Brief survey on attack detection methods for cyber-physical systems

S Tan, JM Guerrero, P Xie, R Han… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their
potential applications in many areas. However, the strong reliance on communication …

State of the art of cyber-physical systems security: An automatic control perspective

YZ Lun, A D'Innocenzo, F Smarra, I Malavolta… - Journal of Systems and …, 2019 - Elsevier
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

Distributed secure state estimation for cyber–physical systems under sensor attacks

L An, GH Yang - Automatica, 2019 - Elsevier
Cyber–physical systems (CPSs) usually employ distributed sensor networks to gather,
process and exchange information as a team. In contrast to the previous centralized secure …

Byzantine-resilient distributed state estimation: A min-switching approach

L An, GH Yang - Automatica, 2021 - Elsevier
This paper proposes two distributed state estimation protocols for static linear cyber–
physical systems under Byzantine links/nodes caused by adversarial attacks. First, a basic …

A tutorial introduction to security and privacy for cyber-physical systems

MS Chong, H Sandberg… - 2019 18th European …, 2019 - ieeexplore.ieee.org
This tutorial provides a high-level introduction to novel control-theoretic approaches for the
security and privacy of cyber-physical systems (CPS). It takes a risk-based approach to the …

Observer-based attack detection and mitigation for cyberphysical systems: A review

M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …

Data-driven false data-injection attack design and detection in cyber-physical systems

Z Zhao, Y Huang, Z Zhen, Y Li - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, a data-driven design scheme of undetectable false data-injection attacks
against cyber-physical systems is proposed first, with the aid of the subspace identification …

Minimal control nodes for strong structural observability of discrete-time iteration systems: Explicit formulas and polynomial-time algorithms

S Zhu, J Lu, DWC Ho, J Cao - IEEE Transactions on Automatic …, 2023 - ieeexplore.ieee.org
In this article, we initiate an important class of vertex-marked directed graphs, referred to as
the strong structurally observable graphs (SSOGs), to be the fundamental structural …

Distributed estimation approach for tracking a mobile target via formation of UAVs

M Doostmohammadian, A Taghieh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper considers distributed estimation methods to enable the formation of Unmanned-
Aerial-Vehicles (UAVs) that track a moving target. The UAVs (or agents) are equipped with …

Fully distributed resilient state estimation based on distributed median solver

JG Lee, J Kim, H Shim - IEEE Transactions on Automatic …, 2020 - ieeexplore.ieee.org
In this article, we present a scheme of fully distributed resilient state estimation for linear
dynamical systems under sensor attacks. The proposed state observer consists of a network …