2022
DOI: 10.1016/j.automatica.2022.110461
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…With the increasing number of networked control scenarios, secure control under network attacks is already a hot research topic. In general, network attacks are usually divided into DoS attack [16], [17], deceive attack [18], [19], replay attack [20], malicious attack [21], and so on. The hybrid attack model were considered in [22], [23] .…”
Section: Introductionmentioning
confidence: 99%
“…With the increasing number of networked control scenarios, secure control under network attacks is already a hot research topic. In general, network attacks are usually divided into DoS attack [16], [17], deceive attack [18], [19], replay attack [20], malicious attack [21], and so on. The hybrid attack model were considered in [22], [23] .…”
Section: Introductionmentioning
confidence: 99%
“…Optimization relaxation (OR) and brute force search (BFS) are two mainstream techniques to realize the SSE for CPSs with FDI. In addition, data‐driven 15 and game‐theoretic‐based 16 approaches are equally interesting and effective in resisting attacks. OR methods such as L1false/Lr$$ {L}_1/{L}_r $$ decoders, 17 projected gradient descent algorithm, 18 satisfiability modular solver, 19 a novel l1$$ {l}_1 $$‐minimization based on QR decomposition 20 and optimal graph‐search method 21 aim to obtain state estimation values in polynomial time.…”
Section: Introductionmentioning
confidence: 99%
“…Game theory offers an efficient framework for analyzing the dynamic competition between attackers and defenders. Thus, it stands as a pivotal tool in addressing security challenges within CPSs 11–13 …”
Section: Introductionmentioning
confidence: 99%
“…Thus, it stands as a pivotal tool in addressing security challenges within CPSs. [11][12][13] The incorporation of game theory into the realm of CPSs security has yielded lots of noteworthy accomplishments. Notably, in addressing the security challenges associated with remote state estimation and controller design, Wu et al 10 probed the security control problem of CPSs by using zero-sum games within the context of false data injection attacks.…”
mentioning
confidence: 99%