We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance. A malicious attacker can modify the ACKs from the remote estimator and convey fake information to the sensor. When the capability of the attacker is limited, we propose an attack strategy for the attacker and analyze the corresponding effect on the estimation performance. The possible responses of the sensor are studied and a condition for the sensor to discard ACKs and switch from online schedule to offline schedule is provided
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Abstract—A power grid is a complex system connecting electric power generators to consumers through ...
State estimation in critical networked infrastructure such as the transportation and electricity (sm...
We consider a class of malicious attacks against remote state estimation. A sensor with limited res...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
The SCADA system, which is widely used in the continuous monitoring and control of the physical proc...
We consider the sensor scheduling problem for remote state estimation under integrity attacks. We se...
The problem of deception attacks utilizing both disclosure and disruption resources in the multiple ...
In this paper, we consider the security of remote state estimation in cyber-physical systems, where ...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
We propose an online sensor transmission power schedule for remote state estimation. A sensor sends ...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
For geographically separated cyber-physical systems, state estimation at a remote monitoring or cont...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Abstract—A power grid is a complex system connecting electric power generators to consumers through ...
State estimation in critical networked infrastructure such as the transportation and electricity (sm...
We consider a class of malicious attacks against remote state estimation. A sensor with limited res...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
The SCADA system, which is widely used in the continuous monitoring and control of the physical proc...
We consider the sensor scheduling problem for remote state estimation under integrity attacks. We se...
The problem of deception attacks utilizing both disclosure and disruption resources in the multiple ...
In this paper, we consider the security of remote state estimation in cyber-physical systems, where ...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
We propose an online sensor transmission power schedule for remote state estimation. A sensor sends ...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
For geographically separated cyber-physical systems, state estimation at a remote monitoring or cont...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Abstract—A power grid is a complex system connecting electric power generators to consumers through ...
State estimation in critical networked infrastructure such as the transportation and electricity (sm...