A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 11 Issue 4
Apr.  2024

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
H. Guo, Z.-H. Pang, and C. Li, “Side information-based stealthy false data injection attacks against multi-sensor remote estimation,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 4, pp. 1054–1056, Apr. 2024. doi: 10.1109/JAS.2023.124086
Citation: H. Guo, Z.-H. Pang, and C. Li, “Side information-based stealthy false data injection attacks against multi-sensor remote estimation,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 4, pp. 1054–1056, Apr. 2024. doi: 10.1109/JAS.2023.124086

Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation

doi: 10.1109/JAS.2023.124086
More Information
  • loading
  • [1]
    D. Ding, Q.-L. Han, X. Ge, and J. Wang, “Secure state estimation and control of cyber-physical systems: A survey,” IEEE Trans. Syst. Man Cybern.: Syst., vol. 51, no. 1, pp. 176–190, Jan. 2021. doi: 10.1109/TSMC.2020.3041121
    [2]
    C.-B. Zheng, Z.-H. Pang, J.-X. Wang, J. Sun, G.-P. Liu, and Q.-L. Han, “Null-space-based time-varying formation control of uncertain nonlinear second-order multi-agent systems with collision avoidance,” IEEE Trans. Ind. Electron., vol. 70, no. 10, pp. 10476–10485, Oct. 2023. doi: 10.1109/TIE.2022.3217585
    [3]
    H. Guo, J. Sun, Z.-H. Pang, and G.-P. Liu, “Event-based optimal stealthy false data injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, Oct. 2023. doi: 10.1109/TCYB.2023.3255583
    [4]
    M. Xie, D. Ding, X. Ge, Q.-L. Han, H. Dong, and Y. Song, “Distributed platooning control of automated vehicles subject to replay attacks based on proportional integral observers,” IEEE/CAA J. Autom. Sinica, 2022. DOI: 10.1109/JAS.2022.105941
    [5]
    Z.-H. Pang, L.-Z. Fan, H. Guo, Y. Shi, R. Chai, J. Sun, and G. -P. Liu, “Security of networked control systems subject to deception attacks: A survey,” Int. J. Syst. Sci., vol. 53, no. 16, pp. 3577–3598, Dec. 2022. doi: 10.1080/00207721.2022.2143735
    [6]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyber-attack on remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 4, no. 1, pp. 4–13, Mar. 2017. doi: 10.1109/TCNS.2016.2570003
    [7]
    H. Liu, Y. Ni, L. Xie, and K. H. Johansson, “How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks,” Automatica, vol. 136, p. 110079, Feb. 2022. doi: 10.1016/j.automatica.2021.110079
    [8]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case innovation-based integrity attacks with side information on remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 6, no. 1, pp. 48–59, Mar. 2019. doi: 10.1109/TCNS.2018.2793664
    [9]
    D. Ye, B. Yang, and T.-Y. Zhang, “Optimal stealthy linear attack on remote state estimation with side information,” IEEE Syst. J., vol. 16, no. 1, pp. 1499–1507, Mar. 2022. doi: 10.1109/JSYST.2021.3063735
    [10]
    Y. Li, L. Shi, and T. Chen, “Detection against linear deception attacks on multi-sensor remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 3, pp. 846–856, 2018. doi: 10.1109/TCNS.2017.2648508
    [11]
    H. Guo, J. Sun, and Z.-H. Pang, “Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems,” ISA Trans., vol. 127, pp. 32–40, Aug. 2022. doi: 10.1016/j.isatra.2022.02.045
    [12]
    H. Guo, J. Sun, and Z.-H. Pang, “Residual-based false data injection attacks against multi-sensor estimation systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 5, pp. 1181–1191, May 2023. doi: 10.1109/JAS.2023.123441
    [13]
    Q. Zhang, K. Liu, D. Han, G. Su, and Y. Xia, “Design of stealthy deception attacks with partial system knowledge,” IEEE Trans. Autom. Control, vol. 68, no. 2, pp. 1069–1076, Feb. 2023. doi: 10.1109/TAC.2022.3146079
    [14]
    Z.-H. Pang, W.-C. Luo, G.-P. Liu, and Q.-L. Han, “Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 68, no. 1, pp. 426–430, Jan. 2021.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)

    Article Metrics

    Article views (86) PDF downloads(21) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return