Improving Kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy
Saved in:
Published in | Applied mathematics and computation Vol. 466; p. 128444 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
01.04.2024
|
Online Access | Get full text |
ISSN | 0096-3003 |
DOI | 10.1016/j.amc.2023.128444 |
Cover
ArticleNumber | 128444 |
---|---|
Author | Ban, Mingfei Zhu, Liangkuan Li, Xin Lei, Anzhi |
Author_xml | – sequence: 1 givenname: Xin orcidid: 0000-0002-8771-2478 surname: Li fullname: Li, Xin – sequence: 2 givenname: Anzhi surname: Lei fullname: Lei, Anzhi – sequence: 3 givenname: Liangkuan surname: Zhu fullname: Zhu, Liangkuan – sequence: 4 givenname: Mingfei surname: Ban fullname: Ban, Mingfei |
BookMark | eNp9kMtOwzAQRb0oEm3hA9j5BxLGseMk7KqKR0UlNrCOJs6kJOQl2yBlwb-T0q5YsJqr0ZzR1VmxRT_0xNiNgFCA0LdNiJ0JI4hkKKJUKbVgS4BMBxJAXrKVcw0AJFqoJfvedaMdvur-wJ-x7bDnVd16srwaLDdTMafxfXK1wZa7yXnqHHefRUPGcz9wS2OLE0fv0Xy4O77pzzkoyc839dAHBToquRm6kXqHxxV33qKnw3TFLipsHV2f55q9Pdy_bp-C_cvjbrvZByZSsQ9kQTqtygpKmUYgKxVllRKkUWQxgVFZVJYZJXGJhCAVQYGoY41JSiLW2sg1E6e_xg7OWary0dYd2ikXkB-d5U0-O8uPzvKTs5lJ_jCm9r_15_J1-w_5A6rueig |
CitedBy_id | crossref_primary_10_1177_01423312241288307 crossref_primary_10_1177_09596518241273856 crossref_primary_10_1016_j_conengprac_2024_106082 |
Cites_doi | 10.1109/TCAD.2019.2935062 10.1109/TCYB.2021.3060743 10.1016/j.epsr.2022.108654 10.1016/j.ins.2019.10.057 10.1016/j.automatica.2020.108812 10.1109/MCS.2014.2364724 10.1016/j.jprocont.2018.05.005 10.1109/TVT.2020.3020845 10.1016/j.automatica.2022.110461 10.1016/j.ins.2022.06.082 10.1109/LSP.2021.3078696 10.1016/j.jprocont.2021.07.011 10.1109/TAC.2015.2416924 10.1109/JIOT.2021.3067667 10.1080/00207179.2020.1862917 10.1016/j.automatica.2021.109668 10.1016/j.automatica.2017.01.031 10.1016/j.automatica.2022.110410 10.1016/j.asej.2022.102004 10.1016/j.jprocont.2022.06.002 10.1016/j.automatica.2019.108557 10.1016/j.jprocont.2021.08.007 10.1016/j.jprocont.2018.11.007 10.1007/s40313-020-00633-5 10.1016/j.micpro.2020.103637 10.1016/j.automatica.2022.110302 10.1109/TCYB.2019.2956137 10.1109/LCSYS.2019.2920507 10.1109/LSP.2020.2996908 10.1016/j.isatra.2022.06.015 10.1016/j.physa.2019.01.137 10.1016/j.automatica.2021.109517 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1016/j.amc.2023.128444 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics |
ExternalDocumentID | 10_1016_j_amc_2023_128444 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 23M 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ 9JN AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYWO AAYXX ABAOU ABEFU ABFNM ABFRF ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACRLP ACRPL ACVFH ADBBV ADCNI ADEZE ADGUI ADIYS ADMUD ADNMO AEBSH AEFWE AEIPS AEKER AENEX AEUPX AFFNX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGQPQ AGRNS AGUBO AGYEJ AHHHB AI. AIEXJ AIGII AIGVJ AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU APXCP ARUGR ASPBG AVWKF AXJTR AZFZN BKOJK BLXMC BNPGV CITATION CS3 EBS EFJIC EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HLZ HMJ HVGLF HZ~ IHE J1W KOM LG9 M26 M41 MHUIS MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ RXW SBC SDF SDG SES SEW SME SPC SPCBC SSH SSW SSZ T5K TAE TN5 VH1 VOH WH7 WUQ X6Y XPP ZMT ~02 ~G- |
ID | FETCH-LOGICAL-c245t-3be68fdf0d38203f429f41e6a195e0c492dd9e75daea034e0baa656a78e1566c3 |
ISSN | 0096-3003 |
IngestDate | Tue Jul 01 01:36:31 EDT 2025 Thu Apr 24 23:11:07 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c245t-3be68fdf0d38203f429f41e6a195e0c492dd9e75daea034e0baa656a78e1566c3 |
ORCID | 0000-0002-8771-2478 |
ParticipantIDs | crossref_primary_10_1016_j_amc_2023_128444 crossref_citationtrail_10_1016_j_amc_2023_128444 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-04-00 |
PublicationDateYYYYMMDD | 2024-04-01 |
PublicationDate_xml | – month: 04 year: 2024 text: 2024-04-00 |
PublicationDecade | 2020 |
PublicationTitle | Applied mathematics and computation |
PublicationYear | 2024 |
References | Jahromi (10.1016/j.amc.2023.128444_br0030) 2021; 8 Zhang (10.1016/j.amc.2023.128444_br0150) 2021; 127 Feng (10.1016/j.amc.2023.128444_br0360) 2017; 79 Farha (10.1016/j.amc.2023.128444_br0320) 2022; 21 Zhao (10.1016/j.amc.2023.128444_br0080) 2023; 447 Franze (10.1016/j.amc.2023.128444_br0200) 2019; 3 Palleti (10.1016/j.amc.2023.128444_br0290) 2018; 68 Liu (10.1016/j.amc.2023.128444_br0120) 2018; 337 Zhang (10.1016/j.amc.2023.128444_br0010) 2020; 50 Wang (10.1016/j.amc.2023.128444_br0110) 2021; 28 Zaman (10.1016/j.amc.2023.128444_br0180) 2022; 95 Hua (10.1016/j.amc.2023.128444_br0280) 2023; 132 Bu (10.1016/j.amc.2023.128444_br0020) 2020; 39 Fang (10.1016/j.amc.2023.128444_br0330) 2022; 112 Mo (10.1016/j.amc.2023.128444_br0370) 2015; 35 Feng (10.1016/j.amc.2023.128444_br0160) 2022; 141 Zhao (10.1016/j.amc.2023.128444_br0250) 2022; 142 Montanari (10.1016/j.amc.2023.128444_br0380) 2020; 31 Li (10.1016/j.amc.2023.128444_br0140) 2022; 144 Song (10.1016/j.amc.2023.128444_br0090) 2020; 376 Kumar (10.1016/j.amc.2023.128444_br0170) 2023; 14 Ge (10.1016/j.amc.2023.128444_br0060) 2020; 512 Gong (10.1016/j.amc.2023.128444_br0210) 2020; 27 Mukherjee (10.1016/j.amc.2023.128444_br0240) 2021; 105 Phogat (10.1016/j.amc.2023.128444_br0260) 2020; 114 Chen (10.1016/j.amc.2023.128444_br0040) 2022; 213 Ahmed (10.1016/j.amc.2023.128444_br0220) 2022; 116 Lima (10.1016/j.amc.2023.128444_br0230) 2021; 105 Tu (10.1016/j.amc.2023.128444_br0050) 2019; 522 Dong (10.1016/j.amc.2023.128444_br0100) 2023; 443 Ge (10.1016/j.amc.2023.128444_br0130) 2019; 109 Yan (10.1016/j.amc.2023.128444_br0350) 2022; 52 Padhan (10.1016/j.amc.2023.128444_br0310) 2022; 608 De Persis (10.1016/j.amc.2023.128444_br0340) 2015; 60 Ding (10.1016/j.amc.2023.128444_br0070) 2021; 129 Lv (10.1016/j.amc.2023.128444_br0270) 2022; 418 Yu (10.1016/j.amc.2023.128444_br0390) 2021; 80 Xu (10.1016/j.amc.2023.128444_br0190) 2021; 70 Varshney (10.1016/j.amc.2023.128444_br0300) 2019; 76 |
References_xml | – volume: 39 start-page: 2081 issue: 10 year: 2020 ident: 10.1016/j.amc.2023.128444_br0020 article-title: Scenario-based online reachability validation for cps fault prediction publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. doi: 10.1109/TCAD.2019.2935062 – volume: 52 start-page: 9609 issue: 9 year: 2022 ident: 10.1016/j.amc.2023.128444_br0350 article-title: Secure state estimation with switched compensation mechanism against DoS attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2021.3060743 – volume: 213 year: 2022 ident: 10.1016/j.amc.2023.128444_br0040 article-title: Cyber-physical system fusion modeling and robustness evaluation publication-title: Electr. Power Syst. Res. doi: 10.1016/j.epsr.2022.108654 – volume: 512 start-page: 1592 year: 2020 ident: 10.1016/j.amc.2023.128444_br0060 article-title: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2019.10.057 – volume: 114 year: 2020 ident: 10.1016/j.amc.2023.128444_br0260 article-title: Invariant extended Kalman filter on matrix Lie groups publication-title: Automatica doi: 10.1016/j.automatica.2020.108812 – volume: 35 start-page: 93 issue: 1 year: 2015 ident: 10.1016/j.amc.2023.128444_br0370 article-title: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs publication-title: IEEE Control Syst. Mag. doi: 10.1109/MCS.2014.2364724 – volume: 68 start-page: 160 year: 2018 ident: 10.1016/j.amc.2023.128444_br0290 article-title: A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems publication-title: J. Process Control doi: 10.1016/j.jprocont.2018.05.005 – volume: 70 start-page: 5524 issue: 6 year: 2021 ident: 10.1016/j.amc.2023.128444_br0190 article-title: Robust reset speed synchronization control for an integrated motor-transmission powertrain system of a connected vehicle under a replay attack publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2020.3020845 – volume: 144 year: 2022 ident: 10.1016/j.amc.2023.128444_br0140 article-title: Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis publication-title: Automatica doi: 10.1016/j.automatica.2022.110461 – volume: 608 start-page: 825 year: 2022 ident: 10.1016/j.amc.2023.128444_br0310 article-title: Design of false data injection attacks in cyber-physical systems publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.06.082 – volume: 28 start-page: 1002 year: 2021 ident: 10.1016/j.amc.2023.128444_br0110 article-title: Elimination of undetectable attacks on natural gas networks publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2021.3078696 – volume: 418 year: 2022 ident: 10.1016/j.amc.2023.128444_br0270 article-title: An adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacks publication-title: Appl. Math. Comput. – volume: 21 start-page: 342 issue: 1 year: 2022 ident: 10.1016/j.amc.2023.128444_br0320 article-title: Timestamp scheme to mitigate replay attacks in secure ZigBee networks publication-title: IEEE Trans. Mob. Comput. – volume: 105 start-page: 108 year: 2021 ident: 10.1016/j.amc.2023.128444_br0230 article-title: A predictor for dead-time systems based on the Kalman filter for improved disturbance rejection and robustness publication-title: J. Process Control doi: 10.1016/j.jprocont.2021.07.011 – volume: 60 start-page: 2930 issue: 11 year: 2015 ident: 10.1016/j.amc.2023.128444_br0340 article-title: Input-to-state stabilizing control under denial-of-service publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2015.2416924 – volume: 8 start-page: 13712 issue: 17 year: 2021 ident: 10.1016/j.amc.2023.128444_br0030 article-title: Toward detection and attribution of cyber-attacks in IoT-enabled cyber physical systems publication-title: IEEE Int. Things J. doi: 10.1109/JIOT.2021.3067667 – volume: 95 start-page: 1562 issue: 6 year: 2022 ident: 10.1016/j.amc.2023.128444_br0180 article-title: Security analysis and fault detection against stealthy replay attacks publication-title: Int. J. Control doi: 10.1080/00207179.2020.1862917 – volume: 129 year: 2021 ident: 10.1016/j.amc.2023.128444_br0070 article-title: Interference game for intelligent sensors in cyber Physical systems publication-title: Automatica doi: 10.1016/j.automatica.2021.109668 – volume: 79 start-page: 42 year: 2017 ident: 10.1016/j.amc.2023.128444_br0360 article-title: Resilient control under denial-of-service: robust design publication-title: Automatica doi: 10.1016/j.automatica.2017.01.031 – volume: 142 year: 2022 ident: 10.1016/j.amc.2023.128444_br0250 article-title: Robust stable iterated unscented Kalman filter based on maximum correntropy criterion publication-title: Automatica doi: 10.1016/j.automatica.2022.110410 – volume: 14 issue: 7 year: 2023 ident: 10.1016/j.amc.2023.128444_br0170 article-title: Fractional mathematical modeling of the Stuxnet virus along with an optimal control problem publication-title: Ain Shams Eng. J. doi: 10.1016/j.asej.2022.102004 – volume: 116 start-page: 136 year: 2022 ident: 10.1016/j.amc.2023.128444_br0220 article-title: A practical physical watermarking approach to detect replay attacks in a CPS publication-title: J. Process Control doi: 10.1016/j.jprocont.2022.06.002 – volume: 337 start-page: 469 year: 2018 ident: 10.1016/j.amc.2023.128444_br0120 article-title: Simultaneous fault detection and control for continuous-time Markovian jump systems with partially unknown transition probabilities publication-title: Appl. Math. Comput. – volume: 376 year: 2020 ident: 10.1016/j.amc.2023.128444_br0090 article-title: H∞ controller design of networked control systems with a new quantization structure publication-title: IEEE Signal Process. Lett. – volume: 443 year: 2023 ident: 10.1016/j.amc.2023.128444_br0100 article-title: Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems publication-title: Appl. Math. Comput. – volume: 109 year: 2019 ident: 10.1016/j.amc.2023.128444_br0130 article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica doi: 10.1016/j.automatica.2019.108557 – volume: 105 start-page: 267 year: 2021 ident: 10.1016/j.amc.2023.128444_br0240 article-title: Broyden's update based extended Kalman filter for nonlinear state estimation publication-title: J. Process Control doi: 10.1016/j.jprocont.2021.08.007 – volume: 76 start-page: 98 year: 2019 ident: 10.1016/j.amc.2023.128444_br0300 article-title: State and parameter estimation using extended Kitanidis Kalman filter publication-title: J. Process Control doi: 10.1016/j.jprocont.2018.11.007 – volume: 447 year: 2023 ident: 10.1016/j.amc.2023.128444_br0080 article-title: Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks publication-title: Appl. Math. Comput. – volume: 31 start-page: 1348 year: 2020 ident: 10.1016/j.amc.2023.128444_br0380 article-title: Observability of network systems: a critical review of recent results publication-title: J. Control Autom. Electr. Syst. doi: 10.1007/s40313-020-00633-5 – volume: 80 year: 2021 ident: 10.1016/j.amc.2023.128444_br0390 article-title: Service attack improvement in wireless sensor network based on machine learning publication-title: Microprocess. Microsyst. doi: 10.1016/j.micpro.2020.103637 – volume: 112 year: 2022 ident: 10.1016/j.amc.2023.128444_br0330 article-title: Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems publication-title: Automatica – volume: 141 year: 2022 ident: 10.1016/j.amc.2023.128444_br0160 article-title: Resilient quantized control under denial-of-service: variable bit rate quantization publication-title: Automatica doi: 10.1016/j.automatica.2022.110302 – volume: 50 start-page: 3616 issue: 8 year: 2020 ident: 10.1016/j.amc.2023.128444_br0010 article-title: Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2019.2956137 – volume: 3 start-page: 984 issue: 4 year: 2019 ident: 10.1016/j.amc.2023.128444_br0200 article-title: Resilient control for cyber-physical systems subject to replay attacks publication-title: IEEE Control Syst. Lett. doi: 10.1109/LCSYS.2019.2920507 – volume: 27 start-page: 920 year: 2020 ident: 10.1016/j.amc.2023.128444_br0210 article-title: Detecting replay attacks using multi-channel audio: a neural network-based method publication-title: IEEE Signal Process. Lett. doi: 10.1109/LSP.2020.2996908 – volume: 132 start-page: 222 year: 2023 ident: 10.1016/j.amc.2023.128444_br0280 article-title: Fusion and detection for multi-sensor systems under false data injection attacks publication-title: ISA Trans. doi: 10.1016/j.isatra.2022.06.015 – volume: 522 start-page: 9 year: 2019 ident: 10.1016/j.amc.2023.128444_br0050 article-title: Robustness assessment of cyber physical systems with weak interdependency publication-title: Physica A doi: 10.1016/j.physa.2019.01.137 – volume: 127 year: 2021 ident: 10.1016/j.amc.2023.128444_br0150 article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol publication-title: Automatica doi: 10.1016/j.automatica.2021.109517 |
SSID | ssj0007614 |
Score | 2.485219 |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 128444 |
Title | Improving Kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy |
Volume | 466 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaWcoEDojxEeVQ-cKLyKhs7yYZbQVQVUE6ttLfIduySdptG3eTQSnDkdzOO7cTbh0S5REnkWFHm08x4_M0XhN5Hmmmai5JInUjCJM0IB6dHZjmH4JeIfN6XBg5-pPtH7OsiWUwmfwLWUteKqby6ta_kf6wK98Cupkv2HpYdJoUbcA72hSNYGI7_ZOOxIvCNL00xXldm87unDspLAWeNN4NVbF7trDphKi8m5bxQzZJf7vC2NX32rkJor0ip2p6jVRMT5vrOtwYWvBYtK6tou7Yh7LPZs0EGduVb5ppufbv_e08gWFQBGaiy3Mqrn9VYyO5syYDXx6fdCOFP3LH962OtqrBmEYdUF-eHc8O4i2joh1kaelITN60y5A0nb-sNJ1N-ZjQoYzodx64Lal8LdAP90DPbTgqYojBTFHaKB-hhnEEOBn5x-nukCmWp1Yj3b-13x3ue4LW3CPKbIFE5fIqeuBUG3rVw2UQTVT9Djw9GuzxHvwbgYAscbIGDATi4Bw72wMEOONgBB7fn2AIHO-B8xLs1vh02OIQN9rB5gY72vhx-3ifuPxxExixpCRUqnetSRyWFfJFqSGE0m6mUz_JERZLlcVnmKktKrnhEmYoE57BM4NlcmeqApC_RRn1eq1cIR1pIiBlJqo0KFBO5msGEIoNlf6kETbZQ5L9eIZ1IvflXyrK402Zb6MPwSGMVWu4e_Po-g9-gRyN436KN9qJT7yAFbcV2j4-_nYuLRQ |
linkProvider | Elsevier |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Improving+Kalman+filter+for+cyber+physical+systems+subject+to+replay+attacks%3A+An+attack-detection-based+compensation+strategy&rft.jtitle=Applied+mathematics+and+computation&rft.au=Li%2C+Xin&rft.au=Lei%2C+Anzhi&rft.au=Zhu%2C+Liangkuan&rft.au=Ban%2C+Mingfei&rft.date=2024-04-01&rft.issn=0096-3003&rft.volume=466&rft.spage=128444&rft_id=info:doi/10.1016%2Fj.amc.2023.128444&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_amc_2023_128444 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0096-3003&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0096-3003&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0096-3003&client=summon |