2016
DOI: 10.1016/j.ifacol.2016.10.391
|View full text |Cite
|
Sign up to set email alerts
|

Deception-based Sensor Scheduling for Remote Estimation under DoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…A sliding mode control for the resilience against DoS attacks in nonlinear and chaotic systems has been proposed in [160]. An acknowledgebased cheating scheme is proposed in [161]. Another technique is [162], where it proposes a decomposition of Kalman filters as a weighted sum of local state estimates under sparse sensor deception attacks (A 2 ) into a more secure estimation framework.…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…A sliding mode control for the resilience against DoS attacks in nonlinear and chaotic systems has been proposed in [160]. An acknowledgebased cheating scheme is proposed in [161]. Another technique is [162], where it proposes a decomposition of Kalman filters as a weighted sum of local state estimates under sparse sensor deception attacks (A 2 ) into a more secure estimation framework.…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…The state estimation problem over wireless channels with SINR-based models have been discussed in [ 65 , 66 ]. Furthermore, Ding et al [ 67 ] considered a network setup with multiple wireless channels.…”
Section: An Overview Of Literature On Denial-of-service In Controlmentioning
confidence: 99%
“…In particular, the sensor and the attacker are considered to be the players of a game. In the setting in [ 65 , 66 ], the players attempt to optimize not only the timing but also the signal and the interference power levels of transmissions and attacks. In the multi-channel estimation problem considered in [ 67 ], the sensor aims to optimally select the wireless channels that will be used to transmit packets, and, moreover, the attacker wants to optimally select the channels that will be blocked.…”
Section: An Overview Of Literature On Denial-of-service In Controlmentioning
confidence: 99%
See 2 more Smart Citations