{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:47:50Z","timestamp":1720115270312},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100011248","name":"State Key Laboratory of Synthetical Automation for Process Industries","doi-asserted-by":"publisher","award":["2018ZCX03"],"id":[{"id":"10.13039\/501100011248","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFE0201100"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61621004","U1908213"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.ins.2022.08.025","type":"journal-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T15:02:21Z","timestamp":1660230141000},"page":"674-693","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach"],"prefix":"10.1016","volume":"610","author":[{"given":"Xuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guang-Hong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2022.08.025_b0005","first-page":"3029","article-title":"On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds","author":"Bai","year":"2014","journal-title":"American Control Conference (ACC)"},{"key":"10.1016\/j.ins.2022.08.025_b0010","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/ACC.2015.7170734","article-title":"Security in stochastic control systems: Fundamental limitations and performance bounds","author":"Bai","year":"2015","journal-title":"American Control Conference (ACC)"},{"key":"10.1016\/j.ins.2022.08.025_b0015","article-title":"Robust Model-Based Fault Diagnosis for Dynamic Systems","volume":"3","author":"Chen","year":"2012","journal-title":"Springer Science and Business Media"},{"issue":"1","key":"10.1016\/j.ins.2022.08.025_b0020","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","article-title":"Stuxnet and the future of cyber war","volume":"51","author":"Farwell","year":"2010","journal-title":"Survival"},{"key":"10.1016\/j.ins.2022.08.025_b0025","article-title":"Detection of sensor data injection attacks with multiplicative watermarking","author":"Ferrari","year":"2018","journal-title":"Procs. of European Control Conference (ECC)"},{"key":"10.1016\/j.ins.2022.08.025_b0030","doi-asserted-by":"crossref","unstructured":"R.M.G. Ferrari, A.M.H. Teixeira, Detection and isolation of replay attacks through sensor watermarking, Procs. of 20th IFAC World Congress 50 (1) (2017) 7363\u20137368.","DOI":"10.1016\/j.ifacol.2017.08.1502"},{"key":"10.1016\/j.ins.2022.08.025_b0035","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.ins.2020.08.055","article-title":"Detection, estimation, and compensation of false data injection attack for UAVs","volume":"546","author":"Gu","year":"2021","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2022.08.025_b0045","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCNS.2016.2570003","article-title":"Optimal linear cyber-attack on remote state estimation","volume":"4","author":"Guo","year":"2017","journal-title":"IEEE Trans. Control. Netw. Syst."},{"key":"10.1016\/j.ins.2022.08.025_b0050","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.automatica.2017.11.018","article-title":"Worst-case stealthy innovation-based linear attack on remote state estimation","volume":"89","author":"Guo","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2022.08.025_b0055","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.automatica.2017.09.028","article-title":"State estimation under false data injection attacks: Security analysis and system protection","volume":"87","author":"Hu","year":"2018","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2022.08.025_b0060","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1016\/j.ins.2019.01.001","article-title":"Optimal stealthy false data injection attacks in cyber-physical systems","volume":"481","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"issue":"6","key":"10.1016\/j.ins.2022.08.025_b0065","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1109\/TSMC.2019.2924976","article-title":"Optimal stealthy innovation-based attacks with historical data in cyber-physical systems","volume":"51","author":"Li","year":"2021","journal-title":"IEEE Trans. Syst., Man, Cybern."},{"key":"10.1016\/j.ins.2022.08.025_b0070","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.ins.2022.01.014","article-title":"Optimal completely stealthy attacks against remote estimation in cyber-physical systems","volume":"590","author":"Li","year":"2022","journal-title":"Inf. Sci."},{"issue":"10","key":"10.1016\/j.ins.2022.08.025_b0075","doi-asserted-by":"crossref","first-page":"3503","DOI":"10.1109\/TAC.2018.2798817","article-title":"False data injection attacks on networked control systems: A Stackelberg game analysis","volume":"63","author":"Li","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"issue":"3","key":"10.1016\/j.ins.2022.08.025_b0080","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1109\/TCNS.2016.2549640","article-title":"SINR-based dos attack on remote state estimation: A game-theoretic approach","volume":"4","author":"Li","year":"2017","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"10.1016\/j.ins.2022.08.025_b0085","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.ins.2019.08.052","article-title":"False data injection attacks against state estimation in the presence of sensor failures","volume":"508","author":"Lu","year":"2020","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.ins.2022.08.025_b0090","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TCNS.2016.2573039","article-title":"Coding schemes for securing cyber-physical systems against stealthy data injection attacks","volume":"4","author":"Miao","year":"2017","journal-title":"IEEE Trans. Control. Netw. Syst."},{"issue":"1","key":"10.1016\/j.ins.2022.08.025_b0095","first-page":"93","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"Mo","year":"2011","journal-title":"IEEE Control Syst. Magazine"},{"key":"10.1016\/j.ins.2022.08.025_b0100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2019.12.078","article-title":"Hierarchical optimal control for input-affine nonlinear systems through the formulation of Stackelberg game","volume":"517","author":"Mu","year":"2020","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.ins.2022.08.025_b0105","first-page":"71","article-title":"Event-triggered predictive control for networked control systems with DoS attacks","volume":"542","author":"Persis","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.08.025_b0110","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.neucom.2017.07.036","article-title":"Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems","volume":"272","author":"Peng","year":"2018","journal-title":"Neurocomputing"},{"key":"10.1016\/j.ins.2022.08.025_b0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.109090","article-title":"Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network","volume":"119","author":"Qin","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2022.08.025_b0120","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-0-387-75462-8_6","article-title":"Lessons learned from the maroochy water breach","volume":"253","author":"Slay","year":"2007","journal-title":"Critical Infrastructure Protection"},{"key":"10.1016\/j.ins.2022.08.025_b0125","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ins.2018.02.066","article-title":"A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems","volume":"444","author":"Su","year":"2018","journal-title":"Inf. Sci."},{"issue":"9","key":"10.1016\/j.ins.2022.08.025_b0130","doi-asserted-by":"crossref","first-page":"3300","DOI":"10.1109\/TSMC.2018.2875793","article-title":"Event-based tracking control of mobile robot with denial-of-service attacks","volume":"50","author":"Tang","year":"2020","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"10.1016\/j.ins.2022.08.025_b0135","first-page":"5991","article-title":"Cyber security analysis of state estimators in electric power systems","author":"Teixeira","year":"2010","journal-title":"Proc. 49th IEEE Conf. Decision Control"},{"key":"10.1016\/j.ins.2022.08.025_b0140","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ins.2021.09.042","article-title":"Optimal attack strategy against fault detectors for linear cyber-physical systems","volume":"581","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.08.025_b0145","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.ins.2018.04.051","article-title":"Game theoretical security detection strategy for networked systems","volume":"453","author":"Wu","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.08.025_b0150","doi-asserted-by":"crossref","unstructured":"S. Xiao, X. Ge, Q.L. Han, Y. Zhang, Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks, IEEE Trans. Cybern. doi: 10.1109\/TCYB.2021.3074318.","DOI":"10.1109\/TCYB.2021.3074318"},{"issue":"3","key":"10.1016\/j.ins.2022.08.025_b0155","doi-asserted-by":"crossref","first-page":"1220","DOI":"10.1109\/TCYB.2019.2900478","article-title":"Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks","volume":"50","author":"Xiao","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2022.08.025_b0160","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1016\/j.ins.2021.10.032","article-title":"Event triggered control of connected vehicles under multiple cyber attacks","volume":"582","author":"Xu","year":"2022","journal-title":"Inf. Sci."},{"issue":"6","key":"10.1016\/j.ins.2022.08.025_b0165","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1109\/TCYB.2019.2915124","article-title":"Summation detector for false data injection attack in cyber-physical systems","volume":"50","author":"Ye","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2022.08.025_b0170","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.ins.2018.12.091","article-title":"Stochastic coding detection scheme in cyber-physical systems against replay attack","volume":"481","author":"Ye","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.08.025_b0175","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ins.2020.12.057","article-title":"Optimizing vehicle routing via Stackelberg game framework and distributionally robust equilibrium optimization method","volume":"557","author":"Yin","year":"2021","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.ins.2022.08.025_b0180","doi-asserted-by":"crossref","first-page":"3685","DOI":"10.1109\/TVT.2015.2445833","article-title":"Active steering actuator fault detection for an automatically-steered electric ground vehicle","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.ins.2022.08.025_b0185","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/TMECH.2016.2542362","article-title":"Adaptive sliding-mode observer design for a selective catalytic reduction system of ground-vehicle diesel engines","volume":"21","author":"Zhang","year":"2016","journal-title":"IEEE\/ASME Trans. Mechatron."},{"key":"10.1016\/j.ins.2022.08.025_b0190","doi-asserted-by":"crossref","first-page":"2807","DOI":"10.1109\/TSP.2021.3078624","article-title":"Optimal stealthy linear-attack schedules on remote state estimation","volume":"69","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.ins.2022.08.025_b0195","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysconle.2020.104771","article-title":"Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems","volume":"144","author":"Zhang","year":"2020","journal-title":"Systems Control Lett."},{"key":"10.1016\/j.ins.2022.08.025_b0200","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.109117","article-title":"False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach","volume":"120","author":"Zhang","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2022.08.025_b0205","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1016\/j.ins.2018.07.058","article-title":"Game theoretic approach to shadowed sets: A three-way tradeoff perspective","volume":"507","author":"Zhang","year":"2020","journal-title":"Inf. Sci."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002552200901X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002552200901X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T07:33:28Z","timestamp":1674200008000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002552200901X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":40,"alternative-id":["S002002552200901X"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2022.08.025","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2022.08.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}