BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Abstract

In this chapter, we consider the problem of inferring the system state from sensory data in an adversarial environment, where some of the sensors are compromised by an adversary and can report arbitrary readings. Our goal is to construct a secure state estimator, whose estimation error is bounded regardless of the adversary's action. This chapter is organized as follows: In Section 2.2, we consider the estimation problem in a static setting, where we try to estimate the state using the measurements collected at a single time step. The problem of estimating the state of a linear time-invariant system from sequential sensory data is further considered in Section 2.3.

Keywords:
Computer security State (computer science) Computer science Estimation Engineering Programming language Systems engineering

Metrics

1
Cited By
0.60
FWCI (Field Weighted Citation Impact)
1
Refs
0.66
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Yilin Mo

Year: 2016 Pages: 31-55
JOURNAL ARTICLE

Distributed Secure State Estimation Against Stealthy Attacks

Yan YuWen YangHuaiyu YuanLongyu LiChao Yang

Journal:   IEEE Signal Processing Letters Year: 2025 Vol: 32 Pages: 1930-1934
JOURNAL ARTICLE

Side Information Incorporated ϵ -Stealthy Attack Against Remote State Estimation

Li-Wei MaoGuang‐Hong Yang

Journal:   IEEE Transactions on Cybernetics Year: 2025 Vol: 55 (7)Pages: 3537-3542
JOURNAL ARTICLE

Stealthy Attack Against Distributed State Estimation for Cyber‐Physical Systems

Jie WangYun LiuHuaiyu YuanWen Yang

Journal:   International Journal of Robust and Nonlinear Control Year: 2024 Vol: 35 (3)Pages: 1091-1099
JOURNAL ARTICLE

Optimal Stealthy Attack Against Remote State Estimation With Parameterized $\epsilon$-Stealthiness

Li-Wei MaoGuang‐Hong Yang

Journal:   IEEE Transactions on Industrial Informatics Year: 2025 Pages: 1-9
© 2026 ScienceGate Book Chapters — All rights reserved.