2021
DOI: 10.1109/tcns.2020.3030002
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…22 For this reason, the spoofing characteristics of FDIAs can fool the above security detection mechanisms. In Guo et al, 23 Guo et al analyzed the spoofing feature of FDIAs, and given the optimal attack strategy. In Kwon et al, 24 three kinds of stealthy FDIAs were studied based on the ability of attackers.…”
Section: Introductionmentioning
confidence: 99%
“…22 For this reason, the spoofing characteristics of FDIAs can fool the above security detection mechanisms. In Guo et al, 23 Guo et al analyzed the spoofing feature of FDIAs, and given the optimal attack strategy. In Kwon et al, 24 three kinds of stealthy FDIAs were studied based on the ability of attackers.…”
Section: Introductionmentioning
confidence: 99%
“…In Manandhar et al (2014), the problem of fault and false data injection attack detection in smart grids is investigated using the Kalman filter. The problem of attack allocation with resource constraints is studied in Guo et al (2020) where the communication channels are jammed with false data injection attacks.…”
Section: Introductionmentioning
confidence: 99%
“…To sum up, lots of detection methods against Dos attacks were developed to ensure the safety of vehicle networking systems. Different from the above Dos attacks, the emerging false data injection (FDI) attacks are more deceptive [15][16][17]. By tampering with the transmitted data, the FDI attacks can spoof the common detection method.…”
Section: Introductionmentioning
confidence: 99%
“…To respond to the FDI attacks timely, scholars have carried out some research on the security of vehicle networking systems under FDI attacks [16][17][18][19][20]. In [16], L. Guo et al investigated the covert characteristics of FDI attacks and gave the optimal attack strategies with respect to the cyber-physical system of intelligent vehicle networking. In addition, the FDI attack was modeled as an additive attack that affects the vehicle platoon, and a new assessment method was developed [17].…”
Section: Introductionmentioning
confidence: 99%