2020
DOI: 10.1049/cth2.12078
|View full text |Cite
|
Sign up to set email alerts
|

Optimal energy allocation for remote state estimate under Denial‐of‐Service attack

Abstract: This paper considers an energy‐constrained sensor power allocation problem for remote estimation under Denial‐of‐Service attack. Due to power constraints, the sensor needs to make a decision on how much power it should employ to optimise the state estimation performance under Denial‐of‐Servic attacks without using real‐time acknowledgment information. Different from the existing works concerning non‐zero power value with discrete values or one power value, the authors consider the multilevel continuous‐valued … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 29 publications
(82 reference statements)
0
1
0
Order By: Relevance
“…For example, power transmission networks may be attacked and disrupted by controlling electrical facilities [14]. Typical cyber attacks include: denial of service (DoS) attacks [15][16][17], replay attacks [18,19], and deception attacks [20][21][22][23]. Network attacks are very dangerous and have become a critical threat to network control systems (NCSs) [24] and cyber physical systems (CPSs) [25].…”
Section: Introductionmentioning
confidence: 99%
“…For example, power transmission networks may be attacked and disrupted by controlling electrical facilities [14]. Typical cyber attacks include: denial of service (DoS) attacks [15][16][17], replay attacks [18,19], and deception attacks [20][21][22][23]. Network attacks are very dangerous and have become a critical threat to network control systems (NCSs) [24] and cyber physical systems (CPSs) [25].…”
Section: Introductionmentioning
confidence: 99%