Jamming attack in centralized state estimation

C Yang, X Ren, W Yang, H Shi… - 2015 34th Chinese …, 2015 - ieeexplore.ieee.org
To understand the behavior of potential network invaders, this paper considers a system
attack problem from the perspective of an invader. The invader intends to attack a system …

DoS attack energy management against remote state estimation

H Zhang, Y Qi, J Wu, L Fu, L He - IEEE Transactions on Control …, 2016 - ieeexplore.ieee.org
This paper considers a remote state estimation problem, where a sensor measures the state
of a linear discrete-time process and has computational capability to implement a local …

Optimal jamming power allocation against remote state estimation

H Zhang, Y Qi, J Wu - 2017 American Control Conference …, 2017 - ieeexplore.ieee.org
This paper investigates a remote state estimation problem, where a smart sensor observes
the state of a physical plant, locally estimates the state with Kalman filter, and then sends its …

DoS attack in centralised sensor network against state estimation

C Yang, W Yang, H Shi - IET Control Theory & Applications, 2018 - Wiley Online Library
This study considers a model that a centralised sensor network is attacked by an invader,
who launches the denial‐of‐service (DoS) attack on the network. To understand the …

Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution

X Ren, J Wu, S Dey, L Shi - Automatica, 2018 - Elsevier
This paper considers optimal attack attention allocation on remote state estimation in multi-
systems. Suppose there are M independent systems, each of which has a remote sensor …

Optimal jamming attack schedule for remote state estimation with two sensors

L Peng, X Cao, H Shi, C Sun - Journal of the Franklin Institute, 2018 - Elsevier
In cyber-physical systems (CPS), cyber threats emerge in many ways which can cause
significant destruction to the system operation. In wireless CPS, adversaries can block the …

Optimal DoS attacks on remote state estimation with a router

J Wang, L Shi - 2018 IEEE Conference on Decision and Control …, 2018 - ieeexplore.ieee.org
In this paper, we consider Denial-of-service attacks against remote state estimation with a
router. A sensor measures the state of a discrete-time linear process, and sends the …

Defensive deception against reactive jamming attacks in remote state estimation

K Ding, X Ren, DE Quevedo, S Dey, L Shi - Automatica, 2020 - Elsevier
This paper considers a synthetic counter-measure, combining transmission scheduling and
defensive deception, to defend against jamming attacks in remote state estimation. In the …

DoS attacks on remote state estimation with asymmetric information

K Ding, X Ren, DE Quevedo, S Dey… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider remote state estimation in an adversarial environment. A sensor
forwards local state estimates to a remote estimator over a vulnerable network, which may …

Optimal DoS attack policy against remote state estimation

H Zhang, P Cheng, L Shi, J Chen - 52nd IEEE conference on …, 2013 - ieeexplore.ieee.org
Security of Cyber-Physical System (CPS) has gained increasing attention in recent years.
Most existing works mainly investigate the system performance given the attacking patterns …