This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmits its local estimate of an underlying physical process to a remote estimator via a wireless communication channel. A DoS attacker is capable to interfere the channel and degrades the remote estimation accuracy. Considering the tactical jamming strategies played by the attacker, the sensor adjusts its transmission power. This interactive process between the sensor and the attacker is studied in the framework of a zero-sum stochastic game. To derive their optimal power schemes, we first discuss the existence of stationary Nash equilibrium for this game. We then present the monotone structure of the optimal strategies, which helps reduce the com...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) atta...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
In this paper, we consider remote state estimation in an adversarial environment. A sensor forwards ...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
This paper studies the Denial-of-Service (DoS) attack power allocation issue, which aims to aggravat...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) atta...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
In this paper, we consider remote state estimation in an adversarial environment. A sensor forwards ...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
This paper studies the Denial-of-Service (DoS) attack power allocation issue, which aims to aggravat...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) atta...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...