124_b0100) 2019; 13 Yang (10.1016/j.ins.2020.08.124_b0215) 2018; 12 Pitre (10.1016/j.ins.2020.08.124_b0180) 2005; vol. 5809 Qu (10.1016/j.ins.2020.08.124_b0185) 2020; 14 Mazor (10.1016/j.ins.2020.08.124_b0160) 1998; 34 Fawzi (10.1016/j.ins.2020.08.124_b0045) 2014; 59 Du (10.1016/j.ins.2020.08.124_b0035) 2019; 49 Li (10.1016/j.ins.2020.08.124_b0125) 2020; 515 Hu (10.1016/j.ins.2020.08.124_b0085) 2018; 87 Oke (10.1016/j.ins.2020.08.124_b0175) 2007 Bar-Shalom (10.1016/j.ins.2020.08.124_b0015) 2009; 29 Wang (10.1016/j.ins.2020.08.124_b0200) 2017; 27 Chen (10.1016/j.ins.2020.08.124_b0020) 2019 10.1016/j.ins.2020.08.124_b0080 Ge (10.1016/j.ins.2020.08.124_b0065) 2019; 109 Li (10.1016/j.ins.2020.08.124_b0115) 2019; 481 Wang (10.1016/j.ins.2020.08.124_b0205) 2018; 355 Zhang (10.1016/j.ins.2020.08.124_b0220) 2015; 60 Ding (10.1016/j.ins.2020.08.124_b0025) 2017; 78 Ahn (10.1016/j.ins.2020.08.124_b0005) 2019; 5 Xie (10.1016/j.ins.2020.08.124_b0210) 2019 Ge (10.1016/j.ins.2020.08.124_b0055) 2020; 512 Gu (10.1016/j.ins.2020.08.124_b0070) 2020; 14 Ge (10.1016/j.ins.2020.08.124_b0060) 2019; 50 Mo (10.1016/j.ins.2020.08.124_b0165) 2015; 61 Lin (10.1016/j.ins.2020.08.124_b0130) 2017; 64 Li (10.1016/j.ins.2020.08.124_b0110) 2015; 60 Lin (10.1016/j.ins.2020.08.124_b0150) 2016; 61 Sanchez (10.1016/j.ins.2020.08.124_b0190) 2019; 356 Ge (10.1016/j.ins.2020.08.124_b0050) 2019 10.1016/j.ins.2020.08.124_b0090 Li (10.1016/j.ins.2020.08.124_b0120) 2020; 357 |
References_xml | – volume: 13 start-page: 1051 year: 2019 end-page: 1061 ident: b0170 article-title: On model-based detectors for linear time-invariant stochastic systems under sensor attacks publication-title: IET Control Theory & Applications – volume: 59 start-page: 1454 year: 2014 end-page: 1467 ident: b0045 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Transactions on Automatic control – volume: 116 start-page: 178 year: 1994 end-page: 183 ident: b0040 article-title: Fault signatures obtained from fault implant tests on an f404 engine publication-title: Journal of Engineering for Gas Turbines and Power – volume: 13 start-page: 823 year: 2019 end-page: 831 ident: b0100 article-title: State estimation for linear systems with unknown input and random false data injection attack publication-title: IET Control Theory & Applications – volume: 90 start-page: 81 year: 2018 end-page: 90 ident: b0140 article-title: On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment publication-title: Automatica – volume: 64 start-page: 928 year: 2017 end-page: 943 ident: b0130 article-title: Interacting multiple model estimator for networked control systems: stability, convergence, and performance publication-title: IEEE Transactions on Automatic Control – volume: 481 start-page: 474 year: 2019 end-page: 490 ident: b0115 article-title: Optimal stealthy false data injection attacks in cyber-physical systems publication-title: Information Sciences – reference: filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019. – start-page: 1 year: 2007 end-page: 6 ident: b0175 article-title: Detecting denial of service attacks with Bayesian classifiers and the random neural network publication-title: 2007 IEEE International Fuzzy Systems Conference – year: 2019 ident: b0210 article-title: A novel trust-based false data detection method for power systems under false data injection attacks publication-title: Journal of the Franklin Institute – volume: 49 start-page: 1698 year: 2019 end-page: 1711 ident: b0035 article-title: ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems – volume: 29 start-page: 82 year: 2009 end-page: 100 ident: b0015 article-title: The probabilistic data association filter publication-title: IEEE Control Systems Magazine – volume: 5 start-page: 27 year: 2019 end-page: 36 ident: b0005 article-title: Bayesian state estimation for Markovian jump systems: employing recursive steps and pseudocodes publication-title: IEEE Systems, Man, and Cybernetics Magazine – year: 1979 ident: b0010 article-title: Optimal Filtering – volume: 4 start-page: 632 year: 2016 end-page: 642 ident: b0105 article-title: SINR-based DoS attack on remote state estimation: a game-theoretic approach publication-title: IEEE Transactions on Control of Network Systems – volume: 78 start-page: 194 year: 2017 end-page: 201 ident: b0030 article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks publication-title: Automatica – volume: 61 start-page: 2618 year: 2015 end-page: 2624 ident: b0165 article-title: On the performance degradation of cyber-physical systems under stealthy integrity attacks publication-title: IEEE Transactions on Automatic Control – volume: 60 start-page: 3023 year: 2015 end-page: 3028 ident: b0220 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Transactions on Automatic Control – volume: 515 start-page: 352 year: 2020 end-page: 364 ident: b0125 article-title: Worst-case publication-title: Information Sciences – volume: 19 start-page: 1295 year: 2017 end-page: 1305 ident: b0225 article-title: Testing and defending methods against DoS attack in state estimation publication-title: Asian Journal of Control – volume: 51 start-page: 2602 year: 2003 end-page: 2612 ident: b0095 article-title: Gaussian sum particle filtering publication-title: IEEE Transactions on Signal Processing – reference: S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient – volume: 62 start-page: 4564 year: 2017 end-page: 4579 ident: b0145 article-title: Optimal estimation and control for lossy network: stability, convergence, and performance publication-title: IEEE Transactions on Automatic Control – volume: 12 start-page: 1244 year: 2018 end-page: 1253 ident: b0215 article-title: DoS attack in centralised sensor network against state estimation publication-title: IET Control Theory & Applications – year: 2019 ident: b0050 article-title: A unified modeling of muti-sources cyber-attacks with uncertainties for cps security control publication-title: Journal of the Franklin Institute – volume: 356 start-page: 10260 year: 2019 end-page: 10276 ident: b0155 article-title: Distributed event-triggered control for networked control systems with stochastic cyber-attacks publication-title: Journal of the Franklin Institute – volume: 34 start-page: 103 year: 1998 end-page: 123 ident: b0160 article-title: Interacting multiple model methods in target tracking: a survey publication-title: IEEE Transactions on Aerospace and Electronic Systems – volume: 4 start-page: 48 year: 2017 end-page: 59 ident: b0075 article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks publication-title: IEEE Transactions on Signal and Information Processing over Networks – volume: 87 start-page: 176 year: 2018 end-page: 183 ident: b0085 article-title: State estimation under false data injection attacks: security analysis and system protection publication-title: Automatica – reference: N. Hashemi, J. Ruths, Co-design for performance and security: Geometric tools, https://arxiv.org/abs/2006.08739, 2020. – volume: 109 year: 2019 ident: b0065 article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica – volume: 14 start-page: 1452 year: 2020 end-page: 1466 ident: b0070 article-title: Sensor attack detection for cyber-physical systems based on frequency domain partition publication-title: IET Control Theory & Applications – volume: 27 start-page: 1194 year: 2017 end-page: 1208 ident: b0200 article-title: Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks publication-title: International Journal of Robust and Nonlinear Control – volume: 355 start-page: 406 year: 2018 end-page: 420 ident: b0205 article-title: Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks publication-title: Journal of the Franklin Institute – year: 2019 ident: b0020 article-title: Distributed resilient filtering for power systems subject to denial-of-service attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems – volume: 357 start-page: 1832 year: 2020 end-page: 1852 ident: b0120 article-title: Optimal deception attacks against remote state estimation in cyber-physical systems publication-title: Journal of the Franklin Institute – volume: 512 start-page: 1592 year: 2020 end-page: 1605 ident: b0055 article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks publication-title: Information Sciences – volume: 14 start-page: 1438 year: 2020 end-page: 1444 ident: b0185 article-title: Stabilisation of switched linear systems under denial of service publication-title: IET Control Theory & Applications – volume: 109 year: 2019 ident: b0135 article-title: State estimation over non-acknowledgment networks with Markovian packet dropouts publication-title: Automatica – volume: 356 start-page: 2798 year: 2019 end-page: 2824 ident: b0190 article-title: Detection of replay attacks in cyber-physical systems using a frequency-based signature publication-title: Journal of the Franklin Institute – volume: 78 start-page: 231 year: 2017 end-page: 240 ident: b0025 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica – volume: vol. 5809 start-page: 549 year: 2005 end-page: 560 ident: b0180 article-title: A comparative study of multiple-model algorithms for maneuvering target tracking publication-title: Signal Processing, Sensor Fusion, and Target Recognition XIV – volume: 13 start-page: 2521 year: 2019 end-page: 2528 ident: b0195 article-title: Output-based resilient event-triggered control for networked control systems under denial of service attacks publication-title: IET Control Theory & Applications – volume: 61 start-page: 1794 year: 2016 end-page: 1809 ident: b0150 article-title: Optimal estimation in UDP-like networked control systems with intermittent inputs: stability analysis and suboptimal filter design publication-title: IEEE Transactions on Automatic Control – volume: 60 start-page: 2831 year: 2015 end-page: 2836 ident: b0110 article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach publication-title: IEEE Transactions on Automatic Control – volume: 50 start-page: 1306 year: 2019 end-page: 1320 ident: b0060 article-title: Distributed event-triggered estimation over sensor networks: a survey publication-title: IEEE Transactions on Cybernetics – volume: 4 start-page: 48 issue: 1 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0075 article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks publication-title: IEEE Transactions on Signal and Information Processing over Networks doi: 10.1109/TSIPN.2017.2749959 – volume: 59 start-page: 1454 issue: 6 year: 2014 ident: 10.1016/j.ins.2020.08.124_b0045 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Transactions on Automatic control doi: 10.1109/TAC.2014.2303233 – volume: 12 start-page: 1244 issue: 9 year: 2018 ident: 10.1016/j.ins.2020.08.124_b0215 article-title: DoS attack in centralised sensor network against state estimation publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2017.0819 – year: 2019 ident: 10.1016/j.ins.2020.08.124_b0020 article-title: Distributed resilient filtering for power systems subject to denial-of-service attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems doi: 10.1109/TSMC.2019.2905253 – volume: 355 start-page: 406 issue: 1 year: 2018 ident: 10.1016/j.ins.2020.08.124_b0205 article-title: Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2017.11.010 – volume: 49 start-page: 1698 issue: 8 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0035 article-title: ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems doi: 10.1109/TSMC.2019.2896292 – volume: 60 start-page: 3023 issue: 11 year: 2015 ident: 10.1016/j.ins.2020.08.124_b0220 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2015.2409905 – volume: 14 start-page: 1452 issue: 11 year: 2020 ident: 10.1016/j.ins.2020.08.124_b0070 article-title: Sensor attack detection for cyber-physical systems based on frequency domain partition publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2019.1140 – volume: 34 start-page: 103 issue: 1 year: 1998 ident: 10.1016/j.ins.2020.08.124_b0160 article-title: Interacting multiple model methods in target tracking: a survey publication-title: IEEE Transactions on Aerospace and Electronic Systems doi: 10.1109/7.640267 – volume: 109 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0065 article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica doi: 10.1016/j.automatica.2019.108557 – ident: 10.1016/j.ins.2020.08.124_b0080 – volume: 27 start-page: 1194 issue: 7 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0200 article-title: Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks publication-title: International Journal of Robust and Nonlinear Control doi: 10.1002/rnc.3623 – year: 2019 ident: 10.1016/j.ins.2020.08.124_b0210 article-title: A novel trust-based false data detection method for power systems under false data injection attacks publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2018.10.030 – volume: 13 start-page: 1051 issue: 8 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0170 article-title: On model-based detectors for linear time-invariant stochastic systems under sensor attacks publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2018.5970 – start-page: 1 year: 2007 ident: 10.1016/j.ins.2020.08.124_b0175 article-title: Detecting denial of service attacks with Bayesian classifiers and the random neural network – volume: 61 start-page: 2618 issue: 9 year: 2015 ident: 10.1016/j.ins.2020.08.124_b0165 article-title: On the performance degradation of cyber-physical systems under stealthy integrity attacks publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2015.2498708 – volume: 51 start-page: 2602 issue: 10 year: 2003 ident: 10.1016/j.ins.2020.08.124_b0095 article-title: Gaussian sum particle filtering publication-title: IEEE Transactions on Signal Processing doi: 10.1109/TSP.2003.816754 – volume: 356 start-page: 10260 issue: 17 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0155 article-title: Distributed event-triggered control for networked control systems with stochastic cyber-attacks publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2018.01.048 – volume: 515 start-page: 352 year: 2020 ident: 10.1016/j.ins.2020.08.124_b0125 article-title: Worst-case ∊-stealthy false data injection attacks in cyber-physical systems publication-title: Information Sciences doi: 10.1016/j.ins.2019.12.029 – volume: 64 start-page: 928 issue: 3 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0130 article-title: Interacting multiple model estimator for networked control systems: stability, convergence, and performance publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2018.2831620 – volume: 61 start-page: 1794 issue: 7 year: 2016 ident: 10.1016/j.ins.2020.08.124_b0150 article-title: Optimal estimation in UDP-like networked control systems with intermittent inputs: stability analysis and suboptimal filter design publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2015.2479195 – volume: 357 start-page: 1832 issue: 3 year: 2020 ident: 10.1016/j.ins.2020.08.124_b0120 article-title: Optimal deception attacks against remote state estimation in cyber-physical systems publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2019.11.001 – volume: 62 start-page: 4564 issue: 9 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0145 article-title: Optimal estimation and control for lossy network: stability, convergence, and performance publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2017.2672729 – ident: 10.1016/j.ins.2020.08.124_b0090 doi: 10.1109/TSMC.2019.2896249 – volume: 116 start-page: 178 issue: 1 year: 1994 ident: 10.1016/j.ins.2020.08.124_b0040 article-title: Fault signatures obtained from fault implant tests on an f404 engine publication-title: Journal of Engineering for Gas Turbines and Power doi: 10.1115/1.2906789 – volume: 481 start-page: 474 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0115 article-title: Optimal stealthy false data injection attacks in cyber-physical systems publication-title: Information Sciences doi: 10.1016/j.ins.2019.01.001 – volume: vol. 5809 start-page: 549 year: 2005 ident: 10.1016/j.ins.2020.08.124_b0180 article-title: A comparative study of multiple-model algorithms for maneuvering target tracking – volume: 13 start-page: 2521 issue: 16 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0195 article-title: Output-based resilient event-triggered control for networked control systems under denial of service attacks publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2018.5167 – volume: 90 start-page: 81 year: 2018 ident: 10.1016/j.ins.2020.08.124_b0140 article-title: On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment publication-title: Automatica doi: 10.1016/j.automatica.2017.12.059 – year: 1979 ident: 10.1016/j.ins.2020.08.124_b0010 – volume: 78 start-page: 194 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0030 article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.020 – volume: 87 start-page: 176 year: 2018 ident: 10.1016/j.ins.2020.08.124_b0085 article-title: State estimation under false data injection attacks: security analysis and system protection publication-title: Automatica doi: 10.1016/j.automatica.2017.09.028 – volume: 512 start-page: 1592 year: 2020 ident: 10.1016/j.ins.2020.08.124_b0055 article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks publication-title: Information Sciences doi: 10.1016/j.ins.2019.10.057 – volume: 13 start-page: 823 issue: 6 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0100 article-title: State estimation for linear systems with unknown input and random false data injection attack publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2018.5954 – volume: 4 start-page: 632 issue: 3 year: 2016 ident: 10.1016/j.ins.2020.08.124_b0105 article-title: SINR-based DoS attack on remote state estimation: a game-theoretic approach publication-title: IEEE Transactions on Control of Network Systems doi: 10.1109/TCNS.2016.2549640 – volume: 29 start-page: 82 issue: 6 year: 2009 ident: 10.1016/j.ins.2020.08.124_b0015 article-title: The probabilistic data association filter publication-title: IEEE Control Systems Magazine doi: 10.1109/MCS.2009.934469 – year: 2019 ident: 10.1016/j.ins.2020.08.124_b0050 article-title: A unified modeling of muti-sources cyber-attacks with uncertainties for cps security control publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2019.01.006 – volume: 50 start-page: 1306 issue: 3 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0060 article-title: Distributed event-triggered estimation over sensor networks: a survey publication-title: IEEE Transactions on Cybernetics doi: 10.1109/TCYB.2019.2917179 – volume: 60 start-page: 2831 issue: 10 year: 2015 ident: 10.1016/j.ins.2020.08.124_b0110 article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2015.2461851 – volume: 356 start-page: 2798 issue: 5 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0190 article-title: Detection of replay attacks in cyber-physical systems using a frequency-based signature publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2019.01.005 – volume: 5 start-page: 27 issue: 2 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0005 article-title: Bayesian state estimation for Markovian jump systems: employing recursive steps and pseudocodes publication-title: IEEE Systems, Man, and Cybernetics Magazine doi: 10.1109/MSMC.2018.2882145 – volume: 78 start-page: 231 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0025 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.026 – volume: 14 start-page: 1438 issue: 11 year: 2020 ident: 10.1016/j.ins.2020.08.124_b0185 article-title: Stabilisation of switched linear systems under denial of service publication-title: IET Control Theory & Applications doi: 10.1049/iet-cta.2019.0914 – volume: 109 year: 2019 ident: 10.1016/j.ins.2020.08.124_b0135 article-title: State estimation over non-acknowledgment networks with Markovian packet dropouts publication-title: Automatica doi: 10.1016/j.automatica.2019.06.036 – volume: 19 start-page: 1295 issue: 4 year: 2017 ident: 10.1016/j.ins.2020.08.124_b0225 article-title: Testing and defending methods against DoS attack in state estimation publication-title: Asian Journal of Control doi: 10.1002/asjc.1441 |
SSID | ssj0004766 |
Score | 2.5076437 |
Snippet | We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 943 |
SubjectTerms | Approximate estimator Cyber-attacks Cyber-physical systems Optimal estimator Security |
Title | Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis |
URI | https://dx.doi.org/10.1016/j.ins.2020.08.124 |
Volume | 546 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7M7aIH0ak4dZKDeBCqbdqmi7chjqnoRQe71SRNYKJ1zAp68W83r03dBPXgrS3vQXlJ3o_kfV8ADmLNkZA68wxLbIESJsIT2hdeFjBqo5NRvNzKvr5hw1F0OY7HDTirsTDYVul8f-XTS2_tvpw4a55MJxPE-NIyI6ZIucKRULJFQ87iJrT6F1fDmzk8MqmOLLFSQoX6cLNs85rkSNpNfSTyDGj0c3haCDmDNVh1uSLpV7-zDg2dt2FlgUGwDV2HOyCHxAGL0NDErdgNuC_30zUpcUMEGTWchJUlFYvzC0Ec2Yw8Td50RtS71DNPFAVi70_Jrbvejog8I9M5yMC-V2QmmzAanN-dDT13qYKnKE8Kj1PJdWYLYhNLHjLFuM25pDEqsqmBNoEIlMFVbrSvekzoQAuZ2MeMGUmjWIZb0Myfc70NhKK7SGyBiYQ6iNVLIhHKXiJUGGrFww74tS1T5RjH8eKLx7RuLXtIrflTNH_q91Jr_g4cfalMK7qNv4SjeoDSb3MmteHgd7Wd_6ntwjLFfhbs2GZ70Cxmr7prE5JC7sPS8Uew76bdJ90c380 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5DD-pBdCr-NgfxIFTbNG0WbzIcU6cXN9gtJmkCE61jVtCLf7t5beomqAdvbXmB8pq8H833fUHoMDEcBKmzwKbMNSgxk4E0oQyyKCUuO1nNy1_ZN7dpd0Cvhsmwgdo1FwZglT72VzG9jNb-yan35ul4NAKOLykrYgKSKxwEJedpEjPA9Z18THEelFUbltAngXm9tVmCvEY5SHaTEGQ8I0J_Tk4zCaezgpZ9pYjPq5dZRQ2TN9HSjH5gE-151gE-wp5WBG7Gfr2uofvyb7rBJWsIg56Gt3C2uNJwfsHAIpvgp9GbybB-V2YSyKIA5v0ZvvOH22GZZ3g8pRi4-0rKZB0NOhf9djfwRyoEmnBWBJwobjLXDttE8TjVKXcVl7JWU1cYGBvJSFtY49aEupVKExmpmLvMUqsITVS8geby59xsIkwgWDDXXoKcDjD1GJWxajGp49hoHm-hsPal0F5vHI69eBQ1sOxBOPcLcL8IW8K5fwsdfw0ZV2IbfxnT-gOJbzNGuGTw-7Dt_w07QAvd_k1P9C5vr3fQIgFkC2C30100V0xezZ4rTQq1X069T8BK4Jg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+state+estimation+for+systems+under+mixed+cyber-attacks%3A+Security+and+performance+analysis&rft.jtitle=Information+sciences&rft.au=Lin%2C+Hong&rft.au=Lam%2C+James&rft.au=Wang%2C+Zheng&rft.date=2021-02-06&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.eissn=1872-6291&rft.volume=546&rft.spage=943&rft.epage=960&rft_id=info:doi/10.1016%2Fj.ins.2020.08.124&rft.externalDocID=S0020025520308902 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon |