2022
DOI: 10.1002/itl2.399
|View full text |Cite
|
Sign up to set email alerts
|

False data injection attacks detection based on Laguerre function in nonlinear Cyber‐Physical systems

Abstract: This paper focus on the detection for false data injection (FDI) attacks. Under external conditions, the state and the output variables of Nonlinear Cyber‐Physical Systems (NCPSs) cannot be described by a linear relationship. It is difficult to detect the attacked systems. The Laguerre function model has excellent approximation capability to change structural parameters such as system delay and order, making it convenient for online parameter identification and suitable for complex industrial process control. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The repressive attacks can destroy the integrity of the information by suppressing the transmission of information, leading to the failure of the UAV to fly normally or even crash, such as Denial of Service (DoS) attacks 5 and black hole attacks. Deceptive attacks often disrupt the availability of data and information through data tampering, such as false data injection (FDI) attacks 6 and reply attacks 7 . Once the transmission signal sent by GCS to the UAV is monitored and intercepted, the attack signals are designed by mimicking the transmission signals.…”
Section: Introductionmentioning
confidence: 99%
“…The repressive attacks can destroy the integrity of the information by suppressing the transmission of information, leading to the failure of the UAV to fly normally or even crash, such as Denial of Service (DoS) attacks 5 and black hole attacks. Deceptive attacks often disrupt the availability of data and information through data tampering, such as false data injection (FDI) attacks 6 and reply attacks 7 . Once the transmission signal sent by GCS to the UAV is monitored and intercepted, the attack signals are designed by mimicking the transmission signals.…”
Section: Introductionmentioning
confidence: 99%
“…It is necessary to establish a data market to promote the flow of data among data owners and potential buyer (i.e., data transaction), where a reasonable data pricing model is one of the significant breaking points. However, there may be sensitive information contained in CPS data, 3 making privacy become a critical concern for data sellers. Thus, the privacy loss should be compensated in the data pricing model.…”
Section: Introductionmentioning
confidence: 99%
“…In the dominion of cybersecurity, DL methods are utilized for analyzing system logs, network traffic, and user behaviours, discriminating anomalous patterns representative of different cyberattacks, namely denial-ofservice (Dos), malware propagation, and intrusion attempt attacks [8]. By encrypting contextual relationships and extracting deep-level features, these techniques improved the accuracy of attack detection, thus fortifying defence approaches and allowing fast responses to developing attacks [9]. The adaptability of DL methods for actively developing attack approaches location them as crucial tools in preventative and real-time identification, alleviating risks, and reinforcing the security condition of digital environments [10].…”
Section: Introductionmentioning
confidence: 99%