Observer-based attack detection and mitigation for cyberphysical systems: A review

M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …

Secure and privacy preserving consensus for second-order systems based on paillier encryption

W Fang, M Zamani, Z Chen - Systems & Control Letters, 2021 - Elsevier
This paper aims at secure and privacy-preserving consensus algorithms of networked
systems. Due to the technical challenges behind decentralized design of such algorithms …

Privacy-enabled secure iterative learning control of networked systems subject to disclosure attacks

Y Chen, D Huang, S Tan - … on Circuits and Systems II: Express …, 2023 - ieeexplore.ieee.org
In this brief, a secure iterative learning control architecture is proposed for networked
systems, aiming to track the desired output and protect the privacy of signals. The main …

Secure distributed kalman filter using partially homomorphic encryption

L Sadeghikhorami, AA Safavi - Journal of the Franklin Institute, 2021 - Elsevier
In this paper, we present a secure distributed estimation strategy in networked systems. In
particular, we consider distributed Kalman filtering as the estimation method and Paillier …

Optimizing encrypted control algorithms for real-time secure control

T Sui, J Wang, W Liu, J Pan, L Wang, Y Zhao… - Journal of the Franklin …, 2024 - Elsevier
In network control systems (NCSs), one obvious advantage of using homomorphic
encryption is to protect data privacy while remotely computing the control function without …

A novel secure observer-based controller and attack detection scheme for Networked Control Systems

L Sadeghikhorami, V Varadharajan, AA Safavi - Information Sciences, 2021 - Elsevier
This paper proposes security techniques for detecting and counteracting attacks in
Networked Control Systems (NCSs). A partially homomorphic based encryption technique …

Resilient strategy design for cyber-physical system under active eavesdropping attack

H Yuan, Y Xia, Y Yuan, H Yang - Journal of the Franklin Institute, 2021 - Elsevier
We consider a remote state estimation process under an active eavesdropper for cyber-
physical system. A smart sensor transmits its local state estimates to a remote estimator over …

Structural consensus in networks with directed topologies and its cryptographic implementation

W Fang, Z Chen, M Zamani - ISA transactions, 2023 - Elsevier
The existing cryptosystem based approaches for privacy-preserving consensus of
networked systems are usually limited to those with undirected topologies. This paper …

Secure Centralized Kalman Filter for Network Environments by Homomorphic Encryption

S Ladan, SA Akbar - 2021 7th International Conference on …, 2021 - ieeexplore.ieee.org
This paper presents a secure and private estimator in Cyber-Physical Systems (CPSs)
where the estimator generates the state estimation without knowing the real inputs and …

[图书][B] Attack-and-Defense Games for Control Systems: Analysis and Synthesis

H Yuan, Y Yuan, H Dong, Y Xia, M Wang - 2024 - books.google.com
This vital work for researchers and graduate students focuses on resilience estimation and
control of cyber-physical networked systems using attacker-defender game theory. It …