NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110395
|View full text |Cite
|
Sign up to set email alerts
|

Impact of False Data Injection Attacks on Deep Learning Enabled Predictive Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…Once an attacker has access to some or all of the devices on an IoT network via an MITM attack, one example of an attack they could carry out next is a False Data Injection (FDI) attack. FDI attacks are when an attacker alters measurements from IoT sensors by a small amount so as to avoid suspicion and then outputs the faulty data [21]. FDI attacks can be perpetrated in a number of ways, but in practice doing so via MITM attacks is the most practical.…”
Section: False Data Injection Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Once an attacker has access to some or all of the devices on an IoT network via an MITM attack, one example of an attack they could carry out next is a False Data Injection (FDI) attack. FDI attacks are when an attacker alters measurements from IoT sensors by a small amount so as to avoid suspicion and then outputs the faulty data [21]. FDI attacks can be perpetrated in a number of ways, but in practice doing so via MITM attacks is the most practical.…”
Section: False Data Injection Attacksmentioning
confidence: 99%
“…FDI attacks are often leveraged against sensors that send data to an algorithm that attempts to make predictions based on the data it has received or otherwise uses data to make conclusions. These algorithms, sometimes referred to as predictive maintenance systems, are commonly used in monitoring the state of a mechanical machine and predicting when it will need to be maintained or tuned [21]. These predictive maintenance algorithms and similar would also be a staple feature of smart cities, FDI attacks against which could be disastrous.…”
Section: False Data Injection Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“… False Data Injection: If the node has been captured, the intruder can insert erroneous information into the IoT application that can generate false results and cause IoT application to fail. DDoS attacks may use this critical approach too [ 47 ]. Service Interruption: Such threats are often classified in current literature as unauthorized disruption activities or DDoS attacks.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%
“…False Data Injection: If the node has been captured, the intruder can insert erroneous information into the IoT application that can generate false results and cause IoT application to fail. DDoS attacks may use this critical approach too [ 47 ].…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%