State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Encrypted finite-horizon energy-to-peak state estimation for time-varying systems under eavesdrop** attacks: Tackling secrecy capacity
This paper is concerned with the problem of finite-horizon energy-to-peak state estimation
for a class of networked linear time-varying systems. Due to the inherent vulnerability of …
for a class of networked linear time-varying systems. Due to the inherent vulnerability of …
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …
decade, providing a new paradigm for the integration of computational and physical units in …
Transmission scheduling for privacy-optimal encryption against eavesdrop** attacks on remote state estimation
In remote state estimation systems, the state being estimated may be wiretapped by
eavesdrop** communications from the sensor to the remote estimator. A straightforward …
eavesdrop** communications from the sensor to the remote estimator. A straightforward …
Transmission scheduling for remote state estimation over packet drop** links in the presence of an eavesdropper
This paper studies transmission scheduling for remote state estimation in the presence of an
eavesdropper. A sensor transmits local state estimates over a packet drop** link to a …
eavesdropper. A sensor transmits local state estimates over a packet drop** link to a …
Remote state estimation in the presence of an active eavesdropper
We consider remote state estimation in the presence of an active eavesdropper. A sensor
forward local state estimates to a remote estimator over a network, which may be …
forward local state estimates to a remote estimator over a network, which may be …
Wireless control for the IOT: Power, spectrum, and security challenges
We present recent work in the design and operation of wireless sensor-actuation systems
along three aspects. At the device level, a major drive is the reduced power consumption of …
along three aspects. At the device level, a major drive is the reduced power consumption of …
State-secrecy codes for networked linear systems
In this paper, we study the problem of remote state estimation, in the presence of a passive
eavesdropper. An authorized user estimates the state of an unstable linear plant, based on …
eavesdropper. An authorized user estimates the state of an unstable linear plant, based on …
Encryption scheduling for remote state estimation under an operation constraint
In remote state estimation, data transmitted by a sensor through a wireless communication
channel may be overheard by an eavesdropper. One possible way to avoid information …
channel may be overheard by an eavesdropper. One possible way to avoid information …
Distributed anti-Eavesdrop** fusion estimation under energy constraints
In this article, we study the distributed fusion estimation problem with energy-constrained
sensors in the presence of eavesdroppers, where smart sensors send their local estimates …
sensors in the presence of eavesdroppers, where smart sensors send their local estimates …