2013
DOI: 10.1016/j.automatica.2012.09.007
|View full text |Cite
|
Sign up to set email alerts
|

Security of interdependent and identical networked control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
103
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 210 publications
(105 citation statements)
references
References 12 publications
1
103
0
1
Order By: Relevance
“…As for attack-resilient control, the papers [2], [32], [33] are devoted to studying deception attacks, where attackers intentionally modify measurements and control commands. Denial-of-service (DoS) attacks destroy the data availability in control systems and are tackled in recent papers [1], [3], [4], [9]. More specifically, the papers [1], [9] formulate finite-horizon LQG control problems as dynamic zero-sum games between the controller and the jammer.…”
Section: Edu) S Martínez Is With the Department Of Mechanical And Amentioning
confidence: 99%
See 1 more Smart Citation
“…As for attack-resilient control, the papers [2], [32], [33] are devoted to studying deception attacks, where attackers intentionally modify measurements and control commands. Denial-of-service (DoS) attacks destroy the data availability in control systems and are tackled in recent papers [1], [3], [4], [9]. More specifically, the papers [1], [9] formulate finite-horizon LQG control problems as dynamic zero-sum games between the controller and the jammer.…”
Section: Edu) S Martínez Is With the Department Of Mechanical And Amentioning
confidence: 99%
“…More specifically, the papers [1], [9] formulate finite-horizon LQG control problems as dynamic zero-sum games between the controller and the jammer. In [3], the authors investigate the security independency in infinite-horizon LQG against DoS attacks, and fully characterize the equilibrium of the induced game. In our paper [35], a distributed receding-horizon control law is proposed to ensure that vehicles reach the desired formation despite the DoS and replay attacks.…”
Section: Edu) S Martínez Is With the Department Of Mechanical And Amentioning
confidence: 99%
“…It becomes obvious that z 0 is an invariant zero [22] of the detector error dynamic (6). Then by Theorem 1, the cyber-attack a k (t) as t = z 0 is undetectable.…”
Section: Proof (If) Since the Expectation Of Stochastic Matrix E(q(s))mentioning
confidence: 99%
“…In recent years, the problem of cyber-attacks on controlled systems has been realized and it is currently attracting considerable attention (see e.g. [6]- [21]). For example, S. Amin [6] and D. G. Eliades [13] did research on the cyber security of water systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation