2018
DOI: 10.1016/j.jfranklin.2018.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Optimal jamming attack schedule for remote state estimation with two sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Communication-based attacks are types of attacks that impact communication links. Message replay and channel jamming attacks are categorized under communication-based attacks [ 23 ]. This is because they can be executed on the communication links to impose negative consequences on the normal operation of the target systems [ 13 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Communication-based attacks are types of attacks that impact communication links. Message replay and channel jamming attacks are categorized under communication-based attacks [ 23 ]. This is because they can be executed on the communication links to impose negative consequences on the normal operation of the target systems [ 13 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Constraint ( 13) means that the total energy of the attacker is limited to , where i represents the consumed energy that the attacker launches jamming attack on channel i once. Constraint (14) shows that only one channel is under jamming attack at a time k. Constraint (15) shows that each channel is attacked at least once during the period T. Constraint ( 16) means the remaining energy, which is equal to the total energy minus the spent energy, to attack on any channel. In other words, the attacker uses enough energy to attack more times on the wireless channels, which can degrade the estimation performance at a much higher level.…”
Section: Problem Formulationmentioning
confidence: 99%
“…ally transmit on a wireless channel with a set of frequency bands [14]. Jamming attack may be regarded as a special form of DoS attack [15].…”
mentioning
confidence: 99%
“…The existence of the network brings many conveniences because of its openness and sharing, at the same time, the data transmitted via the network are vulnerable to spiteful VOLUME 4, 2016 signal, such as cyber attacks [21], [23]. Cyber attacks pose a great threat to system performance [24]- [26]. Generally, cyber attacks widely investigated in the literatures include replay attacks [27], denial of service (DoS) attacks [9], [16], [28] and deception attacks [12], [20], [29].…”
Section: Introductionmentioning
confidence: 99%