Results 31 to 40 of about 63,938 (281)

Security Against False Data-Injection Attack in Cyber-Physical Systems [PDF]

open access: yesIEEE Transactions on Control of Network Systems, 2020
In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a certain filtering algorithm to ...
Arpan Chattopadhyay, Urbashi Mitra
openaire   +2 more sources

Game-theoretic cybersecurity analysis for false data injection attack on networked microgrids

open access: yesIET Cyber-Physical Systems, 2019
In well-managed coordinated networked microgrids (MGs) besides electricity interchange between MGs, global optimisation is fulfilled. Here the authors studied a networked MG architecture, in which the control centre of microgrids communicates with a ...
Nima Nikmehr   +2 more
doaj   +1 more source

Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids

open access: yesFrontiers in Energy Research, 2022
The stable and reliable operation of microgrids requires the immediate communication and accurate measuring data of cyber systems. The cyber security of smart grids consists of detection and mitigation, where the latter mainly refers to resisting the ...
Ge Cao   +5 more
doaj   +1 more source

Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise

open access: yes, 2016
In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise.
He, Haibo   +3 more
core   +1 more source

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

open access: yes, 2016
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan   +2 more
core   +1 more source

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Data-driven control against false data injection attacks

open access: yesAutomatica
The rise of cyber-security concerns has brought significant attention to the analysis and design of cyber-physical systems (CPSs). Among the various types of cyberattacks, denial-of-service (DoS) attacks and false data injection (FDI) attacks can be easily launched and have become prominent threats.
Liu, Wenjie   +5 more
openaire   +3 more sources

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

open access: yesIEEE Access, 2021
Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security.
Moslem Dehghani   +6 more
doaj   +1 more source

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

open access: yes, 2020
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.
Eberz, Simon   +2 more
core   +1 more source

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

open access: yes, 2017
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack ...
Chung, Hwei-Ming   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy