Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledg...

Full description

Saved in:
Bibliographic Details
Published inJournal of systems science and complexity Vol. 36; no. 4; pp. 1407 - 1422
Main Authors Pang, Zhonghua, Fu, Yuan, Guo, Haibin, Sun, Jian
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2023
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
AbstractList This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to only tamper the measurement output, and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a defender. Firstly, it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system knowledge. Secondly, it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the attacker. Thirdly, the stealthiness condition of the proposed attack scheme based on an inaccurate model is given. Furthermore, for each case, the instability conditions of the closed-loop system under attack are derived. Finally, simulation results are provided to test the proposed attack scheme.
Author Fu, Yuan
Pang, Zhonghua
Guo, Haibin
Sun, Jian
Author_xml – sequence: 1
  givenname: Zhonghua
  surname: Pang
  fullname: Pang, Zhonghua
  organization: Key Laboratory of Fieldbus Technology and Automation of Beijing, North China University of Technology
– sequence: 2
  givenname: Yuan
  surname: Fu
  fullname: Fu, Yuan
  organization: Key Laboratory of Fieldbus Technology and Automation of Beijing, North China University of Technology
– sequence: 3
  givenname: Haibin
  surname: Guo
  fullname: Guo, Haibin
  organization: National Key Laboratory of Autonomous Intelligent Unmanned Systems, School of Automation, Beijing Institute of Technology, Beijing Institute of Technology Chongqing Innovation Center
– sequence: 4
  givenname: Jian
  surname: Sun
  fullname: Sun, Jian
  email: sunjian@bit.edu.cn
  organization: National Key Laboratory of Autonomous Intelligent Unmanned Systems, School of Automation, Beijing Institute of Technology, Beijing Institute of Technology Chongqing Innovation Center
BookMark eNp9kEFLwzAUx4NMcE4_gLeA52qStknrrVSng6GHzXNI09etW9fMJEP67W2pIAh6eu_w__1573eJJq1pAaEbSu4oIeLeURqxKCCMBYwyEvAzNKVxnAaCcDHpd0LSgFMWXaBL53aEhDwlyRRtslY1nasdNhVeeVCN33Z4rhoH-FF5hRftDrSvTYsz75XeO5xtVN06j1_Bfxq7hxLnpvXWNHjVOQ8H94DXWwuAc9WXrPyprMFdofNqKL3-njP0Pn9a5y_B8u15kWfLQIeU-6AMY6BEhGXJk5DwkkdCRERpiIsyhSitRFFqKNJYibSqeFFEkKo4YVqETPBEhzN0O_Yerfk4gfNyZ062_9FJlsQ8oiEVSZ8SY0pb45yFSuraq-FLb1XdSErkYFWOVmVvVQ5WJe9J-os82vqgbPcvw0bG9dl2A_bnpr-hL7MTi-g
CitedBy_id crossref_primary_10_1109_TCSII_2023_3302151
crossref_primary_10_1109_JAS_2023_123441
crossref_primary_10_1007_s11424_024_4029_8
crossref_primary_10_1007_s11424_024_3466_8
crossref_primary_10_1080_00207721_2023_2196276
crossref_primary_10_1007_s11424_024_3401_z
crossref_primary_10_1016_j_cnsns_2024_108423
crossref_primary_10_1016_j_segan_2024_101347
crossref_primary_10_1109_TAC_2023_3316160
crossref_primary_10_1109_LSP_2024_3353159
crossref_primary_10_3390_sym14112447
crossref_primary_10_1007_s11071_024_10374_8
crossref_primary_10_1016_j_jfranklin_2025_107594
crossref_primary_10_1080_00207721_2023_2245949
crossref_primary_10_1038_s41467_024_54626_y
crossref_primary_10_1109_ACCESS_2024_3491502
crossref_primary_10_1109_TCYB_2024_3490656
crossref_primary_10_1109_TCSII_2023_3337896
crossref_primary_10_1007_s11424_024_3291_0
crossref_primary_10_1177_10775463221130819
crossref_primary_10_1109_TIFS_2023_3340098
Cites_doi 10.1109/TCNS.2017.2690399
10.1002/rnc.4928
10.1007/s11432-020-3027-0
10.1109/TITS.2021.3053406
10.1109/TII.2016.2614396
10.1007/s11424-021-0160-y
10.1109/TCST.2015.2462741
10.1109/TCYB.2019.2912622
10.1080/00207721.2022.2143735
10.1016/j.automatica.2017.11.018
10.1109/TAC.2017.2741778
10.1016/j.isatra.2020.02.003
10.1080/00396338.2011.555586
10.1049/et.2010.0410
10.1109/TCST.2013.2280899
10.1109/TPWRD.2010.2050340
10.1016/j.ins.2019.01.001
10.1016/j.automatica.2020.109117
10.1109/TAC.2020.2981915
10.1109/TCNS.2018.2793664
10.1016/j.ins.2019.08.052
10.1109/TII.2020.2999571
10.1109/TSG.2016.2532347
10.1109/TCNS.2016.2570003
10.1007/s11432-019-2691-4
10.1109/TSG.2016.2620939
10.1109/TII.2015.2475695
10.1109/TCYB.2018.2871951
10.1016/j.automatica.2021.109555
10.1109/TIE.2016.2535119
10.1109/TCYB.2021.3068220
10.1109/TSMC.2021.3080278
10.1016/j.ins.2020.06.074
10.1109/TIE.2022.3217585
10.1109/JAS.2019.1911861
10.1109/TCYB.2023.3255583
ContentType Journal Article
Copyright The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023
The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023.
Copyright_xml – notice: The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023
– notice: The Editorial Office of JSSC & Springer-Verlag GmbH Germany 2023.
DBID AAYXX
CITATION
DOI 10.1007/s11424-022-2120-6
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Statistics
Mathematics
EISSN 1559-7067
EndPage 1422
ExternalDocumentID 10_1007_s11424_022_2120_6
GroupedDBID -5D
-5G
-BR
-EM
-SA
-S~
-Y2
-~C
.86
.VR
06D
0R~
0VY
1N0
29L
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
406
408
40D
40E
5GY
5VR
5VS
5XA
5XB
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAXDM
AAYIU
AAYQN
AAYTO
AAYZH
ABBBX
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFLOW
AFQWF
AFUIB
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AZFZN
B-.
BA0
BAPOH
BDATZ
BGNMA
BSONS
CAG
CAJEA
CCEZO
CCVFK
CHBEP
COF
CS3
CSCUP
CW9
DDRTE
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FA0
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HVGLF
HZ~
IJ-
IKXTQ
IWAJR
IXD
I~X
I~Z
J-C
JBSCW
JZLTJ
KDC
KOV
LLZTM
M4Y
MA-
N2Q
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P9R
PF0
PT4
Q--
QOS
R89
R9I
REI
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCL
SDH
SHX
SISQX
SJYHP
SMT
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TUC
U1G
U2A
U5K
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z81
Z83
Z88
ZMTXR
~A9
AAYXX
ABAKF
ABDBE
ABFSG
ACAOD
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
ABRTQ
ID FETCH-LOGICAL-c316t-d35e1073dd68306d647740ace5bd9e49f7bdceb95a79ff6bb4e9a582c732768c3
IEDL.DBID U2A
ISSN 1009-6124
IngestDate Fri Jul 25 11:20:00 EDT 2025
Thu Apr 24 23:04:27 EDT 2025
Tue Jul 01 01:25:52 EDT 2025
Fri Feb 21 02:43:24 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords False data injection attack
networked control systems (NCSs)
stability
stealthiness
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-d35e1073dd68306d647740ace5bd9e49f7bdceb95a79ff6bb4e9a582c732768c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2856413178
PQPubID 2044418
PageCount 16
ParticipantIDs proquest_journals_2856413178
crossref_citationtrail_10_1007_s11424_022_2120_6
crossref_primary_10_1007_s11424_022_2120_6
springer_journals_10_1007_s11424_022_2120_6
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-08-01
PublicationDateYYYYMMDD 2023-08-01
PublicationDate_xml – month: 08
  year: 2023
  text: 2023-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle Journal of systems science and complexity
PublicationTitleAbbrev J Syst Sci Complex
PublicationYear 2023
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Zhang, Han, Ge (CR3) 2020; 7
Zhang, Ye (CR31) 2020; 120
Conti (CR10) 2010; 5
Liu, Li (CR37) 2017; 8
CR16
Pang, Fan, Sun (CR21) 2021; 546
Ren, Yang (CR32) 2022; 52
Chen, Wang (CR13) 2020; 63
Chen, Kar, Moura (CR28) 2018; 63
Lee, Chen, Chen (CR9) 2010; 25
Pang, Fan, Guo (CR14) 2022; 53
Hou, Sun, Yang (CR15) 2022; 65
Wu, Wang, Sun (CR18) 2020; 65
Guo, Shi, Johansson (CR23) 2018; 89
Pang, Fan, Dong (CR36) 2022; 69
Hao, Piechocki, Kaleshi (CR34) 2015; 11
Mohammadali, Haghighi, Tadayon (CR2) 2018; 9
Wang, Sun, Chen (CR39) 2022; 52
Guo, Shi, Johansson (CR22) 2017; 4
Farwell, Rohozinski (CR8) 2011; 53
Guo, Shi, Johansson (CR25) 2019; 6
Pang, Liu, Zhou (CR27) 2016; 63
Pang, Luo, Liu (CR6) 2021; 68
CR7
Chen, Kar, Moura (CR29) 2018; 5
Zhang, Liu, Xia (CR30) 2020; 50
Farivar, Haghighi, Jolfaei (CR4) 2021; 22
Deng, Xiao, Lu (CR17) 2017; 13
Shang, Chen (CR26) 2021; 128
Lu, Yang (CR33) 2020; 508
Li, Yang (CR24) 2019; 481
Pang, Bai, Liu (CR1) 2021; 34
Mo, Chabukswar, Sinopoli (CR11) 2014; 22
Zhang, Cheng, Shi (CR12) 2016; 24
Yan, Guo, Wen (CR35) 2020; 101
Wang, Sun, Chen (CR5) 2020; 30
Jorjani, Seifi, Varjani (CR20) 2021; 17
Pang, Ma, Liu (CR38) 2022; 69
Li, Tang (CR19) 2020; 50
Y Chen (2120_CR28) 2018; 63
F Hou (2120_CR15) 2022; 65
2120_CR7
Z H Pang (2120_CR27) 2016; 63
A Y Lu (2120_CR33) 2020; 508
J Hao (2120_CR34) 2015; 11
Z H Pang (2120_CR6) 2021; 68
Z H Pang (2120_CR36) 2022; 69
Y Chen (2120_CR29) 2018; 5
R Deng (2120_CR17) 2017; 13
J Yan (2120_CR35) 2020; 101
H Zhang (2120_CR12) 2016; 24
M Jorjani (2120_CR20) 2021; 17
X Liu (2120_CR37) 2017; 8
C Lee (2120_CR9) 2010; 25
Z H Pang (2120_CR38) 2022; 69
Z Guo (2120_CR22) 2017; 4
Z Guo (2120_CR25) 2019; 6
Z Pang (2120_CR1) 2021; 34
T Y Zhang (2120_CR31) 2020; 120
Z H Pang (2120_CR21) 2021; 546
2120_CR16
Z Wang (2120_CR5) 2020; 30
X M Zhang (2120_CR3) 2020; 7
X Chen (2120_CR13) 2020; 63
Z Wang (2120_CR39) 2022; 52
Z Guo (2120_CR23) 2018; 89
F Li (2120_CR19) 2020; 50
F Farivar (2120_CR4) 2021; 22
Y Mo (2120_CR11) 2014; 22
Z H Pang (2120_CR14) 2022; 53
Y G Li (2120_CR24) 2019; 481
G Y Wu (2120_CR18) 2020; 65
J Shang (2120_CR26) 2021; 128
J P Farwell (2120_CR8) 2011; 53
A Mohammadali (2120_CR2) 2018; 9
X X Ren (2120_CR32) 2022; 52
J P Conti (2120_CR10) 2010; 5
Q Zhang (2120_CR30) 2020; 50
References_xml – volume: 69
  start-page: 149
  issue: 1
  year: 2022
  end-page: 153
  ident: CR36
  article-title: False data injection attacks against partial sensor measurements of networked control systems
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 5
  start-page: 1157
  issue: 3
  year: 2018
  end-page: 1168
  ident: CR29
  article-title: Optimal attack strategies subject to detection constraints against cyber-physical systems
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2017.2690399
– volume: 30
  start-page: 2906
  issue: 7
  year: 2020
  end-page: 2919
  ident: CR5
  article-title: Finite-time stability of switched nonlinear time-delay systems
  publication-title: Int. J. Robust Nonlinear Control
  doi: 10.1002/rnc.4928
– volume: 65
  start-page: 162201
  year: 2022
  ident: CR15
  article-title: Deep reinforcement learning for optimal denial-of-service attack scheduling
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-020-3027-0
– volume: 22
  start-page: 3824
  issue: 6
  year: 2021
  end-page: 3831
  ident: CR4
  article-title: On the security of networked control systems in smart vehicle and its adaptive cruise control
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2021.3053406
– ident: CR16
– volume: 13
  start-page: 411
  issue: 2
  year: 2017
  end-page: 423
  ident: CR17
  article-title: False data injection on state estimation in power systems-attacks, impacts, and defense: A survey
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2016.2614396
– volume: 34
  start-page: 1364
  issue: 4
  year: 2021
  end-page: 1378
  ident: CR1
  article-title: A novel networked predictive control method for systems with random communication constraints
  publication-title: Journal of Systems Science and Complexity
  doi: 10.1007/s11424-021-0160-y
– volume: 7
  start-page: 1
  issue: 1
  year: 2020
  end-page: 17
  ident: CR3
  article-title: Networked control systems: A survey of trends and techniques
  publication-title: IEEE/CAA J. Autom. Sin.
– volume: 24
  start-page: 843
  issue: 3
  year: 2016
  end-page: 852
  ident: CR12
  article-title: Optimal DoS attack scheduling in wireless networked control system
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2015.2462741
– volume: 50
  start-page: 3963
  issue: 9
  year: 2020
  end-page: 3972
  ident: CR30
  article-title: Optimal stealthy deception attack against cyber-physical systems
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2019.2912622
– volume: 53
  start-page: 3577
  issue: 16
  year: 2022
  end-page: 3598
  ident: CR14
  article-title: Security of networked control systems subject to deception attacks: A survey
  publication-title: Int. J. Syst. Sci.
  doi: 10.1080/00207721.2022.2143735
– volume: 69
  start-page: 4949
  issue: 12
  year: 2022
  end-page: 4953
  ident: CR38
  article-title: Data-driven adaptive control: An incremental triangular dynamic linearization approach
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 89
  start-page: 117
  year: 2018
  end-page: 124
  ident: CR23
  article-title: Worst-case stealthy innovation-based linear attack on remote state estimation
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.11.018
– volume: 63
  start-page: 1418
  issue: 5
  year: 2018
  end-page: 1425
  ident: CR28
  article-title: Cyber-physical attacks with control objectives
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2017.2741778
– volume: 101
  start-page: 225
  year: 2020
  end-page: 233
  ident: CR35
  article-title: False data injection against state estimation in power systems with multiple cooperative attackers
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2020.02.003
– volume: 53
  start-page: 23
  issue: 1
  year: 2011
  end-page: 40
  ident: CR8
  article-title: Stuxnet and the future of cyber war
  publication-title: Survival
  doi: 10.1080/00396338.2011.555586
– volume: 5
  start-page: 46
  issue: 4
  year: 2010
  end-page: 47
  ident: CR10
  article-title: The day the samba stopped [power blackouts]
  publication-title: Eng. Technol.
  doi: 10.1049/et.2010.0410
– volume: 22
  start-page: 1396
  issue: 4
  year: 2014
  end-page: 1407
  ident: CR11
  article-title: Detecting integrity attacks on SCADA systems
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2013.2280899
– volume: 25
  start-page: 2726
  issue: 4
  year: 2010
  end-page: 2733
  ident: CR9
  article-title: Lessons learned from the blackout accident at a nuclear power plant in taiwan
  publication-title: IEEE Trans. Power Del.
  doi: 10.1109/TPWRD.2010.2050340
– volume: 481
  start-page: 474
  year: 2019
  end-page: 490
  ident: CR24
  article-title: Optimal stealthy false data injection attacks in cyber-physical systems
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2019.01.001
– volume: 120
  start-page: 109
  year: 2020
  end-page: 117
  ident: CR31
  article-title: False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109117
– volume: 65
  start-page: 3919
  issue: 9
  year: 2020
  end-page: 3926
  ident: CR18
  article-title: Optimal partial feedback attacks in cyber-physical power systems
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.2981915
– volume: 6
  start-page: 48
  issue: 1
  year: 2019
  end-page: 59
  ident: CR25
  article-title: Worst-case innovation-based integrity attacks with side information on remote state estimation
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2018.2793664
– volume: 508
  start-page: 92
  year: 2020
  end-page: 104
  ident: CR33
  article-title: False data injection attacks against state estimation in the presence of sensor failures
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2019.08.052
– volume: 17
  start-page: 2465
  issue: 4
  year: 2021
  end-page: 2475
  ident: CR20
  article-title: A graph theory-based approach to detect false data injection attacks in power system AC state estimation
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2020.2999571
– volume: 8
  start-page: 2617
  issue: 6
  year: 2017
  end-page: 2626
  ident: CR37
  article-title: Local topology attacks in smart grids
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2016.2532347
– volume: 68
  start-page: 426
  issue: 1
  year: 2021
  end-page: 430
  ident: CR6
  article-title: Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 4
  start-page: 4
  issue: 1
  year: 2017
  end-page: 13
  ident: CR22
  article-title: Optimal linear cyber-attack on remote state estimation
  publication-title: IEEE Trans. Control Network Syst.
  doi: 10.1109/TCNS.2016.2570003
– volume: 63
  start-page: 150207
  issue: 5
  year: 2020
  ident: CR13
  article-title: Event-triggered attack-tolerant tracking control design for networked non-linear control systems under DoS jamming attacks
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-019-2691-4
– volume: 9
  start-page: 2834
  issue: 4
  year: 2018
  end-page: 2842
  ident: CR2
  article-title: A novel identity-based key establishment method for advanced metering infrastructure in smart grid
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2016.2620939
– volume: 11
  start-page: 1
  issue: 5
  year: 2015
  end-page: 12
  ident: CR34
  article-title: Sparse malicious false data injection attacks and defense mechanisms in smart grids
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2015.2475695
– volume: 50
  start-page: 729
  issue: 2
  year: 2020
  end-page: 738
  ident: CR19
  article-title: False data injection attack for cyber-physical systems with resource constraint
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2018.2871951
– volume: 128
  start-page: 109555
  year: 2021
  ident: CR26
  article-title: Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of hHistorical data
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109555
– volume: 63
  start-page: 3242
  issue: 5
  year: 2016
  end-page: 3251
  ident: CR27
  article-title: Two-channel false data injection attacks against output tracking control of networked systems
  publication-title: IEEE Trans. Ind. Electron.
  doi: 10.1109/TIE.2016.2535119
– ident: CR7
– volume: 52
  start-page: 11539
  issue: 11
  year: 2022
  end-page: 11548
  ident: CR32
  article-title: Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2021.3068220
– volume: 52
  start-page: 3947
  issue: 6
  year: 2022
  end-page: 3956
  ident: CR39
  article-title: Stability analysis of switched nonlinear systems with multiple time-varying delays
  publication-title: IEEE Trans. Syst. Man Cybern. -Syst.
  doi: 10.1109/TSMC.2021.3080278
– volume: 546
  start-page: 192
  year: 2021
  end-page: 205
  ident: CR21
  article-title: Detection of stealthy false data injection attacks against networked control systems via active data modification
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.06.074
– volume: 68
  start-page: 426
  issue: 1
  year: 2021
  ident: 2120_CR6
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 53
  start-page: 23
  issue: 1
  year: 2011
  ident: 2120_CR8
  publication-title: Survival
  doi: 10.1080/00396338.2011.555586
– volume: 50
  start-page: 729
  issue: 2
  year: 2020
  ident: 2120_CR19
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2018.2871951
– volume: 63
  start-page: 3242
  issue: 5
  year: 2016
  ident: 2120_CR27
  publication-title: IEEE Trans. Ind. Electron.
  doi: 10.1109/TIE.2016.2535119
– volume: 17
  start-page: 2465
  issue: 4
  year: 2021
  ident: 2120_CR20
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2020.2999571
– volume: 120
  start-page: 109
  year: 2020
  ident: 2120_CR31
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109117
– volume: 34
  start-page: 1364
  issue: 4
  year: 2021
  ident: 2120_CR1
  publication-title: Journal of Systems Science and Complexity
  doi: 10.1007/s11424-021-0160-y
– ident: 2120_CR7
  doi: 10.1109/TIE.2022.3217585
– volume: 22
  start-page: 1396
  issue: 4
  year: 2014
  ident: 2120_CR11
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2013.2280899
– volume: 53
  start-page: 3577
  issue: 16
  year: 2022
  ident: 2120_CR14
  publication-title: Int. J. Syst. Sci.
  doi: 10.1080/00207721.2022.2143735
– volume: 5
  start-page: 46
  issue: 4
  year: 2010
  ident: 2120_CR10
  publication-title: Eng. Technol.
  doi: 10.1049/et.2010.0410
– volume: 4
  start-page: 4
  issue: 1
  year: 2017
  ident: 2120_CR22
  publication-title: IEEE Trans. Control Network Syst.
  doi: 10.1109/TCNS.2016.2570003
– volume: 63
  start-page: 150207
  issue: 5
  year: 2020
  ident: 2120_CR13
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-019-2691-4
– volume: 546
  start-page: 192
  year: 2021
  ident: 2120_CR21
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2020.06.074
– volume: 13
  start-page: 411
  issue: 2
  year: 2017
  ident: 2120_CR17
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2016.2614396
– volume: 6
  start-page: 48
  issue: 1
  year: 2019
  ident: 2120_CR25
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2018.2793664
– volume: 101
  start-page: 225
  year: 2020
  ident: 2120_CR35
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2020.02.003
– volume: 30
  start-page: 2906
  issue: 7
  year: 2020
  ident: 2120_CR5
  publication-title: Int. J. Robust Nonlinear Control
  doi: 10.1002/rnc.4928
– volume: 5
  start-page: 1157
  issue: 3
  year: 2018
  ident: 2120_CR29
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2017.2690399
– volume: 52
  start-page: 3947
  issue: 6
  year: 2022
  ident: 2120_CR39
  publication-title: IEEE Trans. Syst. Man Cybern. -Syst.
  doi: 10.1109/TSMC.2021.3080278
– volume: 22
  start-page: 3824
  issue: 6
  year: 2021
  ident: 2120_CR4
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2021.3053406
– volume: 8
  start-page: 2617
  issue: 6
  year: 2017
  ident: 2120_CR37
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2016.2532347
– volume: 69
  start-page: 4949
  issue: 12
  year: 2022
  ident: 2120_CR38
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 25
  start-page: 2726
  issue: 4
  year: 2010
  ident: 2120_CR9
  publication-title: IEEE Trans. Power Del.
  doi: 10.1109/TPWRD.2010.2050340
– volume: 63
  start-page: 1418
  issue: 5
  year: 2018
  ident: 2120_CR28
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2017.2741778
– volume: 11
  start-page: 1
  issue: 5
  year: 2015
  ident: 2120_CR34
  publication-title: IEEE Trans. Ind. Informat.
  doi: 10.1109/TII.2015.2475695
– volume: 24
  start-page: 843
  issue: 3
  year: 2016
  ident: 2120_CR12
  publication-title: IEEE Trans. Control Syst. Technol.
  doi: 10.1109/TCST.2015.2462741
– volume: 128
  start-page: 109555
  year: 2021
  ident: 2120_CR26
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109555
– volume: 65
  start-page: 3919
  issue: 9
  year: 2020
  ident: 2120_CR18
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.2981915
– volume: 69
  start-page: 149
  issue: 1
  year: 2022
  ident: 2120_CR36
  publication-title: IEEE Trans. Circuits Syst. II, Exp. Briefs
– volume: 508
  start-page: 92
  year: 2020
  ident: 2120_CR33
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2019.08.052
– volume: 89
  start-page: 117
  year: 2018
  ident: 2120_CR23
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.11.018
– volume: 7
  start-page: 1
  issue: 1
  year: 2020
  ident: 2120_CR3
  publication-title: IEEE/CAA J. Autom. Sin.
  doi: 10.1109/JAS.2019.1911861
– ident: 2120_CR16
  doi: 10.1109/TCYB.2023.3255583
– volume: 50
  start-page: 3963
  issue: 9
  year: 2020
  ident: 2120_CR30
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2019.2912622
– volume: 52
  start-page: 11539
  issue: 11
  year: 2022
  ident: 2120_CR32
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2021.3068220
– volume: 481
  start-page: 474
  year: 2019
  ident: 2120_CR24
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2019.01.001
– volume: 9
  start-page: 2834
  issue: 4
  year: 2018
  ident: 2120_CR2
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2016.2620939
– volume: 65
  start-page: 162201
  year: 2022
  ident: 2120_CR15
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-020-3027-0
SSID ssj0036908
Score 2.4468465
Snippet This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is proposed to...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1407
SubjectTerms Closed loops
Complex Systems
Control
Control systems
Feedback control
Kalman filters
Mathematics
Mathematics and Statistics
Mathematics of Computing
Network control
Operations Research/Decision Theory
Statistics
Systems Theory
Title Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
URI https://link.springer.com/article/10.1007/s11424-022-2120-6
https://www.proquest.com/docview/2856413178
Volume 36
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0oXPBgFDWiSPbgSdME2u3HemsQRA2cIMFTs59EQ4qR-v-d7QeoUROPTds99G1n5mXfvAG41JS6RkrmGK6ZgylAOkwi51FcRVILxYtZBONJMJrRh7k_L_u415XavTqSzCP1ttnNNmU5Vn2O4RY5zy7UfUvdcRPP3LgKvx7SvaL_rcuQF7m0Osr8aYmvyWhbYX47FM1zzfAA9ssikcQFqoewo9Mm7H2yDsSr8cZvdd2Ehq0ZC8vlI1hURiNkZYjV6y4RDDLEfabJLc84uU9fcgFWSuIssz32JF7wZ6wTyaQQhWtF-oWEnZSO5jdkiqBr0sekR0rt4THMhoNpf-SU8xQc6fWCzFGer5HteUoFETIFZXtQaZdL7QvFNGUmFArxYT4PmTGBEFQz7keuDD0XWYn0TqCWrlJ9CkT0dBgYjAaBK2iX8oiZnsJgIY1LI6FpC7rVh01kaTZuZ14sk61NssUiQSwSi0UStOBq88pr4bTx18PtCq2k_OnWiRv5AebkXhi14LpCcHv718XO_vX0OTTsyPlCBNiGWvb2ri-wMMlEB-rx3dPjoJNvyA-kytsU
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEJ0oHsSDUdSIou7Bk6ZJabcf642gBBQ4QcKt2U-iIcVI_f_O0paqUROPTds99G1n5mXfvAG41pR6RkrmGK6ZgylAOkwi51FcxVILxfNZBKNx2J_Sx1kwK_q4V6XavTySXEfqqtnNNmU5Vn2O4RY5zzbsYC0QWx3X1OuU4ddHupf3v7kMeZFHy6PMn5b4moyqCvPboeg61_QOYL8oEkknR_UQtnTagL1P1oF4Ndr4ra4aULc1Y265fATz0miELA2xet0FgkF6uM80uecZJ4P0ZS3ASkkny2yPPenM-TPWiWSci8K1It1cwk4KR_M7MkHQNeli0iOF9vAYpr2HSbfvFPMUHOm3w8xRfqCR7flKhTEyBWV7UKnLpQ6EYpoyEwmF-LCAR8yYUAiqGQ9iT0a-h6xE-idQS5epPgUi2joKDUaD0BPUpTxmpq0wWEjj0Vho2gS3_LCJLMzG7cyLRVLZJFssEsQisVgkYRNuNq-85k4bfz3cKtFKip9ulXhxEGJObkdxE25LBKvbvy529q-nr2C3PxkNk-Fg_HQOdTt-PhcEtqCWvb3rCyxSMnG53pQfPMfccw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH64gNSDuGJd5-BJCW2TyTLeQmtxa_HQQm9h1qKUKDb-f990EqOigseQyRzyvXkL873vAZxpSn0jJfMM18zDECA9JrHmUVwlUgvF3SyCwTC6HtPbSTgp55zOK7Z7dSXpehqsSlNetF6UadWNb7ZBy7NMdHS9WP8swyp6444167GfVq44wNLP9cK1GdZIPq2uNX_a4mtgqrPNbxeki7jT34SNMmEkqUN4C5Z0vg3rn2QE8Wnwob0634aGzR-d_PIOTCvREfJsiOXuzhAY0keb06THC05u8qcFGSsnaVHYfnuSTvkj5oxk6AjiWpGuo7OTUt38kozQADTpYgAkJQ9xF8b9q1H32itnK3gy6ESFp4JQY-UXKBUlWDUo249K21zqUCimKTOxUIgVC3nMjImEoJrxMPFlHPhYochgD1by51zvAxEdHUcGPUPkC9qmPGGmo9BxSOPTRGjahHb1YzNZCo_b-RezrJZMtlhkiEVmsciiJpx_fPLiVDf-WnxUoZWVB3Ce-UkYWYuIkyZcVAjWr3_d7OBfq09h7aHXz-5vhneH0LCT6B038AhWitc3fYz5SiFOFjb5Dh_n4K8
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+Stealthy+False+Data+Injection+Attacks+Against+Networked+Control+Systems%3A+Three+Case+Studies&rft.jtitle=Journal+of+systems+science+and+complexity&rft.au=Pang+Zhonghua&rft.au=Fu%2C+Yuan&rft.au=Guo+Haibin&rft.au=Sun%2C+Jian&rft.date=2023-08-01&rft.pub=Springer+Nature+B.V&rft.issn=1009-6124&rft.eissn=1559-7067&rft.volume=36&rft.issue=4&rft.spage=1407&rft.epage=1422&rft_id=info:doi/10.1007%2Fs11424-022-2120-6&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1009-6124&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1009-6124&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1009-6124&client=summon