Security estimation under Denial-of-Service attack with energy constraint

This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optim...

Full description

Saved in:
Bibliographic Details
Published inNeurocomputing (Amsterdam) Vol. 292; pp. 111 - 120
Main Authors Li, Li, Zhang, Huixia, Xia, Yuanqing, Yang, Hongjiu
Format Journal Article
LanguageEnglish
Published Elsevier B.V 31.05.2018
Subjects
Online AccessGet full text
ISSN0925-2312
1872-8286
DOI10.1016/j.neucom.2018.02.086

Cover

Abstract This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results.
AbstractList This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results.
Author Zhang, Huixia
Xia, Yuanqing
Yang, Hongjiu
Li, Li
Author_xml – sequence: 1
  givenname: Li
  surname: Li
  fullname: Li, Li
  email: lili@ysu.edu.cn
  organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
– sequence: 2
  givenname: Huixia
  surname: Zhang
  fullname: Zhang, Huixia
  email: huixiaz0914@163.com
  organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
– sequence: 3
  givenname: Yuanqing
  surname: Xia
  fullname: Xia, Yuanqing
  email: yanghongjiu@ysu.edu.cn
  organization: The School of Automation, Beijing Institute of Technology, Beijing 100081, China
– sequence: 4
  givenname: Hongjiu
  surname: Yang
  fullname: Yang, Hongjiu
  email: xia_yuanqing@bit.edu.cn
  organization: The Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004, China
BookMark eNqFkM1OAjEUhRuDiYC-gYt5gRlv70Cn48LE4G9C4gJdN6W91SJ0TFswvL0grlzo6qy-k3O-AeuFLhBj5xwqDlxcLKpAa9OtKgQuK8AKpDhifS4bLCVK0WN9aHFcYs3xhA1SWgDwhmPbZ48zMuvo87aglP1KZ9-FYh0sxeKGgtfLsnPljOLGGyp0ztq8F58-vxUUKL5uC9OFlKP2IZ-yY6eXic5-cshe7m6fJw_l9On-cXI9LU0NIpdOCxLzkTSNtQ5dC4KjnVvTouACHFpq2rZxmgtZo0FXW3Dc1nNpBIxHLdVDdnnoNbFLKZJTxufv3fsdS8VB7aWohTpIUXspClDtpOzg0S_4I-5ex-1_2NUBo92xjaeokvEUDFkfyWRlO_93wRfgj4H5
CitedBy_id crossref_primary_10_1016_j_neucom_2022_05_085
crossref_primary_10_1002_asjc_2224
crossref_primary_10_1002_int_22555
crossref_primary_10_1108_SC_03_2023_0011
crossref_primary_10_1016_j_neucom_2019_06_050
crossref_primary_10_1007_s00034_021_01910_7
crossref_primary_10_1016_j_neucom_2020_10_055
crossref_primary_10_1016_j_neucom_2019_01_099
crossref_primary_10_1088_1742_6596_1345_4_042048
crossref_primary_10_1016_j_jfranklin_2020_08_041
crossref_primary_10_1016_j_neucom_2019_11_096
crossref_primary_10_1016_j_neucom_2023_127116
crossref_primary_10_1016_j_ins_2020_06_073
crossref_primary_10_1016_j_isatra_2021_11_033
crossref_primary_10_1016_j_neucom_2020_08_007
crossref_primary_10_1109_TSMC_2023_3298646
crossref_primary_10_1016_j_energy_2019_03_009
crossref_primary_10_1016_j_jfranklin_2022_09_005
crossref_primary_10_1049_iet_cta_2020_0040
crossref_primary_10_1155_2022_4729526
crossref_primary_10_1016_j_neucom_2019_05_085
Cites_doi 10.1109/TAC.2006.872840
10.1007/s12555-014-0316-9
10.1109/JSYST.2015.2460747
10.1109/JPROC.2011.2161428
10.1016/j.neucom.2016.09.009
10.2307/1969529
10.1016/j.automatica.2016.12.020
10.1109/TCST.2015.2462741
10.1109/TAC.2014.2303233
10.1016/j.automatica.2016.12.026
10.3182/20130902-3-CN-3020.00041
10.1109/TAC.2015.2461851
10.1016/j.automatica.2017.09.028
10.1109/TAC.2015.2409905
10.1016/j.ifacol.2016.10.391
10.1109/TAC.2016.2553128
10.1109/TCNS.2016.2570003
10.1016/j.automatica.2011.02.037
10.1016/j.automatica.2017.09.021
10.1016/j.neucom.2017.06.065
ContentType Journal Article
Copyright 2018 Elsevier B.V.
Copyright_xml – notice: 2018 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.neucom.2018.02.086
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-8286
EndPage 120
ExternalDocumentID 10_1016_j_neucom_2018_02_086
S0925231218302613
GroupedDBID ---
--K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
53G
5VS
7-5
71M
8P~
9JM
9JN
AABNK
AACTN
AADPK
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXLA
AAXUO
AAYFN
ABBOA
ABCQJ
ABFNM
ABJNI
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AENEX
AFKWA
AFTJW
AFXIZ
AGHFR
AGUBO
AGWIK
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
KOM
LG9
M41
MO0
MOBAO
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SSN
SSV
SSZ
T5K
ZMT
~G-
29N
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
BNPGV
CITATION
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
SBC
SEW
SSH
WUQ
XPP
ID FETCH-LOGICAL-c306t-fa6e6b48c7ddf2f90612dbdc926160f2de7997fa16832c2f3d0f1d3b8c60549e3
IEDL.DBID AIKHN
ISSN 0925-2312
IngestDate Tue Jul 01 01:46:33 EDT 2025
Thu Apr 24 22:51:04 EDT 2025
Fri Feb 23 02:30:23 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cyber-physical systems
State estimation
Game theory
Multiple-subsystem
DoS attack
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c306t-fa6e6b48c7ddf2f90612dbdc926160f2de7997fa16832c2f3d0f1d3b8c60549e3
PageCount 10
ParticipantIDs crossref_citationtrail_10_1016_j_neucom_2018_02_086
crossref_primary_10_1016_j_neucom_2018_02_086
elsevier_sciencedirect_doi_10_1016_j_neucom_2018_02_086
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-05-31
PublicationDateYYYYMMDD 2018-05-31
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-05-31
  day: 31
PublicationDecade 2010
PublicationTitle Neurocomputing (Amsterdam)
PublicationYear 2018
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Li, Shi, Chen (bib0009) 2017
Song, Hu, Chen, Liu, Alsaadi, Sun (bib0023) 2018; 272
Zhang, Cheng, Shi, Chen (bib0026) 2016; 24
Nash (bib0031) 1951; 54
Wang, Wang, Han, Wei (bib0028) 2017
Hu, Wang, Han, Liu (bib0006) 2018; 87
Fawzi, Tabuada, Diggavi (bib0002) 2014; 59
Bhattacharya, Basar (bib0015) 2010
Ding, Wang, Ho, Wei (bib0007) 2017; 78
Ding, Quevedo, Dey (bib0019) 2016
Li, Lai, Qiu (bib0021) 2011
Alpcan, Basar (bib0013) 2010; 78
Gu, Cao, Badr (bib0025) 2006; 51
Guo, Shi, Johansson, Shi (bib0008) 2017; 4
Ding, Han, Xiang, Ge, Zhang (bib0001) 2017
Liu, Liu, Saddik (bib0016) 2013; 46
Ren, Wu, Dey, Shi (bib0022) 2018; 87
Amin, Schwartz, Sastry (bib0033) 2011
Mo, Kim, Brancik, Dickinson, Lee, Perrig, Sinopoli (bib0005) 2012; 100
Wang, Wang, Han, Wei (bib0029) 2017
Mo, Sinopoli (bib0004) 2012
M. Hazewinkel, Encyclopaedia of Mathematics: Supplement, 2002, Springer.
Ding, Li, Quevedob, Dey, Shi (bib0018) 2017; 78
Basar, Olsder (bib0014) 1982; 19
Zhang, Qiu, Tsai (bib0003) 2017; 11
Ding, Ren, Shi (bib0020) 2016; 49
Li, Shi, Cheng, Chen, Quevedo (bib0017) 2015; 60
Yuan, Xia (bib0011) 2017
Cervin, Henningsson (bib0024) 2008
Li, Zhang, Quevedo, Lau, Dey, Shi (bib0027) 2017; 62
Shi, Cheng, Chen (bib0030) 2011; 47
Ding, Wei, Zhang (bib0010) 2017; 219
Yuan, Sun (bib0032) 2015; 13
Zhang, Shi, Cheng, Chen (bib0012) 2015; 60
Ding (10.1016/j.neucom.2018.02.086_bib0018) 2017; 78
Shi (10.1016/j.neucom.2018.02.086_bib0030) 2011; 47
Mo (10.1016/j.neucom.2018.02.086_bib0004) 2012
Li (10.1016/j.neucom.2018.02.086_bib0021) 2011
Alpcan (10.1016/j.neucom.2018.02.086_bib0013) 2010; 78
Hu (10.1016/j.neucom.2018.02.086_bib0006) 2018; 87
Li (10.1016/j.neucom.2018.02.086_bib0027) 2017; 62
Liu (10.1016/j.neucom.2018.02.086_bib0016) 2013; 46
Ding (10.1016/j.neucom.2018.02.086_bib0020) 2016; 49
Wang (10.1016/j.neucom.2018.02.086_bib0028) 2017
Zhang (10.1016/j.neucom.2018.02.086_bib0026) 2016; 24
Basar (10.1016/j.neucom.2018.02.086_bib0014) 1982; 19
Gu (10.1016/j.neucom.2018.02.086_bib0025) 2006; 51
Zhang (10.1016/j.neucom.2018.02.086_bib0012) 2015; 60
Bhattacharya (10.1016/j.neucom.2018.02.086_bib0015) 2010
Ding (10.1016/j.neucom.2018.02.086_bib0007) 2017; 78
Li (10.1016/j.neucom.2018.02.086_bib0017) 2015; 60
Amin (10.1016/j.neucom.2018.02.086_bib0033) 2011
Li (10.1016/j.neucom.2018.02.086_bib0009) 2017
Song (10.1016/j.neucom.2018.02.086_bib0023) 2018; 272
Wang (10.1016/j.neucom.2018.02.086_bib0029) 2017
Yuan (10.1016/j.neucom.2018.02.086_bib0011) 2017
Yuan (10.1016/j.neucom.2018.02.086_bib0032) 2015; 13
Ren (10.1016/j.neucom.2018.02.086_bib0022) 2018; 87
Zhang (10.1016/j.neucom.2018.02.086_bib0003) 2017; 11
Nash (10.1016/j.neucom.2018.02.086_bib0031) 1951; 54
Guo (10.1016/j.neucom.2018.02.086_bib0008) 2017; 4
Mo (10.1016/j.neucom.2018.02.086_bib0005) 2012; 100
Ding (10.1016/j.neucom.2018.02.086_bib0019) 2016
Ding (10.1016/j.neucom.2018.02.086_bib0010) 2017; 219
Cervin (10.1016/j.neucom.2018.02.086_bib0024) 2008
Ding (10.1016/j.neucom.2018.02.086_bib0001) 2017
Fawzi (10.1016/j.neucom.2018.02.086_bib0002) 2014; 59
10.1016/j.neucom.2018.02.086_bib0034
References_xml – volume: 87
  start-page: 176
  year: 2018
  end-page: 183
  ident: bib0006
  article-title: State estimation under false data injection attacks: Security analysis and system protection
  publication-title: Automatica
– volume: 219
  start-page: 99
  year: 2017
  end-page: 106
  ident: bib0010
  article-title: On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
  publication-title: Neurocomputing
– volume: 78
  start-page: 194
  year: 2017
  end-page: 201
  ident: bib0018
  article-title: A multi-channel transmission schedule for remote state estimation under dos attacks
  publication-title: Automatica
– volume: 78
  start-page: 231
  year: 2017
  end-page: 240
  ident: bib0007
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
– year: 2017
  ident: bib0011
  article-title: Secure filtering for stochastic nonlinear systems under multiple missing measurements and deception attacks
  publication-title: IET Control Theory Appl.
– start-page: 4078
  year: 2011
  end-page: 4083
  ident: bib0033
  article-title: On the interdependence of reliability and security in networked control systems
  publication-title: Proceedings of the Conference on Decision and Control and European Control
– volume: 51
  start-page: 595
  year: 2006
  end-page: 605
  ident: bib0025
  article-title: Generalized LQR control and kalman filtering with relations to computations of inner-outer and spectral factorizations
  publication-title: IEEE Trans. Autom. Control
– volume: 47
  start-page: 1693
  year: 2011
  end-page: 1698
  ident: bib0030
  article-title: Sensor data scheduling for optimal state estimation with communication energy constraint
  publication-title: Automatica
– volume: 13
  start-page: 513
  year: 2015
  end-page: 520
  ident: bib0032
  article-title: Data fusion-based resilient control system under dos attacks: a game theoretic approach
  publication-title: Int. J. Control Autom. Syst.
– volume: 11
  start-page: 88
  year: 2017
  end-page: 95
  ident: bib0003
  article-title: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data
  publication-title: IEEE Syst. J.
– year: 2017
  ident: bib0028
  article-title: Synchronization control for a class of discrete-time dynamical networks with packet dropouts: a coding-decoding-based approach
  publication-title: IEEE Trans. Cybern.
– volume: 49
  start-page: 169
  year: 2016
  end-page: 174
  ident: bib0020
  article-title: Deception-based sensor scheduling for remote estimation under dos attacks
  publication-title: IFAC-PapersOnLine
– start-page: 3601
  year: 2008
  end-page: 3606
  ident: bib0024
  article-title: Scheduling of event-triggered controllers on a shared network
  publication-title: Proceedings of the IEEE Conference on Decision and Control
– reference: M. Hazewinkel, Encyclopaedia of Mathematics: Supplement, 2002, Springer.
– volume: 46
  start-page: 106
  year: 2013
  end-page: 111
  ident: bib0016
  article-title: A stochastic security game for Kalman filtering in networked control systems (NCSs) under denial of service (dos) attacks
  publication-title: IFAC Proc. Vol.
– year: 2017
  ident: bib0009
  article-title: Detection against linear deception attacks on multi-sensor remote state estimation
  publication-title: Proceedings of the IEEE Transactions on Control of Network Systems
– volume: 59
  start-page: 1454
  year: 2014
  end-page: 1467
  ident: bib0002
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Trans. Autom. Control
– volume: 19
  start-page: 139
  year: 1982
  end-page: 152
  ident: bib0014
  article-title: Dynamic noncooperative game theory
  publication-title: SIAM
– volume: 24
  start-page: 843
  year: 2016
  end-page: 852
  ident: bib0026
  article-title: Optimal dos attack scheduling in wireless networked control system
  publication-title: IEEE Trans. Control Syst. Technol.
– year: 2017
  ident: bib0001
  article-title: A survey on security control and attack detection for industrial cyber-physical systems
  publication-title: Neurocomputing
– volume: 60
  start-page: 3023
  year: 2015
  end-page: 3028
  ident: bib0012
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Trans. Autom. Control
– volume: 54
  start-page: 286
  year: 1951
  end-page: 295
  ident: bib0031
  article-title: Non-cooperative games
  publication-title: Ann. Math.
– volume: 100
  start-page: 195
  year: 2012
  end-page: 209
  ident: bib0005
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proc. IEEE
– start-page: 818
  year: 2010
  end-page: 823
  ident: bib0015
  article-title: Game-theoretic analysis of an aerial jamming attack on a UAV communication network
  publication-title: Proc. IEEE Am. Control Conference
– start-page: 1
  year: 2011
  end-page: 6
  ident: bib0021
  article-title: A denial-of-service jamming game for remote state monitoring in smart grid
  publication-title: Proceedings of the Conference on Information Sciences and Systems
– volume: 87
  start-page: 184
  year: 2018
  end-page: 194
  ident: bib0022
  article-title: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
  publication-title: Automatica
– start-page: 47
  year: 2012
  end-page: 54
  ident: bib0004
  article-title: Integrity attacks on cyber-physical systems
  publication-title: Proceedings of the 1st International Conference on High Confidence Networked Systems
– start-page: 6297
  year: 2016
  end-page: 6302
  ident: bib0019
  article-title: A secure cross-layer design for remote estimation under dos attack: When multi-sensor meets multi-channel
  publication-title: Proceedings of the Decision and Control
– volume: 60
  start-page: 2831
  year: 2015
  end-page: 2836
  ident: bib0017
  article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach
  publication-title: IEEE Trans. Autom. Control
– year: 2017
  ident: bib0029
  article-title: Event-based variance-constrained
  publication-title: IEEE Trans. Cybern.
– volume: 4
  start-page: 4
  year: 2017
  end-page: 13
  ident: bib0008
  article-title: Optimal linear cyber-attack on remote state estimation
  publication-title: IEEE Trans. Control Netw. Syst.
– volume: 272
  start-page: 74
  year: 2018
  end-page: 83
  ident: bib0023
  article-title: A resilience approach to state estimation for discrete neural networks subject to multiple missing measurements and mixed time-delays
  publication-title: Neurocomputing
– volume: 62
  start-page: 277
  year: 2017
  end-page: 290
  ident: bib0027
  article-title: Power control of an energy harvesting sensor for remote state estimation
  publication-title: IEEE Trans. Autom. Control
– volume: 78
  start-page: 194
  year: 2010
  end-page: 201
  ident: bib0013
  article-title: Network security: a decision and game-theoretic approach
  publication-title: Automatica
– year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0011
  article-title: Secure filtering for stochastic nonlinear systems under multiple missing measurements and deception attacks
  publication-title: IET Control Theory Appl.
– volume: 51
  start-page: 595
  issue: 4
  year: 2006
  ident: 10.1016/j.neucom.2018.02.086_bib0025
  article-title: Generalized LQR control and kalman filtering with relations to computations of inner-outer and spectral factorizations
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2006.872840
– volume: 13
  start-page: 513
  issue: 3
  year: 2015
  ident: 10.1016/j.neucom.2018.02.086_bib0032
  article-title: Data fusion-based resilient control system under dos attacks: a game theoretic approach
  publication-title: Int. J. Control Autom. Syst.
  doi: 10.1007/s12555-014-0316-9
– ident: 10.1016/j.neucom.2018.02.086_bib0034
– start-page: 47
  year: 2012
  ident: 10.1016/j.neucom.2018.02.086_bib0004
  article-title: Integrity attacks on cyber-physical systems
– volume: 11
  start-page: 88
  issue: 1
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0003
  article-title: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2015.2460747
– year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0029
  article-title: Event-based variance-constrained h∞ filtering for stochastic parameter systems over sensor networks with successive missing measurements
  publication-title: IEEE Trans. Cybern.
– volume: 100
  start-page: 195
  issue: 1
  year: 2012
  ident: 10.1016/j.neucom.2018.02.086_bib0005
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2011.2161428
– volume: 219
  start-page: 99
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0010
  article-title: On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2016.09.009
– volume: 54
  start-page: 286
  issue: 2
  year: 1951
  ident: 10.1016/j.neucom.2018.02.086_bib0031
  article-title: Non-cooperative games
  publication-title: Ann. Math.
  doi: 10.2307/1969529
– volume: 78
  start-page: 194
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0018
  article-title: A multi-channel transmission schedule for remote state estimation under dos attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.020
– start-page: 818
  year: 2010
  ident: 10.1016/j.neucom.2018.02.086_bib0015
  article-title: Game-theoretic analysis of an aerial jamming attack on a UAV communication network
  publication-title: Proc. IEEE Am. Control Conference
– year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0001
  article-title: A survey on security control and attack detection for industrial cyber-physical systems
  publication-title: Neurocomputing
– year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0028
  article-title: Synchronization control for a class of discrete-time dynamical networks with packet dropouts: a coding-decoding-based approach
  publication-title: IEEE Trans. Cybern.
– volume: 78
  start-page: 194
  year: 2010
  ident: 10.1016/j.neucom.2018.02.086_bib0013
  article-title: Network security: a decision and game-theoretic approach
  publication-title: Automatica
– volume: 19
  start-page: 139
  issue: 2
  year: 1982
  ident: 10.1016/j.neucom.2018.02.086_bib0014
  article-title: Dynamic noncooperative game theory
  publication-title: SIAM
– volume: 24
  start-page: 843
  issue: 3
  year: 2016
  ident: 10.1016/j.neucom.2018.02.086_bib0026
  article-title: Optimal dos attack scheduling in wireless networked control system
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2015.2462741
– year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0009
  article-title: Detection against linear deception attacks on multi-sensor remote state estimation
– volume: 59
  start-page: 1454
  issue: 6
  year: 2014
  ident: 10.1016/j.neucom.2018.02.086_bib0002
  article-title: Secure estimation and control for cyber-physical systems under adversarial attacks
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2014.2303233
– volume: 78
  start-page: 231
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0007
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.026
– volume: 46
  start-page: 106
  issue: 20
  year: 2013
  ident: 10.1016/j.neucom.2018.02.086_bib0016
  article-title: A stochastic security game for Kalman filtering in networked control systems (NCSs) under denial of service (dos) attacks
  publication-title: IFAC Proc. Vol.
  doi: 10.3182/20130902-3-CN-3020.00041
– volume: 60
  start-page: 2831
  issue: 10
  year: 2015
  ident: 10.1016/j.neucom.2018.02.086_bib0017
  article-title: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2015.2461851
– start-page: 1
  year: 2011
  ident: 10.1016/j.neucom.2018.02.086_bib0021
  article-title: A denial-of-service jamming game for remote state monitoring in smart grid
– volume: 87
  start-page: 176
  year: 2018
  ident: 10.1016/j.neucom.2018.02.086_bib0006
  article-title: State estimation under false data injection attacks: Security analysis and system protection
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.09.028
– start-page: 6297
  year: 2016
  ident: 10.1016/j.neucom.2018.02.086_bib0019
  article-title: A secure cross-layer design for remote estimation under dos attack: When multi-sensor meets multi-channel
– start-page: 3601
  year: 2008
  ident: 10.1016/j.neucom.2018.02.086_bib0024
  article-title: Scheduling of event-triggered controllers on a shared network
– volume: 60
  start-page: 3023
  issue: 11
  year: 2015
  ident: 10.1016/j.neucom.2018.02.086_bib0012
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2015.2409905
– volume: 49
  start-page: 169
  issue: 22
  year: 2016
  ident: 10.1016/j.neucom.2018.02.086_bib0020
  article-title: Deception-based sensor scheduling for remote estimation under dos attacks
  publication-title: IFAC-PapersOnLine
  doi: 10.1016/j.ifacol.2016.10.391
– start-page: 4078
  year: 2011
  ident: 10.1016/j.neucom.2018.02.086_bib0033
  article-title: On the interdependence of reliability and security in networked control systems
– volume: 62
  start-page: 277
  issue: 1
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0027
  article-title: Power control of an energy harvesting sensor for remote state estimation
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2016.2553128
– volume: 4
  start-page: 4
  issue: 1
  year: 2017
  ident: 10.1016/j.neucom.2018.02.086_bib0008
  article-title: Optimal linear cyber-attack on remote state estimation
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2016.2570003
– volume: 47
  start-page: 1693
  issue: 8
  year: 2011
  ident: 10.1016/j.neucom.2018.02.086_bib0030
  article-title: Sensor data scheduling for optimal state estimation with communication energy constraint
  publication-title: Automatica
  doi: 10.1016/j.automatica.2011.02.037
– volume: 87
  start-page: 184
  year: 2018
  ident: 10.1016/j.neucom.2018.02.086_bib0022
  article-title: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.09.021
– volume: 272
  start-page: 74
  year: 2018
  ident: 10.1016/j.neucom.2018.02.086_bib0023
  article-title: A resilience approach to state estimation for discrete neural networks subject to multiple missing measurements and mixed time-delays
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2017.06.065
SSID ssj0017129
Score 2.3606026
Snippet This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 111
SubjectTerms Cyber-physical systems
DoS attack
Game theory
Multiple-subsystem
State estimation
Title Security estimation under Denial-of-Service attack with energy constraint
URI https://dx.doi.org/10.1016/j.neucom.2018.02.086
Volume 292
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La8JAEB58XHrpu9Q-ZA-9bjW7MckexVa0pV6s4C1s9gG2oiLx2t_enWQjLZQWekzIwPKx-83MZuYbgDuZcJVFoaWSG-YSlMTSTHHryNA4f8mlsgbvIV8m0WgWPs178xoMql4YLKv03F9yesHW_k3Ho9nZLBadaVcwl0UF6OMxkeB1aDIuol4Dmv3x82iy_5kQB6yU3GM9igZVB11R5rUyOywbcX4wKcQ7san6Jw_1xesMj-HQh4ukX67oBGpmdQpH1SgG4k_mGYynfg4dQdWMsh2RYH_YljxgOd2Sri31vEBknkv1TvAKlpii948oDBNxWkR-DrPh4-tgRP2UBKpcuJ9TKyMTZWGiYq0tswJjFp1pJRwmUdcybWIhYiuDyB1exSzXXRtoniXKZTKhMPwCGqv1ylwC4ZqhgJy0ziaUzpWLWHOWidDqQGQJawGvkEmVlxDHtS3TqlbsLS3xTBHPtMtSh2cL6N5qU0po_PF9XIGeftsKqWP5Xy2v_m15DQf4VJYF3EAj3-7MrYs28qwN9fuPoO331CfVktXq
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEG4QD3rxbcRnD14rbLvsbo8GJaDABUi4Nd0-EpQshCxXf7ud3S7RxGjidbeTNF_aeTTfN4PQvUyYSqPQEskMdQVKYkmqmHXO0Lh4yaSyBt4hh6OoNw1fZu1ZDXUqLQzQKr3vL3164a39l6ZHs7maz5vjFqeuigogxkMhwXbQbthmMfD6Hj62PI8gDmjZcI-2CSyv9HMFySszGyCNuCiYFK07QVL9U3z6EnO6R-jAJ4v4sdzPMaqZ7AQdVoMYsL-Xp6g_9lPoMPTMKMWIGNRha_wEZLoFWVrivQKWeS7VO4YHWGwK5R9WkCTCrIj8DE27z5NOj_gZCUS5ZD8nVkYmSsNExVpbajlkLDrVijtEopal2sScx1YGkbu6ilqmWzbQLE2Uq2NCbtg5qmfLzFwgzDSF9nHSOptQukDOY81oykOrA54mtIFYhYxQvoE47G0hKqbYmyjxFICnaFHh8GwgsrValQ00_lgfV6CLbwdBOB__q-Xlvy3v0F5vMhyIQX_0eoX24U9JELhG9Xy9MTcu78jT2-JcfQKiq9a1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+estimation+under+Denial-of-Service+attack+with+energy+constraint&rft.jtitle=Neurocomputing+%28Amsterdam%29&rft.au=Li%2C+Li&rft.au=Zhang%2C+Huixia&rft.au=Xia%2C+Yuanqing&rft.au=Yang%2C+Hongjiu&rft.date=2018-05-31&rft.pub=Elsevier+B.V&rft.issn=0925-2312&rft.eissn=1872-8286&rft.volume=292&rft.spage=111&rft.epage=120&rft_id=info:doi/10.1016%2Fj.neucom.2018.02.086&rft.externalDocID=S0925231218302613
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0925-2312&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0925-2312&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0925-2312&client=summon