Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/21778
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHu, L-
dc.contributor.authorWang, Z-
dc.contributor.authorHan, QL-
dc.contributor.authorLiu, X-
dc.date.accessioned2020-11-03T11:26:48Z-
dc.date.available2017-10-23-
dc.date.available2020-11-03T11:26:48Z-
dc.date.issued2019-01-
dc.identifier.citationAutomatica, 2017, 87 pp. 176 - 183en_US
dc.identifier.issn0005-1098-
dc.identifier.issnhttp://dx.doi.org/10.1016/j.automatica.2017.09.028-
dc.identifier.urihttp://bura.brunel.ac.uk/handle/2438/21778-
dc.description.abstractThe security issue in the state estimation problem is investigated for a networked control system (NCS). The communication channels between the sensors and the remote estimator in the NCS are vulnerable to attacks from malicious adversaries. The false data injection attacks are considered. The aim of this paper to find the so-called insecurity conditions under which the estimation system is insecure in the sense that there exist malicious attacks that can bypass the anomaly detector but still lead to unbounded estimation errors. In particular, a new necessary and sufficient condition for the insecurity is derived in the case that all communication channels are compromised by the adversary. Moreover, a specific algorithm is proposed for generating attacks with which the estimation system is insecure. Furthermore, for the insecure system, a system protection scheme through which only a few (rather than all) communication channels require protection against false data injection attacks is proposed. A simulation example is utilized to demonstrate the effectiveness of the proposed conditions/algorithms in the secure estimation problem for a flight vehicle.en_US
dc.description.sponsorshipThis work was supported in part by the Royal Society of the UK, the National Natural Science Foundation of China under Grant 61329301, the Australian Research Council Discovery Project under Grant DP160103567, and the Alexander von Humboldt Foundation of Germany .-
dc.format.extent176 - 183-
dc.languageEnglish-
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.subjectFalse data injection attacksen_US
dc.subjectState estimationen_US
dc.subjectSecurity analysisen_US
dc.subjectNetworked control systemsen_US
dc.titleState estimation under false data injection attacks: Security analysis and system protectionen_US
dc.typeArticleen_US
dc.identifier.doihttp://dx.doi.org/10.1016/j.automatica.2017.09.028-
dc.relation.isPartOfAutomatica-
pubs.publication-statusPublished-
pubs.volume87-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdf527.23 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.