2020
DOI: 10.1016/j.conengprac.2020.104509
|View full text |Cite
|
Sign up to set email alerts
|

A resilient framework for sensor-based attacks on cyber–physical systems using trust-based consensus and self-triggered control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Pre and postmultiplying (19), respectively, by [x k w k ] and its transpose, and considering (18), it follows that:…”
Section: Design Of the H ∞ State-feedback Controllermentioning
confidence: 99%
See 1 more Smart Citation
“…Pre and postmultiplying (19), respectively, by [x k w k ] and its transpose, and considering (18), it follows that:…”
Section: Design Of the H ∞ State-feedback Controllermentioning
confidence: 99%
“…In particular, this article focuses on secure control against deception attacks, which, while attracting growing interest, is still in an early stage. On this subject, most approaches for mitigating deception attacks are based on the assumption that some sensors/actuators are not compromised (sparse attacks) [14]- [16], in exploiting the analytical redundancy obtained in the context of distributed systems [4], [7], [17], [18] or in the use of stochastic models with known distribution parameters for modeling the attacks [19]- [22]. Whereas the above approaches are efficient under the proposed assumptions, the real attacker behavior may be incompatible with those attack models and/or the safe redundancy may be unavailable.…”
mentioning
confidence: 99%
“…[130], [131], [132], [133], [134], [135], [136] Node MTD ✓ ✓ ✓ ✓ ✓ [137], [149], [150], [141], [132], [133], [146], [150], [145], [146] [147], [148] Dynamic Software Evolution ✓ ✓ ✓ [151], [87], [152], [153] Consensus & Distributed Trust ✓ ✓ ✓ ✓ [160], [161], [162], [163], [164],…”
Section: Risk Management Vs Cyber-resiliencementioning
confidence: 99%
“…In this case, at each update, the controller ignores suspicious values and computes the control input with the non-suspicious values. For example, using Distributed Kalman Filter for resilient state estimation [162,163] or other distributed observers strategies to manage sensor compromise [161,186]. Other strategies are distributed function calculation in the presence of malicious agents [160], distributed multi-agent consensus [154,155,164,187,188], resilient vector consensus [156,158] and resilient leader-followers consensus approaches [157,159].…”
Section: 34mentioning
confidence: 99%
“…In [9], a resilient control strategy is proposed to realize the desired trajectory tracking of CPSs under false data injection attacks. In [10], the author proposes an attack-tolerance control combined with a self-triggering mechanism that can perceive communication, which increases the data fidelity of sensors in CPSs. For the linear cyber-physical systems under physical fault and false data injection attacks, paper [11] introduces an event trigger mechanism and proposes an observer-based output feedback control strategy.…”
Section: Introductionmentioning
confidence: 99%