Measurement-based optimal stealthy attacks on remote state estimation

P Li, D Ye - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
This paper focuses on designing measurement-based optimal stealthy attacks for linear
cyber-physical systems (CPSs), where attackers aim to deteriorate the performance of …

A Fault-Tolerant Communication Algorithm for Age-of-Information Optimization in DITENs

L Yang, Y Zou, S Shen, P Wang, D Yu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As an amalgamation of digital twin and edge computing, the digital twin edge networks
(DITENs) have drawn much attention from industry and academia to bridge the divide …

Distributed remote estimation over the collision channel with and without local communication

X Zhang, MM Vasconcelos, W Cui… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Internet of Things networks are the large-scale distributed systems consisting of a massive
number of simple devices communicating, typically, over a shared wireless medium. This …

[HTML][HTML] Entice to trap: Enhanced protection against a rate-aware intelligent jammer in cognitive radio networks

K Ibrahim, AM Alnajim, A Naveed Malik, A Waseem… - Sustainability, 2022 - mdpi.com
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine
learning techniques in the domains of frequency, coding, power and rate. Jamming is a …

The noise covariances of linear Gaussian systems with unknown inputs are not uniquely identifiable using autocovariance least-squares

H Kong, S Sukkarieh, TJ Arnold, T Chen… - Systems & Control …, 2022 - Elsevier
Existing works in optimal filtering for linear Gaussian systems with arbitrary unknown inputs
assume perfect knowledge of the noise covariances in the filter design. This is impractical …

Event-based wireless tracking control for a wheeled mobile robot against reactive jamming Attacks

H Xu, J Zhang, Z Sun, H Yang - IEEE Transactions on Control …, 2023 - ieeexplore.ieee.org
In this article, an event-based defense strategy is studied for a wireless remote tracking
control system of a wheeled mobile robot suffering from reactive jamming attack. First, utility …

Subsystem-importance-aware DoS attacks and countermeasures

H Liu, Y Ni, D Lyu, X Ren, X Wang - Automatica, 2024 - Elsevier
This paper is concerned with the security issue of remote state estimation in multi-systems.
Note that different subsystems or local state information possess varying levels of …

Optimal Resilient Tracking Control for Networked Systems With Multichannels Under Attacks

Y Yu, GP Liu, Y Huang, W Hu - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
This article is concerned with the problem of resilient output tracking control for a class of
discrete-time linear cyber-physical systems (CPSs) subject to denial-of-service attacks. The …

A back‐to‐back coordination‐based learning scheme for deceiving reactive jammers in distributed networks

Y Du, Y Zhang, P Qian, P He, W Wang… - IET …, 2024 - Wiley Online Library
Reactive jammers select jamming strategies according to the users' responses; thus,
conventional anti‐jamming methods such as frequency hopping are inadequate to defeat …

Resilient strategy design for cyber-physical system under active eavesdropping attack

H Yuan, Y Xia, Y Yuan, H Yang - Journal of the Franklin Institute, 2021 - Elsevier
We consider a remote state estimation process under an active eavesdropper for cyber-
physical system. A smart sensor transmits its local state estimates to a remote estimator over …