Adversarial FDI Attack Monitoring: Toward Secure Defense of Industrial Electronics
With the rapid developments in computational and communication resources, modern
industrial electronics systems can leverage networked structures to realize wireless remote …
industrial electronics systems can leverage networked structures to realize wireless remote …
Transmission scheduling for privacy-optimal encryption against eavesdrop** attacks on remote state estimation
In remote state estimation systems, the state being estimated may be wiretapped by
eavesdrop** communications from the sensor to the remote estimator. A straightforward …
eavesdrop** communications from the sensor to the remote estimator. A straightforward …
A secure encoding mechanism against deception attacks on multisensor remote state estimation
J Zhou, W Ding, W Yang - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper studies the defense strategy of remote state estimation under deception attacks.
In order to prevent the stealthy attacker from reducing the estimation performance without …
In order to prevent the stealthy attacker from reducing the estimation performance without …
An encoding mechanism for secrecy of remote state estimation
We consider a secure remote state estimation problem where the observations transmitted
from the sensors to a remote estimator could be intercepted by an eavesdropper. To prevent …
from the sensors to a remote estimator could be intercepted by an eavesdropper. To prevent …
State-secrecy codes for networked linear systems
In this paper, we study the problem of remote state estimation, in the presence of a passive
eavesdropper. An authorized user estimates the state of an unstable linear plant, based on …
eavesdropper. An authorized user estimates the state of an unstable linear plant, based on …
Distributed encryption fusion estimation against full eavesdrop**
This paper is concerned with the privacy-preserving distributed fusion estimation problem
against full eavesdrop**, where the eavesdropper can completely and precisely obtain …
against full eavesdrop**, where the eavesdropper can completely and precisely obtain …
Distributed anti-Eavesdrop** fusion estimation under energy constraints
In this article, we study the distributed fusion estimation problem with energy-constrained
sensors in the presence of eavesdroppers, where smart sensors send their local estimates …
sensors in the presence of eavesdroppers, where smart sensors send their local estimates …