Observer-based attack detection and mitigation for cyberphysical systems: A review
M Kordestani, M Saif - IEEE Systems, Man, and Cybernetics …, 2021 - ieeexplore.ieee.org
Demands for security, efficiency, and environmental protection have led to the rapid
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …
deployment of cyberphysical systems (CPSs), which are now an integral part of modern …
Secure and privacy preserving consensus for second-order systems based on paillier encryption
This paper aims at secure and privacy-preserving consensus algorithms of networked
systems. Due to the technical challenges behind decentralized design of such algorithms …
systems. Due to the technical challenges behind decentralized design of such algorithms …
Privacy-enabled secure iterative learning control of networked systems subject to disclosure attacks
Y Chen, D Huang, S Tan - … on Circuits and Systems II: Express …, 2023 - ieeexplore.ieee.org
In this brief, a secure iterative learning control architecture is proposed for networked
systems, aiming to track the desired output and protect the privacy of signals. The main …
systems, aiming to track the desired output and protect the privacy of signals. The main …
Secure distributed kalman filter using partially homomorphic encryption
L Sadeghikhorami, AA Safavi - Journal of the Franklin Institute, 2021 - Elsevier
In this paper, we present a secure distributed estimation strategy in networked systems. In
particular, we consider distributed Kalman filtering as the estimation method and Paillier …
particular, we consider distributed Kalman filtering as the estimation method and Paillier …
Optimizing encrypted control algorithms for real-time secure control
T Sui, J Wang, W Liu, J Pan, L Wang, Y Zhao… - Journal of the Franklin …, 2024 - Elsevier
In network control systems (NCSs), one obvious advantage of using homomorphic
encryption is to protect data privacy while remotely computing the control function without …
encryption is to protect data privacy while remotely computing the control function without …
A novel secure observer-based controller and attack detection scheme for Networked Control Systems
This paper proposes security techniques for detecting and counteracting attacks in
Networked Control Systems (NCSs). A partially homomorphic based encryption technique …
Networked Control Systems (NCSs). A partially homomorphic based encryption technique …
Resilient strategy design for cyber-physical system under active eavesdropping attack
H Yuan, Y Xia, Y Yuan, H Yang - Journal of the Franklin Institute, 2021 - Elsevier
We consider a remote state estimation process under an active eavesdropper for cyber-
physical system. A smart sensor transmits its local state estimates to a remote estimator over …
physical system. A smart sensor transmits its local state estimates to a remote estimator over …
Structural consensus in networks with directed topologies and its cryptographic implementation
The existing cryptosystem based approaches for privacy-preserving consensus of
networked systems are usually limited to those with undirected topologies. This paper …
networked systems are usually limited to those with undirected topologies. This paper …
Secure Centralized Kalman Filter for Network Environments by Homomorphic Encryption
S Ladan, SA Akbar - 2021 7th International Conference on …, 2021 - ieeexplore.ieee.org
This paper presents a secure and private estimator in Cyber-Physical Systems (CPSs)
where the estimator generates the state estimation without knowing the real inputs and …
where the estimator generates the state estimation without knowing the real inputs and …
[图书][B] Attack-and-Defense Games for Control Systems: Analysis and Synthesis
H Yuan, Y Yuan, H Dong, Y Xia, M Wang - 2024 - books.google.com
This vital work for researchers and graduate students focuses on resilience estimation and
control of cyber-physical networked systems using attacker-defender game theory. It …
control of cyber-physical networked systems using attacker-defender game theory. It …