2021
DOI: 10.1109/access.2021.3049228
|View full text |Cite
|
Sign up to set email alerts
|

A Controllable False Data Injection Attack for a Cyber Physical System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…For the extensive part of CPSs application, multiple subjects have been studied, for example, stability analysis, 4 fault detection, 15,16 fault‐tolerant control, 17 attack‐tolerant control, 18 filtering, 19,20 observer‐based control, 21 security problems, 22 backstepping control, 23 adaptive control, 6,24 H$$ {H}_{\infty }- $$ control, 25 and various robust control 26,27 . The security problems of CPSs are not novel for the control area, especially in the fault tolerant control field and also fault detection, but whereas CPSs are connected to the Internet for remote monitoring and controlling system, they become more vulnerable to various types of attack such as false data injection attacks, 5,28 denial‐of‐service (DoS) attacks, 29–31 replay attacks, 32 deception attacks, 33 integrity attacks, 34 malware attack, 35 and so on. These security problems are very important and are necessary to extensive attention.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the extensive part of CPSs application, multiple subjects have been studied, for example, stability analysis, 4 fault detection, 15,16 fault‐tolerant control, 17 attack‐tolerant control, 18 filtering, 19,20 observer‐based control, 21 security problems, 22 backstepping control, 23 adaptive control, 6,24 H$$ {H}_{\infty }- $$ control, 25 and various robust control 26,27 . The security problems of CPSs are not novel for the control area, especially in the fault tolerant control field and also fault detection, but whereas CPSs are connected to the Internet for remote monitoring and controlling system, they become more vulnerable to various types of attack such as false data injection attacks, 5,28 denial‐of‐service (DoS) attacks, 29–31 replay attacks, 32 deception attacks, 33 integrity attacks, 34 malware attack, 35 and so on. These security problems are very important and are necessary to extensive attention.…”
Section: Introductionmentioning
confidence: 99%
“…In the field of the CPSs, various resilient control strategies have been studied in Reference 1,4–7,9–30. Moreover, to the best of the authors' knowledge, very little considerations have been paid for the robust controller design problem of CPSs and no investigation is provided regarding CPSs under external disturbances and actuator cyber‐attacks in the finite time through adaptive TSM control technique.…”
Section: Introductionmentioning
confidence: 99%
“…For the wide part of CPSs operation, numerous matters have been investigated, such as stability analysis, 2 security problems, 8 filtering, 13,14 attack‐tolerant control, 15 fault‐tolerant control, 16 fault detection, 17,18 observer‐based control, 19 backstepping control, 20 adaptive control, 7,21 H$$ {H}^{\infty } $$ control, 22 and various robust control 23,24 . Insomuch as CPSs are connected to the internet for remote monitoring and controlling system, they have become much vulnerable to attack different types such as, false data injection attacks, 3,25 replay attacks, 8 deception attacks, 26 integrity attacks, 27 malware attack, 28 and Denial‐of‐Service (DoS) attacks 29–31 . These security problems are very important to immense attention.…”
Section: Introductionmentioning
confidence: 99%
“…Observer–based H$$ {H}^{\infty } $$ control method is proposed in Reference 22 for the CPSs subject to DoS jamming attacks. A controllable false data injection attack for a CPS is applied in Reference 25, and an adaptive fault estimation for CPSs with alternating DoS attacks have been suggested in Reference 29. In the Reference 30 distributed CPSs stabilization method under DoS attack is proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation