2017 25th Mediterranean Conference on Control and Automation (MED) 2017
DOI: 10.1109/med.2017.7984246
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-attack detection in the networked control system with faulty plant

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…In equations ( 48)- (50), the same dimension effect is studied. Upper limitation for error filtering covariance has been studied in [31].…”
Section: Deception Attack Detection or Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…In equations ( 48)- (50), the same dimension effect is studied. Upper limitation for error filtering covariance has been studied in [31].…”
Section: Deception Attack Detection or Identificationmentioning
confidence: 99%
“…For modeling of distributed state estimator, event triggered scheme is applied to the wireless sensor network for false data injection attack [31,154]. Each sensor estimate is checked if it attacked at all-time step before transmission of data to nearby sensor, and it may stop in case of attacked.…”
Section: Deception Attack Detection or Identificationmentioning
confidence: 99%
“…Although many achievements have been made in fault tolerance and attack tolerance of NCS, most of them are limited to independent design. For NCS with actuator failure and network attack coexisting, the research on comprehensive security control of fault tolerance and intrusion tolerance is rarely involved, and only literature [14] and literature [15] can be consulted at present. However, in actual NCS, it is inevitable that faults and attacks occur simultaneously.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with the passive form, active attack tolerance can deal with many types of unknown cyber-attacks, and reduces the conservativeness of the control strategy. Yaseen and Bayart (2016, 2017) and Zhang et al (2018) adopt the intelligent generalized predictive controller to detect, identify and distinguish faults and cyber-attacks, and design fault-tolerant and attack-tolerant strategy against faults, hijacking attacks and spoofing attacks respectively. Du et al (2018) use a convex optimization method to balance the sparsity and magnitude of attack vectors, such that attacks can be detected with high probability.…”
Section: Introductionmentioning
confidence: 99%