Improving Kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy

Saved in:
Bibliographic Details
Published inApplied mathematics and computation Vol. 466; p. 128444
Main Authors Li, Xin, Lei, Anzhi, Zhu, Liangkuan, Ban, Mingfei
Format Journal Article
LanguageEnglish
Published 01.04.2024
Online AccessGet full text
ISSN0096-3003
DOI10.1016/j.amc.2023.128444

Cover

ArticleNumber 128444
Author Ban, Mingfei
Zhu, Liangkuan
Li, Xin
Lei, Anzhi
Author_xml – sequence: 1
  givenname: Xin
  orcidid: 0000-0002-8771-2478
  surname: Li
  fullname: Li, Xin
– sequence: 2
  givenname: Anzhi
  surname: Lei
  fullname: Lei, Anzhi
– sequence: 3
  givenname: Liangkuan
  surname: Zhu
  fullname: Zhu, Liangkuan
– sequence: 4
  givenname: Mingfei
  surname: Ban
  fullname: Ban, Mingfei
BookMark eNp9kMtOwzAQRb0oEm3hA9j5BxLGseMk7KqKR0UlNrCOJs6kJOQl2yBlwb-T0q5YsJqr0ZzR1VmxRT_0xNiNgFCA0LdNiJ0JI4hkKKJUKbVgS4BMBxJAXrKVcw0AJFqoJfvedaMdvur-wJ-x7bDnVd16srwaLDdTMafxfXK1wZa7yXnqHHefRUPGcz9wS2OLE0fv0Xy4O77pzzkoyc839dAHBToquRm6kXqHxxV33qKnw3TFLipsHV2f55q9Pdy_bp-C_cvjbrvZByZSsQ9kQTqtygpKmUYgKxVllRKkUWQxgVFZVJYZJXGJhCAVQYGoY41JSiLW2sg1E6e_xg7OWary0dYd2ikXkB-d5U0-O8uPzvKTs5lJ_jCm9r_15_J1-w_5A6rueig
CitedBy_id crossref_primary_10_1177_01423312241288307
crossref_primary_10_1177_09596518241273856
crossref_primary_10_1016_j_conengprac_2024_106082
Cites_doi 10.1109/TCAD.2019.2935062
10.1109/TCYB.2021.3060743
10.1016/j.epsr.2022.108654
10.1016/j.ins.2019.10.057
10.1016/j.automatica.2020.108812
10.1109/MCS.2014.2364724
10.1016/j.jprocont.2018.05.005
10.1109/TVT.2020.3020845
10.1016/j.automatica.2022.110461
10.1016/j.ins.2022.06.082
10.1109/LSP.2021.3078696
10.1016/j.jprocont.2021.07.011
10.1109/TAC.2015.2416924
10.1109/JIOT.2021.3067667
10.1080/00207179.2020.1862917
10.1016/j.automatica.2021.109668
10.1016/j.automatica.2017.01.031
10.1016/j.automatica.2022.110410
10.1016/j.asej.2022.102004
10.1016/j.jprocont.2022.06.002
10.1016/j.automatica.2019.108557
10.1016/j.jprocont.2021.08.007
10.1016/j.jprocont.2018.11.007
10.1007/s40313-020-00633-5
10.1016/j.micpro.2020.103637
10.1016/j.automatica.2022.110302
10.1109/TCYB.2019.2956137
10.1109/LCSYS.2019.2920507
10.1109/LSP.2020.2996908
10.1016/j.isatra.2022.06.015
10.1016/j.physa.2019.01.137
10.1016/j.automatica.2021.109517
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.amc.2023.128444
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
ExternalDocumentID 10_1016_j_amc_2023_128444
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
23M
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
9JN
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AATTM
AAXKI
AAXUO
AAYWO
AAYXX
ABAOU
ABEFU
ABFNM
ABFRF
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACRLP
ACRPL
ACVFH
ADBBV
ADCNI
ADEZE
ADGUI
ADIYS
ADMUD
ADNMO
AEBSH
AEFWE
AEIPS
AEKER
AENEX
AEUPX
AFFNX
AFJKZ
AFPUW
AFTJW
AFXIZ
AGCQF
AGHFR
AGQPQ
AGRNS
AGUBO
AGYEJ
AHHHB
AI.
AIEXJ
AIGII
AIGVJ
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
APXCP
ARUGR
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
BNPGV
CITATION
CS3
EBS
EFJIC
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HLZ
HMJ
HVGLF
HZ~
IHE
J1W
KOM
LG9
M26
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SDF
SDG
SES
SEW
SME
SPC
SPCBC
SSH
SSW
SSZ
T5K
TAE
TN5
VH1
VOH
WH7
WUQ
X6Y
XPP
ZMT
~02
~G-
ID FETCH-LOGICAL-c245t-3be68fdf0d38203f429f41e6a195e0c492dd9e75daea034e0baa656a78e1566c3
ISSN 0096-3003
IngestDate Tue Jul 01 01:36:31 EDT 2025
Thu Apr 24 23:11:07 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c245t-3be68fdf0d38203f429f41e6a195e0c492dd9e75daea034e0baa656a78e1566c3
ORCID 0000-0002-8771-2478
ParticipantIDs crossref_primary_10_1016_j_amc_2023_128444
crossref_citationtrail_10_1016_j_amc_2023_128444
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-00
PublicationDateYYYYMMDD 2024-04-01
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-00
PublicationDecade 2020
PublicationTitle Applied mathematics and computation
PublicationYear 2024
References Jahromi (10.1016/j.amc.2023.128444_br0030) 2021; 8
Zhang (10.1016/j.amc.2023.128444_br0150) 2021; 127
Feng (10.1016/j.amc.2023.128444_br0360) 2017; 79
Farha (10.1016/j.amc.2023.128444_br0320) 2022; 21
Zhao (10.1016/j.amc.2023.128444_br0080) 2023; 447
Franze (10.1016/j.amc.2023.128444_br0200) 2019; 3
Palleti (10.1016/j.amc.2023.128444_br0290) 2018; 68
Liu (10.1016/j.amc.2023.128444_br0120) 2018; 337
Zhang (10.1016/j.amc.2023.128444_br0010) 2020; 50
Wang (10.1016/j.amc.2023.128444_br0110) 2021; 28
Zaman (10.1016/j.amc.2023.128444_br0180) 2022; 95
Hua (10.1016/j.amc.2023.128444_br0280) 2023; 132
Bu (10.1016/j.amc.2023.128444_br0020) 2020; 39
Fang (10.1016/j.amc.2023.128444_br0330) 2022; 112
Mo (10.1016/j.amc.2023.128444_br0370) 2015; 35
Feng (10.1016/j.amc.2023.128444_br0160) 2022; 141
Zhao (10.1016/j.amc.2023.128444_br0250) 2022; 142
Montanari (10.1016/j.amc.2023.128444_br0380) 2020; 31
Li (10.1016/j.amc.2023.128444_br0140) 2022; 144
Song (10.1016/j.amc.2023.128444_br0090) 2020; 376
Kumar (10.1016/j.amc.2023.128444_br0170) 2023; 14
Ge (10.1016/j.amc.2023.128444_br0060) 2020; 512
Gong (10.1016/j.amc.2023.128444_br0210) 2020; 27
Mukherjee (10.1016/j.amc.2023.128444_br0240) 2021; 105
Phogat (10.1016/j.amc.2023.128444_br0260) 2020; 114
Chen (10.1016/j.amc.2023.128444_br0040) 2022; 213
Ahmed (10.1016/j.amc.2023.128444_br0220) 2022; 116
Lima (10.1016/j.amc.2023.128444_br0230) 2021; 105
Tu (10.1016/j.amc.2023.128444_br0050) 2019; 522
Dong (10.1016/j.amc.2023.128444_br0100) 2023; 443
Ge (10.1016/j.amc.2023.128444_br0130) 2019; 109
Yan (10.1016/j.amc.2023.128444_br0350) 2022; 52
Padhan (10.1016/j.amc.2023.128444_br0310) 2022; 608
De Persis (10.1016/j.amc.2023.128444_br0340) 2015; 60
Ding (10.1016/j.amc.2023.128444_br0070) 2021; 129
Lv (10.1016/j.amc.2023.128444_br0270) 2022; 418
Yu (10.1016/j.amc.2023.128444_br0390) 2021; 80
Xu (10.1016/j.amc.2023.128444_br0190) 2021; 70
Varshney (10.1016/j.amc.2023.128444_br0300) 2019; 76
References_xml – volume: 39
  start-page: 2081
  issue: 10
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0020
  article-title: Scenario-based online reachability validation for cps fault prediction
  publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
  doi: 10.1109/TCAD.2019.2935062
– volume: 52
  start-page: 9609
  issue: 9
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0350
  article-title: Secure state estimation with switched compensation mechanism against DoS attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2021.3060743
– volume: 213
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0040
  article-title: Cyber-physical system fusion modeling and robustness evaluation
  publication-title: Electr. Power Syst. Res.
  doi: 10.1016/j.epsr.2022.108654
– volume: 512
  start-page: 1592
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0060
  article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2019.10.057
– volume: 114
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0260
  article-title: Invariant extended Kalman filter on matrix Lie groups
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.108812
– volume: 35
  start-page: 93
  issue: 1
  year: 2015
  ident: 10.1016/j.amc.2023.128444_br0370
  article-title: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs
  publication-title: IEEE Control Syst. Mag.
  doi: 10.1109/MCS.2014.2364724
– volume: 68
  start-page: 160
  year: 2018
  ident: 10.1016/j.amc.2023.128444_br0290
  article-title: A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems
  publication-title: J. Process Control
  doi: 10.1016/j.jprocont.2018.05.005
– volume: 70
  start-page: 5524
  issue: 6
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0190
  article-title: Robust reset speed synchronization control for an integrated motor-transmission powertrain system of a connected vehicle under a replay attack
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2020.3020845
– volume: 144
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0140
  article-title: Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis
  publication-title: Automatica
  doi: 10.1016/j.automatica.2022.110461
– volume: 608
  start-page: 825
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0310
  article-title: Design of false data injection attacks in cyber-physical systems
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.06.082
– volume: 28
  start-page: 1002
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0110
  article-title: Elimination of undetectable attacks on natural gas networks
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2021.3078696
– volume: 418
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0270
  article-title: An adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacks
  publication-title: Appl. Math. Comput.
– volume: 21
  start-page: 342
  issue: 1
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0320
  article-title: Timestamp scheme to mitigate replay attacks in secure ZigBee networks
  publication-title: IEEE Trans. Mob. Comput.
– volume: 105
  start-page: 108
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0230
  article-title: A predictor for dead-time systems based on the Kalman filter for improved disturbance rejection and robustness
  publication-title: J. Process Control
  doi: 10.1016/j.jprocont.2021.07.011
– volume: 60
  start-page: 2930
  issue: 11
  year: 2015
  ident: 10.1016/j.amc.2023.128444_br0340
  article-title: Input-to-state stabilizing control under denial-of-service
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2015.2416924
– volume: 8
  start-page: 13712
  issue: 17
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0030
  article-title: Toward detection and attribution of cyber-attacks in IoT-enabled cyber physical systems
  publication-title: IEEE Int. Things J.
  doi: 10.1109/JIOT.2021.3067667
– volume: 95
  start-page: 1562
  issue: 6
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0180
  article-title: Security analysis and fault detection against stealthy replay attacks
  publication-title: Int. J. Control
  doi: 10.1080/00207179.2020.1862917
– volume: 129
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0070
  article-title: Interference game for intelligent sensors in cyber Physical systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109668
– volume: 79
  start-page: 42
  year: 2017
  ident: 10.1016/j.amc.2023.128444_br0360
  article-title: Resilient control under denial-of-service: robust design
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.01.031
– volume: 142
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0250
  article-title: Robust stable iterated unscented Kalman filter based on maximum correntropy criterion
  publication-title: Automatica
  doi: 10.1016/j.automatica.2022.110410
– volume: 14
  issue: 7
  year: 2023
  ident: 10.1016/j.amc.2023.128444_br0170
  article-title: Fractional mathematical modeling of the Stuxnet virus along with an optimal control problem
  publication-title: Ain Shams Eng. J.
  doi: 10.1016/j.asej.2022.102004
– volume: 116
  start-page: 136
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0220
  article-title: A practical physical watermarking approach to detect replay attacks in a CPS
  publication-title: J. Process Control
  doi: 10.1016/j.jprocont.2022.06.002
– volume: 337
  start-page: 469
  year: 2018
  ident: 10.1016/j.amc.2023.128444_br0120
  article-title: Simultaneous fault detection and control for continuous-time Markovian jump systems with partially unknown transition probabilities
  publication-title: Appl. Math. Comput.
– volume: 376
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0090
  article-title: H∞ controller design of networked control systems with a new quantization structure
  publication-title: IEEE Signal Process. Lett.
– volume: 443
  year: 2023
  ident: 10.1016/j.amc.2023.128444_br0100
  article-title: Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems
  publication-title: Appl. Math. Comput.
– volume: 109
  year: 2019
  ident: 10.1016/j.amc.2023.128444_br0130
  article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108557
– volume: 105
  start-page: 267
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0240
  article-title: Broyden's update based extended Kalman filter for nonlinear state estimation
  publication-title: J. Process Control
  doi: 10.1016/j.jprocont.2021.08.007
– volume: 76
  start-page: 98
  year: 2019
  ident: 10.1016/j.amc.2023.128444_br0300
  article-title: State and parameter estimation using extended Kitanidis Kalman filter
  publication-title: J. Process Control
  doi: 10.1016/j.jprocont.2018.11.007
– volume: 447
  year: 2023
  ident: 10.1016/j.amc.2023.128444_br0080
  article-title: Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks
  publication-title: Appl. Math. Comput.
– volume: 31
  start-page: 1348
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0380
  article-title: Observability of network systems: a critical review of recent results
  publication-title: J. Control Autom. Electr. Syst.
  doi: 10.1007/s40313-020-00633-5
– volume: 80
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0390
  article-title: Service attack improvement in wireless sensor network based on machine learning
  publication-title: Microprocess. Microsyst.
  doi: 10.1016/j.micpro.2020.103637
– volume: 112
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0330
  article-title: Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
  publication-title: Automatica
– volume: 141
  year: 2022
  ident: 10.1016/j.amc.2023.128444_br0160
  article-title: Resilient quantized control under denial-of-service: variable bit rate quantization
  publication-title: Automatica
  doi: 10.1016/j.automatica.2022.110302
– volume: 50
  start-page: 3616
  issue: 8
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0010
  article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2019.2956137
– volume: 3
  start-page: 984
  issue: 4
  year: 2019
  ident: 10.1016/j.amc.2023.128444_br0200
  article-title: Resilient control for cyber-physical systems subject to replay attacks
  publication-title: IEEE Control Syst. Lett.
  doi: 10.1109/LCSYS.2019.2920507
– volume: 27
  start-page: 920
  year: 2020
  ident: 10.1016/j.amc.2023.128444_br0210
  article-title: Detecting replay attacks using multi-channel audio: a neural network-based method
  publication-title: IEEE Signal Process. Lett.
  doi: 10.1109/LSP.2020.2996908
– volume: 132
  start-page: 222
  year: 2023
  ident: 10.1016/j.amc.2023.128444_br0280
  article-title: Fusion and detection for multi-sensor systems under false data injection attacks
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2022.06.015
– volume: 522
  start-page: 9
  year: 2019
  ident: 10.1016/j.amc.2023.128444_br0050
  article-title: Robustness assessment of cyber physical systems with weak interdependency
  publication-title: Physica A
  doi: 10.1016/j.physa.2019.01.137
– volume: 127
  year: 2021
  ident: 10.1016/j.amc.2023.128444_br0150
  article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109517
SSID ssj0007614
Score 2.485219
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 128444
Title Improving Kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy
Volume 466
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaWcoEDojxEeVQ-cKLyKhs7yYZbQVQVUE6ttLfIduySdptG3eTQSnDkdzOO7cTbh0S5REnkWFHm08x4_M0XhN5Hmmmai5JInUjCJM0IB6dHZjmH4JeIfN6XBg5-pPtH7OsiWUwmfwLWUteKqby6ta_kf6wK98Cupkv2HpYdJoUbcA72hSNYGI7_ZOOxIvCNL00xXldm87unDspLAWeNN4NVbF7trDphKi8m5bxQzZJf7vC2NX32rkJor0ip2p6jVRMT5vrOtwYWvBYtK6tou7Yh7LPZs0EGduVb5ppufbv_e08gWFQBGaiy3Mqrn9VYyO5syYDXx6fdCOFP3LH962OtqrBmEYdUF-eHc8O4i2joh1kaelITN60y5A0nb-sNJ1N-ZjQoYzodx64Lal8LdAP90DPbTgqYojBTFHaKB-hhnEEOBn5x-nukCmWp1Yj3b-13x3ue4LW3CPKbIFE5fIqeuBUG3rVw2UQTVT9Djw9GuzxHvwbgYAscbIGDATi4Bw72wMEOONgBB7fn2AIHO-B8xLs1vh02OIQN9rB5gY72vhx-3ifuPxxExixpCRUqnetSRyWFfJFqSGE0m6mUz_JERZLlcVnmKktKrnhEmYoE57BM4NlcmeqApC_RRn1eq1cIR1pIiBlJqo0KFBO5msGEIoNlf6kETbZQ5L9eIZ1IvflXyrK402Zb6MPwSGMVWu4e_Po-g9-gRyN436KN9qJT7yAFbcV2j4-_nYuLRQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Improving+Kalman+filter+for+cyber+physical+systems+subject+to+replay+attacks%3A+An+attack-detection-based+compensation+strategy&rft.jtitle=Applied+mathematics+and+computation&rft.au=Li%2C+Xin&rft.au=Lei%2C+Anzhi&rft.au=Zhu%2C+Liangkuan&rft.au=Ban%2C+Mingfei&rft.date=2024-04-01&rft.issn=0096-3003&rft.volume=466&rft.spage=128444&rft_id=info:doi/10.1016%2Fj.amc.2023.128444&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_amc_2023_128444
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0096-3003&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0096-3003&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0096-3003&client=summon