Volume 13
Issue 1
IEEE/CAA Journal of Automatica Sinica
| Citation: | J. Shang, D. Zhao, H. Zhang, and D. Shi, “Single-dimensional encryption against stealthy attacks on stochastic event-based estimation,” IEEE/CAA J. Autom. Sinica, vol. 13, no. 1, pp. 233–235, Jan. 2026. doi: 10.1109/JAS.2025.125381 |
| [1] |
M. Wolf and D. Serpanos, “Safety and security in cyber-physical systems and internet-of-things systems,” Proc. IEEE, vol. 106, no. 1, pp. 9–20, 2017.
|
| [2] |
W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent advances and challenges,” IEEE/CAA J. Autom. Sinica., vol. 9, no. 5, pp. 784–800, 2022. doi: 10.1109/JAS.2022.105548
|
| [3] |
H. Liu, Y. Li, K. H. Johansson, J. Mårtensson, and L. Xie, “Rollout approach to sensor scheduling for remote state estimation under integrity attack,” Automatica, vol. 144, p. 110473, 2022. doi: 10.1016/j.automatica.2022.110473
|
| [4] |
J. Zhou, J. Shang, and T. Chen, “Cybersecurity landscape on remote state estimation: A comprehensive review,” IEEE/CAA J. Autom. Sinica., vol. 11, no. 4, pp. 1–15, 2024. doi: 10.1109/JAS.2024.124386
|
| [5] |
H. Guo, J. Sun, and Z. Pang, “Residual-based false data injection attacks against multi-sensor estimation systems,” IEEE/CAA J. Autom. Sinica., vol. 10, no. 5, pp. 1181–1191, 2023. doi: 10.1109/JAS.2023.123441
|
| [6] |
J. Shang, M. Chen, and T. Chen, “Optimal linear encryption against stealthy attacks on remote state estimation,” IEEE Trans. Autom. Control, vol. 66, no. 8, pp. 3592–3607, 2021. doi: 10.1109/TAC.2020.3024143
|
| [7] |
Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyberattack on remote state estimation,” IEEE Trans. Control Network Syst., vol. 4, no. 1, pp. 4–13, 2017. doi: 10.1109/TCNS.2016.2570003
|
| [8] |
Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case innovation-based integrity attacks with side information on remote state estimation,” IEEE Trans. Control Network Syst., vol. 6, no. 1, pp. 48–59, 2019. doi: 10.1109/TCNS.2018.2793664
|
| [9] |
J. Zhou, J. Shang, and T. Chen, “On information fusion in optimal linear FDI attacks against remote state estimation,” IEEE Trans. Control Network Syst., vol. 10, no. 4, pp. 2085–2096, 2023. doi: 10.1109/TCNS.2023.3260041
|
| [10] |
C. Bai, F. Pasqualetti, and V. Gupta, “Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs,” Automatica, vol. 82, pp. 251–260, 2017. doi: 10.1016/j.automatica.2017.04.047
|
| [11] |
Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case stealthy innovation-based linear attack on remote state estimation,” Automatica, vol. 89, pp. 117–124, 2018. doi: 10.1016/j.automatica.2017.11.018
|
| [12] |
J. Shang, H. Yu, and T. Chen, “Worst-case stealthy innovation-based linear attacks on remote state estimation under Kullback-Leibler divergence,” IEEE Trans. Autom. Control, vol. 67, no. 11, pp. 6082–6089, 2022. doi: 10.1109/TAC.2021.3125430
|
| [13] |
P. Cheng, Z. Yang, J. Chen, Y. Qi, and L. Shi, “An event-based stealthy attack on remote state estimation,” IEEE Trans. Autom. Control, vol. 65, no. 10, pp. 4348–4355, 2020. doi: 10.1109/TAC.2019.2956021
|
| [14] |
D. Han, Y. Mo, J. Wu, S. Weerakkody, B. Sinopoli, and L. Shi, “Stochastic event-triggered sensor schedule for remote state estimation,” IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2661–2675, 2015. doi: 10.1109/TAC.2015.2406975
|
| [15] |
L. Xu, Y. Mo, and L. Xie, “Remote state estimation with stochastic event-triggered sensor schedule and packet drops,” IEEE Trans. Autom. Control, vol. 65, no. 11, pp. 4981–4988, 2020. doi: 10.1109/TAC.2020.3004328
|
| [16] |
H. Yu, J. Shang, and T. Chen, “On stochastic and deterministic eventbased state estimation,” Automatica, vol. 123, p. 109314, 2021. doi: 10.1016/j.automatica.2020.109314
|
| [17] |
J. Shang, H. Yu, and T. Chen, “Worst-case stealthy attacks on stochastic event-based state estimation,” IEEE Trans. Autom. Control, vol. 67, no. 4, pp. 2052–2059, 2022. doi: 10.1109/TAC.2021.3071948
|
| [18] |
H. Guo, J. Sun, Z. Pang, and G. Liu, “Event-based optimal stealthy false data-injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, 2023. doi: 10.1109/TCYB.2023.3255583
|
| [19] |
X. Zhao, L. Liu, M. V. Basin, and Z. Fei, “Event-triggered reverse attacks on remote state estimation,” IEEE Trans. Autom. Control, vol. 69, no. 2, pp. 998–1005, 2023.
|
| [20] |
J. Shang, J. Zhou, and T. Chen, “Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation,” Automatica, vol. 136, p. 110015, 2022. doi: 10.1016/j.automatica.2021.110015
|