Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis

We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only...

Full description

Saved in:
Bibliographic Details
Published inInformation sciences Vol. 546; pp. 943 - 960
Main Authors Lin, Hong, Lam, James, Wang, Zheng
Format Journal Article
LanguageEnglish
Published Elsevier Inc 06.02.2021
Subjects
Online AccessGet full text
ISSN0020-0255
1872-6291
DOI10.1016/j.ins.2020.08.124

Cover

Loading…
Abstract We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyber-attacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks.
AbstractList We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks. Cyber-attacks compromise the security and privacy of sensor and communication information. Unlike systems subject to only one single type of attacks (either DoS or FDI attacks), systems under mixed attacks will make the implementation of the optimal state estimation infeasible. We first obtain the optimal estimator for CPSs under mixed cyber-attacks. The optimal estimator consists of an exponentially growing number of components, and thus its computation effort exponentially grows in time. To efficiently compute the optimal estimate, we propose an approximate estimator by using the generalized pseudo-Bayesian algorithm. We prove that for a stable system, both the optimal estimator and the proposed approximate estimator are secure; and theoretically characterize the boundedness of the distance between the optimal and the approximate estimates. A simulation example is presented to illustrate the effectiveness of the proposed methods in guaranteeing secure state estimation when the privacy of sensor and communication information is at the risk of mixed cyber-attacks.
Author Lin, Hong
Lam, James
Wang, Zheng
Author_xml – sequence: 1
  givenname: Hong
  orcidid: 0000-0003-2207-2294
  surname: Lin
  fullname: Lin, Hong
  organization: Institute of Intelligence Science and Engineering, Shenzhen Polytechnic, Shenzhen 518055, China
– sequence: 2
  givenname: James
  orcidid: 0000-0002-0294-0640
  surname: Lam
  fullname: Lam, James
  email: james.lam@hku.hk
  organization: Department of Mechanical Engineering, The University of Hong Kong, Pokfulam, Hong Kong
– sequence: 3
  givenname: Zheng
  surname: Wang
  fullname: Wang, Zheng
  email: zwangski@hku.hk, wangz@sustech.edu.cn
  organization: Department of Mechanical Engineering, The University of Hong Kong, Pokfulam, Hong Kong
BookMark eNp9kMtOwzAQAC1UJNrCB3DzDyTYbuIkcEIVL6kSB-BsHGctuTRO5XUR-XvclhOHnrzWalaamZGJHzwQcs1ZzhmXN-vcecwFEyxndc5FcUamvK5EJkXDJ2TK0iZjoiwvyAxxzRgrKimn5PMNzC4AxagjUMDoeh3d4KkdAsURI_RId76DQHv3Ax01Ywsh0zFq84W39IC7OFLtO7qFkLBeewPprzcjOrwk51ZvEK7-3jn5eHx4Xz5nq9enl-X9KjOiqWLWiLaBriqELdtmIY1s6pK31pqCNwws19zYeiGEBWZqqYGDbqs0dtK2oijbxZzw410TBsQAVm1Dcgmj4kztE6m1SonUPpFitUqJElP9Y4yLB_0YtNucJO-OJCSlbwdBoXGQvDsXwETVDe4E_Qu6rIYD
CitedBy_id crossref_primary_10_1109_JAS_2024_124257
crossref_primary_10_1049_cth2_12172
crossref_primary_10_1002_rnc_6800
crossref_primary_10_1109_TFUZZ_2023_3239930
crossref_primary_10_1016_j_jfranklin_2021_11_002
crossref_primary_10_3390_s23010335
crossref_primary_10_1016_j_ins_2021_07_083
crossref_primary_10_1007_s00202_023_01978_1
crossref_primary_10_1109_TCNS_2022_3233927
crossref_primary_10_1080_00207721_2021_2005178
crossref_primary_10_1016_j_ins_2024_120584
crossref_primary_10_1016_j_ins_2025_122002
crossref_primary_10_1109_ACCESS_2022_3227076
crossref_primary_10_1002_asjc_2962
crossref_primary_10_1109_TSMC_2024_3354883
crossref_primary_10_1016_j_jfranklin_2024_107264
crossref_primary_10_1109_TSIPN_2021_3139351
crossref_primary_10_1016_j_ins_2021_08_098
crossref_primary_10_1109_TII_2022_3193955
crossref_primary_10_1016_j_jfranklin_2022_05_009
crossref_primary_10_1049_cth2_12261
crossref_primary_10_1016_j_nahs_2023_101445
crossref_primary_10_1109_JSEN_2023_3306080
crossref_primary_10_1109_TCNS_2022_3203903
crossref_primary_10_1109_TCYB_2024_3454053
crossref_primary_10_1016_j_isatra_2024_10_025
crossref_primary_10_1049_cth2_12703
crossref_primary_10_1109_TSMC_2022_3227607
crossref_primary_10_1016_j_ins_2024_120251
crossref_primary_10_1109_TICPS_2024_3435648
crossref_primary_10_1016_j_ins_2023_01_142
crossref_primary_10_1016_j_ins_2023_119452
crossref_primary_10_1016_j_ins_2023_119172
crossref_primary_10_1109_TNSE_2024_3491823
crossref_primary_10_1109_TAC_2023_3298527
crossref_primary_10_1109_TSMC_2023_3330946
Cites_doi 10.1109/TSIPN.2017.2749959
10.1109/TAC.2014.2303233
10.1049/iet-cta.2017.0819
10.1109/TSMC.2019.2905253
10.1016/j.jfranklin.2017.11.010
10.1109/TSMC.2019.2896292
10.1109/TAC.2015.2409905
10.1049/iet-cta.2019.1140
10.1109/7.640267
10.1016/j.automatica.2019.108557
10.1002/rnc.3623
10.1016/j.jfranklin.2018.10.030
10.1049/iet-cta.2018.5970
10.1109/TAC.2015.2498708
10.1109/TSP.2003.816754
10.1016/j.jfranklin.2018.01.048
10.1016/j.ins.2019.12.029
10.1109/TAC.2018.2831620
10.1109/TAC.2015.2479195
10.1016/j.jfranklin.2019.11.001
10.1109/TAC.2017.2672729
10.1109/TSMC.2019.2896249
10.1115/1.2906789
10.1016/j.ins.2019.01.001
10.1049/iet-cta.2018.5167
10.1016/j.automatica.2017.12.059
10.1016/j.automatica.2016.12.020
10.1016/j.automatica.2017.09.028
10.1016/j.ins.2019.10.057
10.1049/iet-cta.2018.5954
10.1109/TCNS.2016.2549640
10.1109/MCS.2009.934469
10.1016/j.jfranklin.2019.01.006
10.1109/TCYB.2019.2917179
10.1109/TAC.2015.2461851
10.1016/j.jfranklin.2019.01.005
10.1109/MSMC.2018.2882145
10.1016/j.automatica.2016.12.026
10.1049/iet-cta.2019.0914
10.1016/j.automatica.2019.06.036
10.1002/asjc.1441
ContentType Journal Article
Copyright 2020 Elsevier Inc.
Copyright_xml – notice: 2020 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.ins.2020.08.124
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Library & Information Science
EISSN 1872-6291
EndPage 960
ExternalDocumentID 10_1016_j_ins_2020_08_124
S0020025520308902
GroupedDBID --K
--M
--Z
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABAOU
ABBOA
ABFNM
ABJNI
ABMAC
ABUCO
ABYKQ
ACAZW
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGVJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
ARUGR
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
IHE
J1W
JJJVA
KOM
LG9
LY1
M41
MHUIS
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SSB
SSD
SST
SSV
SSW
SSZ
T5K
TN5
TWZ
WH7
XPP
ZMT
~02
~G-
1OL
29I
AAAKG
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABEFU
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
ADVLN
AEIPS
AEUPX
AFFNX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
BNPGV
CITATION
EJD
FEDTE
FGOYB
HLZ
HVGLF
HZ~
H~9
R2-
RIG
SBC
SDS
SEW
SSH
UHS
WUQ
YYP
ZY4
ID FETCH-LOGICAL-c297t-92b9ed742f5b936c69851bffc4190ef1a1cf8322fe0c86ae1eab70c8d6fb245b3
IEDL.DBID AIKHN
ISSN 0020-0255
IngestDate Tue Jul 01 01:26:43 EDT 2025
Thu Apr 24 23:10:32 EDT 2025
Fri Feb 23 02:46:43 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cyber-physical systems
Cyber-attacks
Security
Optimal estimator
Approximate estimator
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c297t-92b9ed742f5b936c69851bffc4190ef1a1cf8322fe0c86ae1eab70c8d6fb245b3
ORCID 0000-0003-2207-2294
0000-0002-0294-0640
PageCount 18
ParticipantIDs crossref_primary_10_1016_j_ins_2020_08_124
crossref_citationtrail_10_1016_j_ins_2020_08_124
elsevier_sciencedirect_doi_10_1016_j_ins_2020_08_124
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-02-06
PublicationDateYYYYMMDD 2021-02-06
PublicationDate_xml – month: 02
  year: 2021
  text: 2021-02-06
  day: 06
PublicationDecade 2020
PublicationTitle Information sciences
PublicationYear 2021
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References Liu, Tian, Xie, Lin (b0155) 2019; 356
Oke, Loukas, Gelenbe (b0175) 2007
Ge, Han, Zhang, Ding, Yang (b0055) 2020; 512
Kotecha, Djuric (b0095) 2003; 51
Fawzi, Tabuada, Diggavi (b0045) 2014; 59
Lin, Su, Shi, Shu, Lu, Wu (b0145) 2017; 62
Lin, Su, Shu, Wu, Xu (b0150) 2016; 61
Li, Yang (b0115) 2019; 481
Mo, Sinopoli (b0165) 2015; 61
Chen, Ding, Dong, Wei (b0020) 2019
S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient
Lin, Su, Chen, Shu, Lu, Wu (b0140) 2018; 90
Wang, Wang, Shen, Alsaadi (b0200) 2017; 27
Li, Quevedo, Dey, Shi (b0105) 2016; 4
Bar-Shalom, Daum, Huang (b0015) 2009; 29
Zhang, Cheng, Shi, Chen (b0220) 2015; 60
Eustace, Woodyatt, Merrington, Runacres (b0040) 1994; 116
Zhang, Qi, Zhou, Zhang, Sun (b0225) 2017; 19
Anderson, Moore (b0010) 1979
Sanchez, Rotondo, Escobet, Puig, Saludes, Quevedo (b0190) 2019; 356
Qu, Zhao (b0185) 2020; 14
Lin, Lam, Chen, Shu, Wu (b0130) 2017; 64
Pitre, Jilkov, Li (b0180) 2005; vol. 5809
Ahn, Shi, Shmaliy, Liu (b0005) 2019; 5
Ge, Han, Zhang, Ding, Yang (b0060) 2019; 50
Ge, Han, Zhong, Zhang (b0065) 2019; 109
Guan, Ge (b0075) 2017; 4
Li, Yang, Xia, Yang (b0100) 2019; 13
Li, Yang (b0125) 2020; 515
Sun, Peng, Wang, Tian (b0195) 2019; 13
Wang, Wang, Shen, Alsaadi (b0205) 2018; 355
Du, Li, Li, Chen, Fei, Wu (b0035) 2019; 49
Hu, Wang, Han, Liu (b0085) 2018; 87
Xie, Peng, Yang, Kong, Zhang (b0210) 2019
Ding, Wang, Ho, Wei (b0025) 2017; 78
Murguia, Ruths (b0170) 2019; 13
Li, Yang (b0120) 2020; 357
Yang, Yang, Shi (b0215) 2018; 12
Lin, Lam, Wang, Lam (b0135) 2019; 109
N. Hashemi, J. Ruths, Co-design for performance and security: Geometric tools, https://arxiv.org/abs/2006.08739, 2020.
Ding, Li, Quevedo, Dey, Shi (b0030) 2017; 78
filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.
Li, Shi, Cheng, Chen, Quevedo (b0110) 2015; 60
Mazor, Averbuch, Bar-Shalom, Dayan (b0160) 1998; 34
Gu, Zhu, Zhang, Yu (b0070) 2020; 14
Ge, Yue, Xie, Deng, Dou (b0050) 2019
Guan (10.1016/j.ins.2020.08.124_b0075) 2017; 4
Liu (10.1016/j.ins.2020.08.124_b0155) 2019; 356
Murguia (10.1016/j.ins.2020.08.124_b0170) 2019; 13
Zhang (10.1016/j.ins.2020.08.124_b0225) 2017; 19
Ding (10.1016/j.ins.2020.08.124_b0030) 2017; 78
Anderson (10.1016/j.ins.2020.08.124_b0010) 1979
Lin (10.1016/j.ins.2020.08.124_b0145) 2017; 62
Lin (10.1016/j.ins.2020.08.124_b0140) 2018; 90
Eustace (10.1016/j.ins.2020.08.124_b0040) 1994; 116
Li (10.1016/j.ins.2020.08.124_b0105) 2016; 4
Kotecha (10.1016/j.ins.2020.08.124_b0095) 2003; 51
Sun (10.1016/j.ins.2020.08.124_b0195) 2019; 13
Lin (10.1016/j.ins.2020.08.124_b0135) 2019; 109
Li (10.1016/j.ins.2020.08.124_b0100) 2019; 13
Yang (10.1016/j.ins.2020.08.124_b0215) 2018; 12
Pitre (10.1016/j.ins.2020.08.124_b0180) 2005; vol. 5809
Qu (10.1016/j.ins.2020.08.124_b0185) 2020; 14
Mazor (10.1016/j.ins.2020.08.124_b0160) 1998; 34
Fawzi (10.1016/j.ins.2020.08.124_b0045) 2014; 59
Du (10.1016/j.ins.2020.08.124_b0035) 2019; 49
Li (10.1016/j.ins.2020.08.124_b0125) 2020; 515
Hu (10.1016/j.ins.2020.08.124_b0085) 2018; 87
Oke (10.1016/j.ins.2020.08.124_b0175) 2007
Bar-Shalom (10.1016/j.ins.2020.08.124_b0015) 2009; 29
Wang (10.1016/j.ins.2020.08.124_b0200) 2017; 27
Chen (10.1016/j.ins.2020.08.124_b0020) 2019
10.1016/j.ins.2020.08.124_b0080
Ge (10.1016/j.ins.2020.08.124_b0065) 2019; 109
Li (10.1016/j.ins.2020.08.124_b0115) 2019; 481
Wang (10.1016/j.ins.2020.08.124_b0205) 2018; 355
Zhang (10.1016/j.ins.2020.08.124_b0220) 2015; 60
Ding (10.1016/j.ins.2020.08.124_b0025) 2017; 78
Ahn (10.1016/j.ins.2020.08.124_b0005) 2019; 5
Xie (10.1016/j.ins.2020.08.124_b0210) 2019
Ge (10.1016/j.ins.2020.08.124_b0055) 2020; 512
Gu (10.1016/j.ins.2020.08.124_b0070) 2020; 14
Ge (10.1016/j.ins.2020.08.124_b0060) 2019; 50
Mo (10.1016/j.ins.2020.08.124_b0165) 2015; 61
Lin (10.1016/j.ins.2020.08.124_b0130) 2017; 64
Li (10.1016/j.ins.2020.08.124_b0110) 2015; 60
Lin (10.1016/j.ins.2020.08.124_b0150) 2016; 61
Sanchez (10.1016/j.ins.2020.08.124_b0190) 2019; 356
Ge (10.1016/j.ins.2020.08.124_b0050) 2019
10.1016/j.ins.2020.08.124_b0090
Li (10.1016/j.ins.2020.08.124_b0120) 2020; 357
References_xml – volume: 13
  start-page: 1051
  year: 2019
  end-page: 1061
  ident: b0170
  article-title: On model-based detectors for linear time-invariant stochastic systems under sensor attacks
  publication-title: IET Control Theory & Applications
– volume: 59
  start-page: 1454
  year: 2014
  end-page: 1467
  ident: b0045
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic control
– volume: 116
  start-page: 178
  year: 1994
  end-page: 183
  ident: b0040
  article-title: Fault signatures obtained from fault implant tests on an f404 engine
  publication-title: Journal of Engineering for Gas Turbines and Power
– volume: 13
  start-page: 823
  year: 2019
  end-page: 831
  ident: b0100
  article-title: State estimation for linear systems with unknown input and random false data injection attack
  publication-title: IET Control Theory & Applications
– volume: 90
  start-page: 81
  year: 2018
  end-page: 90
  ident: b0140
  article-title: On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment
  publication-title: Automatica
– volume: 64
  start-page: 928
  year: 2017
  end-page: 943
  ident: b0130
  article-title: Interacting multiple model estimator for networked control systems: stability, convergence, and performance
  publication-title: IEEE Transactions on Automatic Control
– volume: 481
  start-page: 474
  year: 2019
  end-page: 490
  ident: b0115
  article-title: Optimal stealthy false data injection attacks in cyber-physical systems
  publication-title: Information Sciences
– reference: filtering for event-triggered networked systems under nonperiodic DoS jamming attacks, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019.
– start-page: 1
  year: 2007
  end-page: 6
  ident: b0175
  article-title: Detecting denial of service attacks with Bayesian classifiers and the random neural network
  publication-title: 2007 IEEE International Fuzzy Systems Conference
– year: 2019
  ident: b0210
  article-title: A novel trust-based false data detection method for power systems under false data injection attacks
  publication-title: Journal of the Franklin Institute
– volume: 49
  start-page: 1698
  year: 2019
  end-page: 1711
  ident: b0035
  article-title: ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
– volume: 29
  start-page: 82
  year: 2009
  end-page: 100
  ident: b0015
  article-title: The probabilistic data association filter
  publication-title: IEEE Control Systems Magazine
– volume: 5
  start-page: 27
  year: 2019
  end-page: 36
  ident: b0005
  article-title: Bayesian state estimation for Markovian jump systems: employing recursive steps and pseudocodes
  publication-title: IEEE Systems, Man, and Cybernetics Magazine
– year: 1979
  ident: b0010
  article-title: Optimal Filtering
– volume: 4
  start-page: 632
  year: 2016
  end-page: 642
  ident: b0105
  article-title: SINR-based DoS attack on remote state estimation: a game-theoretic approach
  publication-title: IEEE Transactions on Control of Network Systems
– volume: 78
  start-page: 194
  year: 2017
  end-page: 201
  ident: b0030
  article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks
  publication-title: Automatica
– volume: 61
  start-page: 2618
  year: 2015
  end-page: 2624
  ident: b0165
  article-title: On the performance degradation of cyber-physical systems under stealthy integrity attacks
  publication-title: IEEE Transactions on Automatic Control
– volume: 60
  start-page: 3023
  year: 2015
  end-page: 3028
  ident: b0220
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Transactions on Automatic Control
– volume: 515
  start-page: 352
  year: 2020
  end-page: 364
  ident: b0125
  article-title: Worst-case
  publication-title: Information Sciences
– volume: 19
  start-page: 1295
  year: 2017
  end-page: 1305
  ident: b0225
  article-title: Testing and defending methods against DoS attack in state estimation
  publication-title: Asian Journal of Control
– volume: 51
  start-page: 2602
  year: 2003
  end-page: 2612
  ident: b0095
  article-title: Gaussian sum particle filtering
  publication-title: IEEE Transactions on Signal Processing
– reference: S. Hu, D. Yue, X. Chen, Z. Cheng, X. Xie, Resilient
– volume: 62
  start-page: 4564
  year: 2017
  end-page: 4579
  ident: b0145
  article-title: Optimal estimation and control for lossy network: stability, convergence, and performance
  publication-title: IEEE Transactions on Automatic Control
– volume: 12
  start-page: 1244
  year: 2018
  end-page: 1253
  ident: b0215
  article-title: DoS attack in centralised sensor network against state estimation
  publication-title: IET Control Theory & Applications
– year: 2019
  ident: b0050
  article-title: A unified modeling of muti-sources cyber-attacks with uncertainties for cps security control
  publication-title: Journal of the Franklin Institute
– volume: 356
  start-page: 10260
  year: 2019
  end-page: 10276
  ident: b0155
  article-title: Distributed event-triggered control for networked control systems with stochastic cyber-attacks
  publication-title: Journal of the Franklin Institute
– volume: 34
  start-page: 103
  year: 1998
  end-page: 123
  ident: b0160
  article-title: Interacting multiple model methods in target tracking: a survey
  publication-title: IEEE Transactions on Aerospace and Electronic Systems
– volume: 4
  start-page: 48
  year: 2017
  end-page: 59
  ident: b0075
  article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
– volume: 87
  start-page: 176
  year: 2018
  end-page: 183
  ident: b0085
  article-title: State estimation under false data injection attacks: security analysis and system protection
  publication-title: Automatica
– reference: N. Hashemi, J. Ruths, Co-design for performance and security: Geometric tools, https://arxiv.org/abs/2006.08739, 2020.
– volume: 109
  year: 2019
  ident: b0065
  article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
– volume: 14
  start-page: 1452
  year: 2020
  end-page: 1466
  ident: b0070
  article-title: Sensor attack detection for cyber-physical systems based on frequency domain partition
  publication-title: IET Control Theory & Applications
– volume: 27
  start-page: 1194
  year: 2017
  end-page: 1208
  ident: b0200
  article-title: Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks
  publication-title: International Journal of Robust and Nonlinear Control
– volume: 355
  start-page: 406
  year: 2018
  end-page: 420
  ident: b0205
  article-title: Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
  publication-title: Journal of the Franklin Institute
– year: 2019
  ident: b0020
  article-title: Distributed resilient filtering for power systems subject to denial-of-service attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
– volume: 357
  start-page: 1832
  year: 2020
  end-page: 1852
  ident: b0120
  article-title: Optimal deception attacks against remote state estimation in cyber-physical systems
  publication-title: Journal of the Franklin Institute
– volume: 512
  start-page: 1592
  year: 2020
  end-page: 1605
  ident: b0055
  article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
  publication-title: Information Sciences
– volume: 14
  start-page: 1438
  year: 2020
  end-page: 1444
  ident: b0185
  article-title: Stabilisation of switched linear systems under denial of service
  publication-title: IET Control Theory & Applications
– volume: 109
  year: 2019
  ident: b0135
  article-title: State estimation over non-acknowledgment networks with Markovian packet dropouts
  publication-title: Automatica
– volume: 356
  start-page: 2798
  year: 2019
  end-page: 2824
  ident: b0190
  article-title: Detection of replay attacks in cyber-physical systems using a frequency-based signature
  publication-title: Journal of the Franklin Institute
– volume: 78
  start-page: 231
  year: 2017
  end-page: 240
  ident: b0025
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
– volume: vol. 5809
  start-page: 549
  year: 2005
  end-page: 560
  ident: b0180
  article-title: A comparative study of multiple-model algorithms for maneuvering target tracking
  publication-title: Signal Processing, Sensor Fusion, and Target Recognition XIV
– volume: 13
  start-page: 2521
  year: 2019
  end-page: 2528
  ident: b0195
  article-title: Output-based resilient event-triggered control for networked control systems under denial of service attacks
  publication-title: IET Control Theory & Applications
– volume: 61
  start-page: 1794
  year: 2016
  end-page: 1809
  ident: b0150
  article-title: Optimal estimation in UDP-like networked control systems with intermittent inputs: stability analysis and suboptimal filter design
  publication-title: IEEE Transactions on Automatic Control
– volume: 60
  start-page: 2831
  year: 2015
  end-page: 2836
  ident: b0110
  article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach
  publication-title: IEEE Transactions on Automatic Control
– volume: 50
  start-page: 1306
  year: 2019
  end-page: 1320
  ident: b0060
  article-title: Distributed event-triggered estimation over sensor networks: a survey
  publication-title: IEEE Transactions on Cybernetics
– volume: 4
  start-page: 48
  issue: 1
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0075
  article-title: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
  doi: 10.1109/TSIPN.2017.2749959
– volume: 59
  start-page: 1454
  issue: 6
  year: 2014
  ident: 10.1016/j.ins.2020.08.124_b0045
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Transactions on Automatic control
  doi: 10.1109/TAC.2014.2303233
– volume: 12
  start-page: 1244
  issue: 9
  year: 2018
  ident: 10.1016/j.ins.2020.08.124_b0215
  article-title: DoS attack in centralised sensor network against state estimation
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2017.0819
– year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0020
  article-title: Distributed resilient filtering for power systems subject to denial-of-service attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
  doi: 10.1109/TSMC.2019.2905253
– volume: 355
  start-page: 406
  issue: 1
  year: 2018
  ident: 10.1016/j.ins.2020.08.124_b0205
  article-title: Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2017.11.010
– volume: 49
  start-page: 1698
  issue: 8
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0035
  article-title: ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
  doi: 10.1109/TSMC.2019.2896292
– volume: 60
  start-page: 3023
  issue: 11
  year: 2015
  ident: 10.1016/j.ins.2020.08.124_b0220
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2409905
– volume: 14
  start-page: 1452
  issue: 11
  year: 2020
  ident: 10.1016/j.ins.2020.08.124_b0070
  article-title: Sensor attack detection for cyber-physical systems based on frequency domain partition
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2019.1140
– volume: 34
  start-page: 103
  issue: 1
  year: 1998
  ident: 10.1016/j.ins.2020.08.124_b0160
  article-title: Interacting multiple model methods in target tracking: a survey
  publication-title: IEEE Transactions on Aerospace and Electronic Systems
  doi: 10.1109/7.640267
– volume: 109
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0065
  article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108557
– ident: 10.1016/j.ins.2020.08.124_b0080
– volume: 27
  start-page: 1194
  issue: 7
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0200
  article-title: Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks
  publication-title: International Journal of Robust and Nonlinear Control
  doi: 10.1002/rnc.3623
– year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0210
  article-title: A novel trust-based false data detection method for power systems under false data injection attacks
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2018.10.030
– volume: 13
  start-page: 1051
  issue: 8
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0170
  article-title: On model-based detectors for linear time-invariant stochastic systems under sensor attacks
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2018.5970
– start-page: 1
  year: 2007
  ident: 10.1016/j.ins.2020.08.124_b0175
  article-title: Detecting denial of service attacks with Bayesian classifiers and the random neural network
– volume: 61
  start-page: 2618
  issue: 9
  year: 2015
  ident: 10.1016/j.ins.2020.08.124_b0165
  article-title: On the performance degradation of cyber-physical systems under stealthy integrity attacks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2498708
– volume: 51
  start-page: 2602
  issue: 10
  year: 2003
  ident: 10.1016/j.ins.2020.08.124_b0095
  article-title: Gaussian sum particle filtering
  publication-title: IEEE Transactions on Signal Processing
  doi: 10.1109/TSP.2003.816754
– volume: 356
  start-page: 10260
  issue: 17
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0155
  article-title: Distributed event-triggered control for networked control systems with stochastic cyber-attacks
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2018.01.048
– volume: 515
  start-page: 352
  year: 2020
  ident: 10.1016/j.ins.2020.08.124_b0125
  article-title: Worst-case ∊-stealthy false data injection attacks in cyber-physical systems
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2019.12.029
– volume: 64
  start-page: 928
  issue: 3
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0130
  article-title: Interacting multiple model estimator for networked control systems: stability, convergence, and performance
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2018.2831620
– volume: 61
  start-page: 1794
  issue: 7
  year: 2016
  ident: 10.1016/j.ins.2020.08.124_b0150
  article-title: Optimal estimation in UDP-like networked control systems with intermittent inputs: stability analysis and suboptimal filter design
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2479195
– volume: 357
  start-page: 1832
  issue: 3
  year: 2020
  ident: 10.1016/j.ins.2020.08.124_b0120
  article-title: Optimal deception attacks against remote state estimation in cyber-physical systems
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2019.11.001
– volume: 62
  start-page: 4564
  issue: 9
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0145
  article-title: Optimal estimation and control for lossy network: stability, convergence, and performance
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2017.2672729
– ident: 10.1016/j.ins.2020.08.124_b0090
  doi: 10.1109/TSMC.2019.2896249
– volume: 116
  start-page: 178
  issue: 1
  year: 1994
  ident: 10.1016/j.ins.2020.08.124_b0040
  article-title: Fault signatures obtained from fault implant tests on an f404 engine
  publication-title: Journal of Engineering for Gas Turbines and Power
  doi: 10.1115/1.2906789
– volume: 481
  start-page: 474
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0115
  article-title: Optimal stealthy false data injection attacks in cyber-physical systems
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2019.01.001
– volume: vol. 5809
  start-page: 549
  year: 2005
  ident: 10.1016/j.ins.2020.08.124_b0180
  article-title: A comparative study of multiple-model algorithms for maneuvering target tracking
– volume: 13
  start-page: 2521
  issue: 16
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0195
  article-title: Output-based resilient event-triggered control for networked control systems under denial of service attacks
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2018.5167
– volume: 90
  start-page: 81
  year: 2018
  ident: 10.1016/j.ins.2020.08.124_b0140
  article-title: On stability and convergence of optimal estimation for networked control systems with dual packet losses without acknowledgment
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.12.059
– year: 1979
  ident: 10.1016/j.ins.2020.08.124_b0010
– volume: 78
  start-page: 194
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0030
  article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.020
– volume: 87
  start-page: 176
  year: 2018
  ident: 10.1016/j.ins.2020.08.124_b0085
  article-title: State estimation under false data injection attacks: security analysis and system protection
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.09.028
– volume: 512
  start-page: 1592
  year: 2020
  ident: 10.1016/j.ins.2020.08.124_b0055
  article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2019.10.057
– volume: 13
  start-page: 823
  issue: 6
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0100
  article-title: State estimation for linear systems with unknown input and random false data injection attack
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2018.5954
– volume: 4
  start-page: 632
  issue: 3
  year: 2016
  ident: 10.1016/j.ins.2020.08.124_b0105
  article-title: SINR-based DoS attack on remote state estimation: a game-theoretic approach
  publication-title: IEEE Transactions on Control of Network Systems
  doi: 10.1109/TCNS.2016.2549640
– volume: 29
  start-page: 82
  issue: 6
  year: 2009
  ident: 10.1016/j.ins.2020.08.124_b0015
  article-title: The probabilistic data association filter
  publication-title: IEEE Control Systems Magazine
  doi: 10.1109/MCS.2009.934469
– year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0050
  article-title: A unified modeling of muti-sources cyber-attacks with uncertainties for cps security control
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2019.01.006
– volume: 50
  start-page: 1306
  issue: 3
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0060
  article-title: Distributed event-triggered estimation over sensor networks: a survey
  publication-title: IEEE Transactions on Cybernetics
  doi: 10.1109/TCYB.2019.2917179
– volume: 60
  start-page: 2831
  issue: 10
  year: 2015
  ident: 10.1016/j.ins.2020.08.124_b0110
  article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2015.2461851
– volume: 356
  start-page: 2798
  issue: 5
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0190
  article-title: Detection of replay attacks in cyber-physical systems using a frequency-based signature
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2019.01.005
– volume: 5
  start-page: 27
  issue: 2
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0005
  article-title: Bayesian state estimation for Markovian jump systems: employing recursive steps and pseudocodes
  publication-title: IEEE Systems, Man, and Cybernetics Magazine
  doi: 10.1109/MSMC.2018.2882145
– volume: 78
  start-page: 231
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0025
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.026
– volume: 14
  start-page: 1438
  issue: 11
  year: 2020
  ident: 10.1016/j.ins.2020.08.124_b0185
  article-title: Stabilisation of switched linear systems under denial of service
  publication-title: IET Control Theory & Applications
  doi: 10.1049/iet-cta.2019.0914
– volume: 109
  year: 2019
  ident: 10.1016/j.ins.2020.08.124_b0135
  article-title: State estimation over non-acknowledgment networks with Markovian packet dropouts
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.06.036
– volume: 19
  start-page: 1295
  issue: 4
  year: 2017
  ident: 10.1016/j.ins.2020.08.124_b0225
  article-title: Testing and defending methods against DoS attack in state estimation
  publication-title: Asian Journal of Control
  doi: 10.1002/asjc.1441
SSID ssj0004766
Score 2.5076437
Snippet We study the state estimation for cyber-physical systems (CPSs) whose communication channels are subject to mixed denial-of-service (DoS) and false data...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 943
SubjectTerms Approximate estimator
Cyber-attacks
Cyber-physical systems
Optimal estimator
Security
Title Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
URI https://dx.doi.org/10.1016/j.ins.2020.08.124
Volume 546
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7M7aIH0ak4dZKDeBCqbdqmi7chjqnoRQe71SRNYKJ1zAp68W83r03dBPXgrS3vQXlJ3o_kfV8ADmLNkZA68wxLbIESJsIT2hdeFjBqo5NRvNzKvr5hw1F0OY7HDTirsTDYVul8f-XTS2_tvpw4a55MJxPE-NIyI6ZIucKRULJFQ87iJrT6F1fDmzk8MqmOLLFSQoX6cLNs85rkSNpNfSTyDGj0c3haCDmDNVh1uSLpV7-zDg2dt2FlgUGwDV2HOyCHxAGL0NDErdgNuC_30zUpcUMEGTWchJUlFYvzC0Ec2Yw8Td50RtS71DNPFAVi70_Jrbvejog8I9M5yMC-V2QmmzAanN-dDT13qYKnKE8Kj1PJdWYLYhNLHjLFuM25pDEqsqmBNoEIlMFVbrSvekzoQAuZ2MeMGUmjWIZb0Myfc70NhKK7SGyBiYQ6iNVLIhHKXiJUGGrFww74tS1T5RjH8eKLx7RuLXtIrflTNH_q91Jr_g4cfalMK7qNv4SjeoDSb3MmteHgd7Wd_6ntwjLFfhbs2GZ70Cxmr7prE5JC7sPS8Uew76bdJ90c380
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5DD-pBdCr-NgfxIFTbNG0WbzIcU6cXN9gtJmkCE61jVtCLf7t5beomqAdvbXmB8pq8H833fUHoMDEcBKmzwKbMNSgxk4E0oQyyKCUuO1nNy1_ZN7dpd0Cvhsmwgdo1FwZglT72VzG9jNb-yan35ul4NAKOLykrYgKSKxwEJedpEjPA9Z18THEelFUbltAngXm9tVmCvEY5SHaTEGQ8I0J_Tk4zCaezgpZ9pYjPq5dZRQ2TN9HSjH5gE-151gE-wp5WBG7Gfr2uofvyb7rBJWsIg56Gt3C2uNJwfsHAIpvgp9GbybB-V2YSyKIA5v0ZvvOH22GZZ3g8pRi4-0rKZB0NOhf9djfwRyoEmnBWBJwobjLXDttE8TjVKXcVl7JWU1cYGBvJSFtY49aEupVKExmpmLvMUqsITVS8geby59xsIkwgWDDXXoKcDjD1GJWxajGp49hoHm-hsPal0F5vHI69eBQ1sOxBOPcLcL8IW8K5fwsdfw0ZV2IbfxnT-gOJbzNGuGTw-7Dt_w07QAvd_k1P9C5vr3fQIgFkC2C30100V0xezZ4rTQq1X069T8BK4Jg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+state+estimation+for+systems+under+mixed+cyber-attacks%3A+Security+and+performance+analysis&rft.jtitle=Information+sciences&rft.au=Lin%2C+Hong&rft.au=Lam%2C+James&rft.au=Wang%2C+Zheng&rft.date=2021-02-06&rft.pub=Elsevier+Inc&rft.issn=0020-0255&rft.eissn=1872-6291&rft.volume=546&rft.spage=943&rft.epage=960&rft_id=info:doi/10.1016%2Fj.ins.2020.08.124&rft.externalDocID=S0020025520308902
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0020-0255&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0020-0255&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0020-0255&client=summon