2017 American Control Conference (ACC) 2017
DOI: 10.23919/acc.2017.7963229
|View full text |Cite
|
Sign up to set email alerts
|

Secure state estimation for Cyber Physical Systems with sparse malicious packet drops

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Towards that, Choo et al [111] proposed a wavelet-based approach that is able to identify malicious data injection (providing counteract), in wireless sensor networks, and distinguish them from faulty behaviours. Cyber security is also a concern of Fiore et al [112], who aim to ensure secure-state estimation of UAV systems under sparse attacks. Indeed, many situations can be regarded as satisfiability problems and solved, for instance with approaches based on SMT [113][114][115], which indicate many links with other research areas and might lead to a unified approach regarding system verification, security enforcement, and interaction handling.…”
Section: Discussion Regarding Formal Verification Of Cyber-physical Smentioning
confidence: 99%
“…Towards that, Choo et al [111] proposed a wavelet-based approach that is able to identify malicious data injection (providing counteract), in wireless sensor networks, and distinguish them from faulty behaviours. Cyber security is also a concern of Fiore et al [112], who aim to ensure secure-state estimation of UAV systems under sparse attacks. Indeed, many situations can be regarded as satisfiability problems and solved, for instance with approaches based on SMT [113][114][115], which indicate many links with other research areas and might lead to a unified approach regarding system verification, security enforcement, and interaction handling.…”
Section: Discussion Regarding Formal Verification Of Cyber-physical Smentioning
confidence: 99%
“…While there are numerous works on the topic, most of them focus on attack-resilient algorithms that consider measurement noise [11], [12], time varying attack support [13], robustness considerations [14] and distributed case [15]. There are also numerous applications including power systems [16], UAVs [17], energy delivery systems [18], autonomous vehicles and networked systems. In contrast with work that utilizes prior information for resilient estimation [19], [20], our work, despite assuming the knowledge of location of ACEs nodes in the topology of the CPES does not assume any information acquired from such nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Following that, a number of papers have either modified or extended the framework to include measurement noise [16], [17], time varying attack support [18], robustness considerations [19] and distributed case [20]. There are also numerous applications including but not limited to; power systems [7], UAVS [18], [21], energy delivery systems [22], autonomous vehicles and networked systems.…”
Section: Introductionmentioning
confidence: 99%