2018
DOI: 10.1109/tsipn.2017.2749959
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks

Abstract: This paper is concerned with the problem of joint distributed attack detection and distributed secure estimation for a networked cyber-physical system under physical and cyber attacks. The system is monitored by a wireless sensor network in which a group of sensors is spatially distributed and the sensors' measurements are broadcast to remote estimators via a wireless network medium. A malicious adversary simultaneously launches a false data injection attack at the physical system layer to intentionally modify… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
131
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 278 publications
(132 citation statements)
references
References 33 publications
0
131
0
1
Order By: Relevance
“…The relationship between the attack signal e k and the biases k , k+1 has been discussed in detail, and the impact of the attack signal e k on the Kalman filter of system, the controller and the 2 attack detector has been modeled as the system model (11). Next, based on the model (11), the coordinated attack strategy will be formulated.…”
Section: Attack Effectmentioning
confidence: 99%
See 2 more Smart Citations
“…The relationship between the attack signal e k and the biases k , k+1 has been discussed in detail, and the impact of the attack signal e k on the Kalman filter of system, the controller and the 2 attack detector has been modeled as the system model (11). Next, based on the model (11), the coordinated attack strategy will be formulated.…”
Section: Attack Effectmentioning
confidence: 99%
“…in which k is the states of the system (11), and r k is the external signal designed by the attacker and belongs to L 2 [0, ∞). K 1 andK 2 are the gains to be designed.…”
Section: Assumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…C ONTROLLABILITY and observability of networked systems arise in situations where a group of interconnected devices are influenced or observed by an external entity; examples range from classical applications in robotic systems, multi-agent networks, and sensor networks, to more recent emerging areas that include social networks, Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) [2]- [9]. In all of these applications, there is a layered network that connects individuals and objects leading to a significant interest in composite networks [10]- [14].…”
Section: Introductionmentioning
confidence: 99%
“…Compared to the approaches used in previous works [12], [13], [14], [15], [17], etc. we are interested here in the impact of a smart jammer on the transmitter power levels during the period that starts at the first attempt of a packet transmission until the next packet transmission first attempt, due to the fact that when re-transmissions are used, the jammers cause the effective network activity factor (and hence the interference among the Receiver Sides (RSs) to be doubled [24].…”
Section: Introductionmentioning
confidence: 99%