2023
DOI: 10.1109/jetcas.2023.3253483
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Security Control Against False Data Injection Attacks in Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…to predict the sensor data, and then the predicted data are compared to the actual data [8]. Some attempts have been made to build predictive models to detect FDIAs through the dynamical equations of smart grids [9,10], unmanned aerial vehicles [11], water distribution systems [12], and cyber-physical systems [13][14][15]. However, this detection approach requires appropriate predictive models for specific domains and relies on a priori knowledge of specific physical behaviors, which allows for limited scalability.…”
Section: Fdia Detection Methodsmentioning
confidence: 99%
“…to predict the sensor data, and then the predicted data are compared to the actual data [8]. Some attempts have been made to build predictive models to detect FDIAs through the dynamical equations of smart grids [9,10], unmanned aerial vehicles [11], water distribution systems [12], and cyber-physical systems [13][14][15]. However, this detection approach requires appropriate predictive models for specific domains and relies on a priori knowledge of specific physical behaviors, which allows for limited scalability.…”
Section: Fdia Detection Methodsmentioning
confidence: 99%
“…Due to limited energy, the attacker cannot carry out attacks arbitrarily, so ψ a and ϖ are bounded. [12,13,23] ϱ = 1 time-varying (6) in [15,19] ϱ is time-varying and satisfies 0 < ϱ min ≤ ϱ ≤ ϱmax time-varying (6) ϱ ̸ = 0 is a constant time-varying…”
Section: System Description and Control Objectivementioning
confidence: 99%
“…For linear CPS under sensor attacks, the adaptive security control strategy was first proposed in [11]. Afterward, researchers began to study the security control problems of nonlinear CPS [12][13][14][15][16][17][18]. In [15], both deception attacks and injection attacks were considered for a second-order nonlinear system.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations