Security estimation under Denial-of-Service attack with energy constraint
This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optim...
Saved in:
Published in | Neurocomputing (Amsterdam) Vol. 292; pp. 111 - 120 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
31.05.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 0925-2312 1872-8286 |
DOI | 10.1016/j.neucom.2018.02.086 |
Cover
Abstract | This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results. |
---|---|
AbstractList | This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results. |
Author | Zhang, Huixia Xia, Yuanqing Yang, Hongjiu Li, Li |
Author_xml | – sequence: 1 givenname: Li surname: Li fullname: Li, Li email: lili@ysu.edu.cn organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China – sequence: 2 givenname: Huixia surname: Zhang fullname: Zhang, Huixia email: huixiaz0914@163.com organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China – sequence: 3 givenname: Yuanqing surname: Xia fullname: Xia, Yuanqing email: yanghongjiu@ysu.edu.cn organization: The School of Automation, Beijing Institute of Technology, Beijing 100081, China – sequence: 4 givenname: Hongjiu surname: Yang fullname: Yang, Hongjiu email: xia_yuanqing@bit.edu.cn organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China |
BookMark | eNqFkM1OAjEUhRuDiYC-gYt5gRlv70Cn48LE4G9C4gJdN6W91SJ0TFswvL0grlzo6qy-k3O-AeuFLhBj5xwqDlxcLKpAa9OtKgQuK8AKpDhifS4bLCVK0WN9aHFcYs3xhA1SWgDwhmPbZ48zMuvo87aglP1KZ9-FYh0sxeKGgtfLsnPljOLGGyp0ztq8F58-vxUUKL5uC9OFlKP2IZ-yY6eXic5-cshe7m6fJw_l9On-cXI9LU0NIpdOCxLzkTSNtQ5dC4KjnVvTouACHFpq2rZxmgtZo0FXW3Dc1nNpBIxHLdVDdnnoNbFLKZJTxufv3fsdS8VB7aWohTpIUXspClDtpOzg0S_4I-5ex-1_2NUBo92xjaeokvEUDFkfyWRlO_93wRfgj4H5 |
CitedBy_id | crossref_primary_10_1016_j_neucom_2022_05_085 crossref_primary_10_1002_asjc_2224 crossref_primary_10_1002_int_22555 crossref_primary_10_1108_SC_03_2023_0011 crossref_primary_10_1016_j_neucom_2019_06_050 crossref_primary_10_1007_s00034_021_01910_7 crossref_primary_10_1016_j_neucom_2020_10_055 crossref_primary_10_1016_j_neucom_2019_01_099 crossref_primary_10_1088_1742_6596_1345_4_042048 crossref_primary_10_1016_j_jfranklin_2020_08_041 crossref_primary_10_1016_j_neucom_2019_11_096 crossref_primary_10_1016_j_neucom_2023_127116 crossref_primary_10_1016_j_ins_2020_06_073 crossref_primary_10_1016_j_isatra_2021_11_033 crossref_primary_10_1016_j_neucom_2020_08_007 crossref_primary_10_1109_TSMC_2023_3298646 crossref_primary_10_1016_j_energy_2019_03_009 crossref_primary_10_1016_j_jfranklin_2022_09_005 crossref_primary_10_1049_iet_cta_2020_0040 crossref_primary_10_1155_2022_4729526 crossref_primary_10_1016_j_neucom_2019_05_085 |
Cites_doi | 10.1109/TAC.2006.872840 10.1007/s12555-014-0316-9 10.1109/JSYST.2015.2460747 10.1109/JPROC.2011.2161428 10.1016/j.neucom.2016.09.009 10.2307/1969529 10.1016/j.automatica.2016.12.020 10.1109/TCST.2015.2462741 10.1109/TAC.2014.2303233 10.1016/j.automatica.2016.12.026 10.3182/20130902-3-CN-3020.00041 10.1109/TAC.2015.2461851 10.1016/j.automatica.2017.09.028 10.1109/TAC.2015.2409905 10.1016/j.ifacol.2016.10.391 10.1109/TAC.2016.2553128 10.1109/TCNS.2016.2570003 10.1016/j.automatica.2011.02.037 10.1016/j.automatica.2017.09.021 10.1016/j.neucom.2017.06.065 |
ContentType | Journal Article |
Copyright | 2018 Elsevier B.V. |
Copyright_xml | – notice: 2018 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.neucom.2018.02.086 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-8286 |
EndPage | 120 |
ExternalDocumentID | 10_1016_j_neucom_2018_02_086 S0925231218302613 |
GroupedDBID | --- --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JM 9JN AABNK AACTN AADPK AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXLA AAXUO AAYFN ABBOA ABCQJ ABFNM ABJNI ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AENEX AFKWA AFTJW AFXIZ AGHFR AGUBO AGWIK AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W KOM LG9 M41 MO0 MOBAO N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SDF SDG SDP SES SPC SPCBC SSN SSV SSZ T5K ZMT ~G- 29N AAQXK AATTM AAXKI AAYWO AAYXX ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN BNPGV CITATION FEDTE FGOYB HLZ HVGLF HZ~ R2- SBC SEW SSH WUQ XPP |
ID | FETCH-LOGICAL-c306t-fa6e6b48c7ddf2f90612dbdc926160f2de7997fa16832c2f3d0f1d3b8c60549e3 |
IEDL.DBID | AIKHN |
ISSN | 0925-2312 |
IngestDate | Tue Jul 01 01:46:33 EDT 2025 Thu Apr 24 22:51:04 EDT 2025 Fri Feb 23 02:30:23 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Cyber-physical systems State estimation Game theory Multiple-subsystem DoS attack |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c306t-fa6e6b48c7ddf2f90612dbdc926160f2de7997fa16832c2f3d0f1d3b8c60549e3 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1016_j_neucom_2018_02_086 crossref_primary_10_1016_j_neucom_2018_02_086 elsevier_sciencedirect_doi_10_1016_j_neucom_2018_02_086 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-05-31 |
PublicationDateYYYYMMDD | 2018-05-31 |
PublicationDate_xml | – month: 05 year: 2018 text: 2018-05-31 day: 31 |
PublicationDecade | 2010 |
PublicationTitle | Neurocomputing (Amsterdam) |
PublicationYear | 2018 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Li, Shi, Chen (bib0009) 2017 Song, Hu, Chen, Liu, Alsaadi, Sun (bib0023) 2018; 272 Zhang, Cheng, Shi, Chen (bib0026) 2016; 24 Nash (bib0031) 1951; 54 Wang, Wang, Han, Wei (bib0028) 2017 Hu, Wang, Han, Liu (bib0006) 2018; 87 Fawzi, Tabuada, Diggavi (bib0002) 2014; 59 Bhattacharya, Basar (bib0015) 2010 Ding, Wang, Ho, Wei (bib0007) 2017; 78 Ding, Quevedo, Dey (bib0019) 2016 Li, Lai, Qiu (bib0021) 2011 Alpcan, Basar (bib0013) 2010; 78 Gu, Cao, Badr (bib0025) 2006; 51 Guo, Shi, Johansson, Shi (bib0008) 2017; 4 Ding, Han, Xiang, Ge, Zhang (bib0001) 2017 Liu, Liu, Saddik (bib0016) 2013; 46 Ren, Wu, Dey, Shi (bib0022) 2018; 87 Amin, Schwartz, Sastry (bib0033) 2011 Mo, Kim, Brancik, Dickinson, Lee, Perrig, Sinopoli (bib0005) 2012; 100 Wang, Wang, Han, Wei (bib0029) 2017 Mo, Sinopoli (bib0004) 2012 M. Hazewinkel, Encyclopaedia of Mathematics: Supplement, 2002, Springer. Ding, Li, Quevedob, Dey, Shi (bib0018) 2017; 78 Basar, Olsder (bib0014) 1982; 19 Zhang, Qiu, Tsai (bib0003) 2017; 11 Ding, Ren, Shi (bib0020) 2016; 49 Li, Shi, Cheng, Chen, Quevedo (bib0017) 2015; 60 Yuan, Xia (bib0011) 2017 Cervin, Henningsson (bib0024) 2008 Li, Zhang, Quevedo, Lau, Dey, Shi (bib0027) 2017; 62 Shi, Cheng, Chen (bib0030) 2011; 47 Ding, Wei, Zhang (bib0010) 2017; 219 Yuan, Sun (bib0032) 2015; 13 Zhang, Shi, Cheng, Chen (bib0012) 2015; 60 Ding (10.1016/j.neucom.2018.02.086_bib0018) 2017; 78 Shi (10.1016/j.neucom.2018.02.086_bib0030) 2011; 47 Mo (10.1016/j.neucom.2018.02.086_bib0004) 2012 Li (10.1016/j.neucom.2018.02.086_bib0021) 2011 Alpcan (10.1016/j.neucom.2018.02.086_bib0013) 2010; 78 Hu (10.1016/j.neucom.2018.02.086_bib0006) 2018; 87 Li (10.1016/j.neucom.2018.02.086_bib0027) 2017; 62 Liu (10.1016/j.neucom.2018.02.086_bib0016) 2013; 46 Ding (10.1016/j.neucom.2018.02.086_bib0020) 2016; 49 Wang (10.1016/j.neucom.2018.02.086_bib0028) 2017 Zhang (10.1016/j.neucom.2018.02.086_bib0026) 2016; 24 Basar (10.1016/j.neucom.2018.02.086_bib0014) 1982; 19 Gu (10.1016/j.neucom.2018.02.086_bib0025) 2006; 51 Zhang (10.1016/j.neucom.2018.02.086_bib0012) 2015; 60 Bhattacharya (10.1016/j.neucom.2018.02.086_bib0015) 2010 Ding (10.1016/j.neucom.2018.02.086_bib0007) 2017; 78 Li (10.1016/j.neucom.2018.02.086_bib0017) 2015; 60 Amin (10.1016/j.neucom.2018.02.086_bib0033) 2011 Li (10.1016/j.neucom.2018.02.086_bib0009) 2017 Song (10.1016/j.neucom.2018.02.086_bib0023) 2018; 272 Wang (10.1016/j.neucom.2018.02.086_bib0029) 2017 Yuan (10.1016/j.neucom.2018.02.086_bib0011) 2017 Yuan (10.1016/j.neucom.2018.02.086_bib0032) 2015; 13 Ren (10.1016/j.neucom.2018.02.086_bib0022) 2018; 87 Zhang (10.1016/j.neucom.2018.02.086_bib0003) 2017; 11 Nash (10.1016/j.neucom.2018.02.086_bib0031) 1951; 54 Guo (10.1016/j.neucom.2018.02.086_bib0008) 2017; 4 Mo (10.1016/j.neucom.2018.02.086_bib0005) 2012; 100 Ding (10.1016/j.neucom.2018.02.086_bib0019) 2016 Ding (10.1016/j.neucom.2018.02.086_bib0010) 2017; 219 Cervin (10.1016/j.neucom.2018.02.086_bib0024) 2008 Ding (10.1016/j.neucom.2018.02.086_bib0001) 2017 Fawzi (10.1016/j.neucom.2018.02.086_bib0002) 2014; 59 10.1016/j.neucom.2018.02.086_bib0034 |
References_xml | – volume: 87 start-page: 176 year: 2018 end-page: 183 ident: bib0006 article-title: State estimation under false data injection attacks: Security analysis and system protection publication-title: Automatica – volume: 219 start-page: 99 year: 2017 end-page: 106 ident: bib0010 article-title: On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors publication-title: Neurocomputing – volume: 78 start-page: 194 year: 2017 end-page: 201 ident: bib0018 article-title: A multi-channel transmission schedule for remote state estimation under dos attacks publication-title: Automatica – volume: 78 start-page: 231 year: 2017 end-page: 240 ident: bib0007 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica – year: 2017 ident: bib0011 article-title: Secure filtering for stochastic nonlinear systems under multiple missing measurements and deception attacks publication-title: IET Control Theory Appl. – start-page: 4078 year: 2011 end-page: 4083 ident: bib0033 article-title: On the interdependence of reliability and security in networked control systems publication-title: Proceedings of the Conference on Decision and Control and European Control – volume: 51 start-page: 595 year: 2006 end-page: 605 ident: bib0025 article-title: Generalized LQR control and kalman filtering with relations to computations of inner-outer and spectral factorizations publication-title: IEEE Trans. Autom. Control – volume: 47 start-page: 1693 year: 2011 end-page: 1698 ident: bib0030 article-title: Sensor data scheduling for optimal state estimation with communication energy constraint publication-title: Automatica – volume: 13 start-page: 513 year: 2015 end-page: 520 ident: bib0032 article-title: Data fusion-based resilient control system under dos attacks: a game theoretic approach publication-title: Int. J. Control Autom. Syst. – volume: 11 start-page: 88 year: 2017 end-page: 95 ident: bib0003 article-title: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data publication-title: IEEE Syst. J. – year: 2017 ident: bib0028 article-title: Synchronization control for a class of discrete-time dynamical networks with packet dropouts: a coding-decoding-based approach publication-title: IEEE Trans. Cybern. – volume: 49 start-page: 169 year: 2016 end-page: 174 ident: bib0020 article-title: Deception-based sensor scheduling for remote estimation under dos attacks publication-title: IFAC-PapersOnLine – start-page: 3601 year: 2008 end-page: 3606 ident: bib0024 article-title: Scheduling of event-triggered controllers on a shared network publication-title: Proceedings of the IEEE Conference on Decision and Control – reference: M. Hazewinkel, Encyclopaedia of Mathematics: Supplement, 2002, Springer. – volume: 46 start-page: 106 year: 2013 end-page: 111 ident: bib0016 article-title: A stochastic security game for Kalman filtering in networked control systems (NCSs) under denial of service (dos) attacks publication-title: IFAC Proc. Vol. – year: 2017 ident: bib0009 article-title: Detection against linear deception attacks on multi-sensor remote state estimation publication-title: Proceedings of the IEEE Transactions on Control of Network Systems – volume: 59 start-page: 1454 year: 2014 end-page: 1467 ident: bib0002 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Trans. Autom. Control – volume: 19 start-page: 139 year: 1982 end-page: 152 ident: bib0014 article-title: Dynamic noncooperative game theory publication-title: SIAM – volume: 24 start-page: 843 year: 2016 end-page: 852 ident: bib0026 article-title: Optimal dos attack scheduling in wireless networked control system publication-title: IEEE Trans. Control Syst. Technol. – year: 2017 ident: bib0001 article-title: A survey on security control and attack detection for industrial cyber-physical systems publication-title: Neurocomputing – volume: 60 start-page: 3023 year: 2015 end-page: 3028 ident: bib0012 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Trans. Autom. Control – volume: 54 start-page: 286 year: 1951 end-page: 295 ident: bib0031 article-title: Non-cooperative games publication-title: Ann. Math. – volume: 100 start-page: 195 year: 2012 end-page: 209 ident: bib0005 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proc. IEEE – start-page: 818 year: 2010 end-page: 823 ident: bib0015 article-title: Game-theoretic analysis of an aerial jamming attack on a UAV communication network publication-title: Proc. IEEE Am. Control Conference – start-page: 1 year: 2011 end-page: 6 ident: bib0021 article-title: A denial-of-service jamming game for remote state monitoring in smart grid publication-title: Proceedings of the Conference on Information Sciences and Systems – volume: 87 start-page: 184 year: 2018 end-page: 194 ident: bib0022 article-title: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution publication-title: Automatica – start-page: 47 year: 2012 end-page: 54 ident: bib0004 article-title: Integrity attacks on cyber-physical systems publication-title: Proceedings of the 1st International Conference on High Confidence Networked Systems – start-page: 6297 year: 2016 end-page: 6302 ident: bib0019 article-title: A secure cross-layer design for remote estimation under dos attack: When multi-sensor meets multi-channel publication-title: Proceedings of the Decision and Control – volume: 60 start-page: 2831 year: 2015 end-page: 2836 ident: bib0017 article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach publication-title: IEEE Trans. Autom. Control – year: 2017 ident: bib0029 article-title: Event-based variance-constrained publication-title: IEEE Trans. Cybern. – volume: 4 start-page: 4 year: 2017 end-page: 13 ident: bib0008 article-title: Optimal linear cyber-attack on remote state estimation publication-title: IEEE Trans. Control Netw. Syst. – volume: 272 start-page: 74 year: 2018 end-page: 83 ident: bib0023 article-title: A resilience approach to state estimation for discrete neural networks subject to multiple missing measurements and mixed time-delays publication-title: Neurocomputing – volume: 62 start-page: 277 year: 2017 end-page: 290 ident: bib0027 article-title: Power control of an energy harvesting sensor for remote state estimation publication-title: IEEE Trans. Autom. Control – volume: 78 start-page: 194 year: 2010 end-page: 201 ident: bib0013 article-title: Network security: a decision and game-theoretic approach publication-title: Automatica – year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0011 article-title: Secure filtering for stochastic nonlinear systems under multiple missing measurements and deception attacks publication-title: IET Control Theory Appl. – volume: 51 start-page: 595 issue: 4 year: 2006 ident: 10.1016/j.neucom.2018.02.086_bib0025 article-title: Generalized LQR control and kalman filtering with relations to computations of inner-outer and spectral factorizations publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2006.872840 – volume: 13 start-page: 513 issue: 3 year: 2015 ident: 10.1016/j.neucom.2018.02.086_bib0032 article-title: Data fusion-based resilient control system under dos attacks: a game theoretic approach publication-title: Int. J. Control Autom. Syst. doi: 10.1007/s12555-014-0316-9 – ident: 10.1016/j.neucom.2018.02.086_bib0034 – start-page: 47 year: 2012 ident: 10.1016/j.neucom.2018.02.086_bib0004 article-title: Integrity attacks on cyber-physical systems – volume: 11 start-page: 88 issue: 1 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0003 article-title: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2015.2460747 – year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0029 article-title: Event-based variance-constrained h∞ filtering for stochastic parameter systems over sensor networks with successive missing measurements publication-title: IEEE Trans. Cybern. – volume: 100 start-page: 195 issue: 1 year: 2012 ident: 10.1016/j.neucom.2018.02.086_bib0005 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proc. IEEE doi: 10.1109/JPROC.2011.2161428 – volume: 219 start-page: 99 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0010 article-title: On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors publication-title: Neurocomputing doi: 10.1016/j.neucom.2016.09.009 – volume: 54 start-page: 286 issue: 2 year: 1951 ident: 10.1016/j.neucom.2018.02.086_bib0031 article-title: Non-cooperative games publication-title: Ann. Math. doi: 10.2307/1969529 – volume: 78 start-page: 194 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0018 article-title: A multi-channel transmission schedule for remote state estimation under dos attacks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.020 – start-page: 818 year: 2010 ident: 10.1016/j.neucom.2018.02.086_bib0015 article-title: Game-theoretic analysis of an aerial jamming attack on a UAV communication network publication-title: Proc. IEEE Am. Control Conference – year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0001 article-title: A survey on security control and attack detection for industrial cyber-physical systems publication-title: Neurocomputing – year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0028 article-title: Synchronization control for a class of discrete-time dynamical networks with packet dropouts: a coding-decoding-based approach publication-title: IEEE Trans. Cybern. – volume: 78 start-page: 194 year: 2010 ident: 10.1016/j.neucom.2018.02.086_bib0013 article-title: Network security: a decision and game-theoretic approach publication-title: Automatica – volume: 19 start-page: 139 issue: 2 year: 1982 ident: 10.1016/j.neucom.2018.02.086_bib0014 article-title: Dynamic noncooperative game theory publication-title: SIAM – volume: 24 start-page: 843 issue: 3 year: 2016 ident: 10.1016/j.neucom.2018.02.086_bib0026 article-title: Optimal dos attack scheduling in wireless networked control system publication-title: IEEE Trans. Control Syst. Technol. doi: 10.1109/TCST.2015.2462741 – year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0009 article-title: Detection against linear deception attacks on multi-sensor remote state estimation – volume: 59 start-page: 1454 issue: 6 year: 2014 ident: 10.1016/j.neucom.2018.02.086_bib0002 article-title: Secure estimation and control for cyber-physical systems under adversarial attacks publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2014.2303233 – volume: 78 start-page: 231 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0007 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.026 – volume: 46 start-page: 106 issue: 20 year: 2013 ident: 10.1016/j.neucom.2018.02.086_bib0016 article-title: A stochastic security game for Kalman filtering in networked control systems (NCSs) under denial of service (dos) attacks publication-title: IFAC Proc. Vol. doi: 10.3182/20130902-3-CN-3020.00041 – volume: 60 start-page: 2831 issue: 10 year: 2015 ident: 10.1016/j.neucom.2018.02.086_bib0017 article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2015.2461851 – start-page: 1 year: 2011 ident: 10.1016/j.neucom.2018.02.086_bib0021 article-title: A denial-of-service jamming game for remote state monitoring in smart grid – volume: 87 start-page: 176 year: 2018 ident: 10.1016/j.neucom.2018.02.086_bib0006 article-title: State estimation under false data injection attacks: Security analysis and system protection publication-title: Automatica doi: 10.1016/j.automatica.2017.09.028 – start-page: 6297 year: 2016 ident: 10.1016/j.neucom.2018.02.086_bib0019 article-title: A secure cross-layer design for remote estimation under dos attack: When multi-sensor meets multi-channel – start-page: 3601 year: 2008 ident: 10.1016/j.neucom.2018.02.086_bib0024 article-title: Scheduling of event-triggered controllers on a shared network – volume: 60 start-page: 3023 issue: 11 year: 2015 ident: 10.1016/j.neucom.2018.02.086_bib0012 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2015.2409905 – volume: 49 start-page: 169 issue: 22 year: 2016 ident: 10.1016/j.neucom.2018.02.086_bib0020 article-title: Deception-based sensor scheduling for remote estimation under dos attacks publication-title: IFAC-PapersOnLine doi: 10.1016/j.ifacol.2016.10.391 – start-page: 4078 year: 2011 ident: 10.1016/j.neucom.2018.02.086_bib0033 article-title: On the interdependence of reliability and security in networked control systems – volume: 62 start-page: 277 issue: 1 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0027 article-title: Power control of an energy harvesting sensor for remote state estimation publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2016.2553128 – volume: 4 start-page: 4 issue: 1 year: 2017 ident: 10.1016/j.neucom.2018.02.086_bib0008 article-title: Optimal linear cyber-attack on remote state estimation publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2016.2570003 – volume: 47 start-page: 1693 issue: 8 year: 2011 ident: 10.1016/j.neucom.2018.02.086_bib0030 article-title: Sensor data scheduling for optimal state estimation with communication energy constraint publication-title: Automatica doi: 10.1016/j.automatica.2011.02.037 – volume: 87 start-page: 184 year: 2018 ident: 10.1016/j.neucom.2018.02.086_bib0022 article-title: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution publication-title: Automatica doi: 10.1016/j.automatica.2017.09.021 – volume: 272 start-page: 74 year: 2018 ident: 10.1016/j.neucom.2018.02.086_bib0023 article-title: A resilience approach to state estimation for discrete neural networks subject to multiple missing measurements and mixed time-delays publication-title: Neurocomputing doi: 10.1016/j.neucom.2017.06.065 |
SSID | ssj0017129 |
Score | 2.3606026 |
Snippet | This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 111 |
SubjectTerms | Cyber-physical systems DoS attack Game theory Multiple-subsystem State estimation |
Title | Security estimation under Denial-of-Service attack with energy constraint |
URI | https://dx.doi.org/10.1016/j.neucom.2018.02.086 |
Volume | 292 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB58XHrpu9Q-ZA-9bjW7MckexVa0pV6s4C1s9gG2oiLx2t_enWQjLZQWekzIwPKx-83MZuYbgDuZcJVFoaWSG-YSlMTSTHHryNA4f8mlsgbvIV8m0WgWPs178xoMql4YLKv03F9yesHW_k3Ho9nZLBadaVcwl0UF6OMxkeB1aDIuol4Dmv3x82iy_5kQB6yU3GM9igZVB11R5rUyOywbcX4wKcQ7san6Jw_1xesMj-HQh4ukX67oBGpmdQpH1SgG4k_mGYynfg4dQdWMsh2RYH_YljxgOd2Sri31vEBknkv1TvAKlpii948oDBNxWkR-DrPh4-tgRP2UBKpcuJ9TKyMTZWGiYq0tswJjFp1pJRwmUdcybWIhYiuDyB1exSzXXRtoniXKZTKhMPwCGqv1ylwC4ZqhgJy0ziaUzpWLWHOWidDqQGQJawGvkEmVlxDHtS3TqlbsLS3xTBHPtMtSh2cL6N5qU0po_PF9XIGeftsKqWP5Xy2v_m15DQf4VJYF3EAj3-7MrYs28qwN9fuPoO331CfVktXq |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEG4QD3rxbcRnD14rbLvsbo8GJaDABUi4Nd0-EpQshCxXf7ud3S7RxGjidbeTNF_aeTTfN4PQvUyYSqPQEskMdQVKYkmqmHXO0Lh4yaSyBt4hh6OoNw1fZu1ZDXUqLQzQKr3vL3164a39l6ZHs7maz5vjFqeuigogxkMhwXbQbthmMfD6Hj62PI8gDmjZcI-2CSyv9HMFySszGyCNuCiYFK07QVL9U3z6EnO6R-jAJ4v4sdzPMaqZ7AQdVoMYsL-Xp6g_9lPoMPTMKMWIGNRha_wEZLoFWVrivQKWeS7VO4YHWGwK5R9WkCTCrIj8DE27z5NOj_gZCUS5ZD8nVkYmSsNExVpbajlkLDrVijtEopal2sScx1YGkbu6ilqmWzbQLE2Uq2NCbtg5qmfLzFwgzDSF9nHSOptQukDOY81oykOrA54mtIFYhYxQvoE47G0hKqbYmyjxFICnaFHh8GwgsrValQ00_lgfV6CLbwdBOB__q-Xlvy3v0F5vMhyIQX_0eoX24U9JELhG9Xy9MTcu78jT2-JcfQKiq9a1 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+estimation+under+Denial-of-Service+attack+with+energy+constraint&rft.jtitle=Neurocomputing+%28Amsterdam%29&rft.au=Li%2C+Li&rft.au=Zhang%2C+Huixia&rft.au=Xia%2C+Yuanqing&rft.au=Yang%2C+Hongjiu&rft.date=2018-05-31&rft.pub=Elsevier+B.V&rft.issn=0925-2312&rft.eissn=1872-8286&rft.volume=292&rft.spage=111&rft.epage=120&rft_id=info:doi/10.1016%2Fj.neucom.2018.02.086&rft.externalDocID=S0925231218302613 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0925-2312&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0925-2312&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0925-2312&client=summon |