Encryption scheduling for remote state estimation under an operation constraint

[1]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[2]  Ling Shi,et al.  Kalman Filtering Over a Packet-Dropping Network: A Probabilistic Perspective , 2010, IEEE Transactions on Automatic Control.

[3]  Moritz Wiese,et al.  Secure Estimation and Zero-Error Secrecy Capacity , 2016, IEEE Transactions on Automatic Control.

[4]  Daniel E. Quevedo,et al.  Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.

[5]  Ling Shi,et al.  Dynamic sensor transmission power scheduling for remote state estimation , 2014, Autom..

[6]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[7]  Ling Shi,et al.  Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..

[8]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[9]  Soummya Kar,et al.  Distributed Kalman Filtering With Quantized Sensing State , 2015, IEEE Transactions on Signal Processing.

[10]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[11]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[12]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[13]  Peter Xiaoping Liu,et al.  A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..

[14]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[15]  R. Gray,et al.  Dithered Quantizers , 1993, Proceedings. 1991 IEEE International Symposium on Information Theory.

[16]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[18]  George J. Pappas,et al.  State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.

[19]  Daniel E. Quevedo,et al.  Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.

[20]  Sandeep K. S. Gupta,et al.  Special Issue on Cyber-Physical Systems [Scanning the Issue] , 2012, Proc. IEEE.

[21]  L. Schuchman Dither Signals and Their Effect on Quantization Noise , 1964 .