2016
DOI: 10.1002/asjc.1441
|View full text |Cite
|
Sign up to set email alerts
|

Testing and Defending Methods Against DOS Attack in State Estimation

Abstract: In this paper, we consider a state estimation problem. In this problem, a sensor measures the state of a linear discrete‐time system and sends measurements to an estimator via a packet‐dropping communication link. We are concerned with the effect of Denial‐of‐Service (DoS) attacks on stability of the estimation system, and particularly focus on how to examine whether the communication channel is under DoS attack or not as well as how to defend accordingly, if defense is possible. We formulate the detection pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 84 publications
(36 citation statements)
references
References 44 publications
(67 reference statements)
0
36
0
Order By: Relevance
“…where ψ i (t) is the initial condition of error networks (6). Throughout this paper, we assume that e i (t) is right-hand continuous at t = t k , k ∈  , and e i (t k ) = e i (t + k ) = lim t→t + k e i (t), e i (t − k ) = lim t→t − k e i (t).…”
Section: Ds(t) =mentioning
confidence: 99%
See 2 more Smart Citations
“…where ψ i (t) is the initial condition of error networks (6). Throughout this paper, we assume that e i (t) is right-hand continuous at t = t k , k ∈  , and e i (t k ) = e i (t + k ) = lim t→t + k e i (t), e i (t − k ) = lim t→t − k e i (t).…”
Section: Ds(t) =mentioning
confidence: 99%
“…Suppose that Assumptions 1 and 2 are satisfied. Consider the coupled error Lur'e networks (6) and the distributed pinning controller (5). For the impulsive sequence ζ = {t 1 , t 2 , · · ·} defined in Definition 2, assume that the average impulsive interval is less than N a .…”
Section: Exponential Synchronization Of Stochastic Lur'e Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, the open access nature and hierarchical framework of CPS lead to severe accidents as reported in various outlets [2][3][4][5][6][7]. Serious potential hazard is proved to be existed in CPS, which is easily to be compromised by denial-of-service (DoS) attack [8,9], intelligent attack [10], and integrity data attack [11]. Encryption CPS is then proposed to deal with this problem.…”
Section: Introductionmentioning
confidence: 99%
“…Multi-sensor fusion estimation is the organic fusion of data from multiple sensors to obtain more accurate and comprehensive state information or more accurate estimates than a single sensor. With the rapid development of computer science and information technology, the performance of the sensor has been greatly improved, this made multi-sensor fusion estimation being widely used in target tracking, signal processing, GPS positioning, fault detection, traffic control and many other fields [1][2][3][4][5][6]. In recent years, although the introduction of wireless networked multi-sensor system has brought some advantages, such as wide coverage, low cost and good robustness, it also brings a series of new issues, such as energy constrained, bandwidth constrained, signal acquisition and asynchronous transmission.…”
Section: Introductionmentioning
confidence: 99%