2021
DOI: 10.1109/access.2020.3046483
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 33 publications
0
1
0
Order By: Relevance
“…Of course, homomorphic encryption is an important technology to ensure the privacy and security of information. Researchers use homomorphic encryption for data privacy protection in federated learning [17], [18]. Differential privacy technology is the latest method to protect data privacy in recent years.…”
Section: Related Workmentioning
confidence: 99%
“…Of course, homomorphic encryption is an important technology to ensure the privacy and security of information. Researchers use homomorphic encryption for data privacy protection in federated learning [17], [18]. Differential privacy technology is the latest method to protect data privacy in recent years.…”
Section: Related Workmentioning
confidence: 99%
“…But, the variation in the time allocated for the attack on each sensor and the "universality" of the attack were not considered in the solution. A jamming attack system is established for a type of a WNCS targeting each sensor in the system [167]. A few major security attacks on the intelligent connected vehicles is identified [168].…”
Section: Spoofing Attacksmentioning
confidence: 99%