pith. machine review for the scientific record. sign in

arxiv: 1506.07955 · v1 · pith:HJVT42Z3new · submitted 2015-06-26 · 💻 cs.SY · math.OC

Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation

classification 💻 cs.SY math.OC
keywords sensorestimationremotescheduleattackerstateacksattack
0
0 comments X
read the original abstract

We consider a class of malicious attacks against remote state estimation. A sensor with limited resources adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance. A malicious attacker can modify the ACKs from the remote estimator and convey fake information to the sensor. When the capability of the attacker is limited, we propose an attack strategy for the attacker and analyze the corresponding effect on the estimation performance. The possible responses of the sensor are studied and a condition for the sensor to discard ACKs and switch from online schedule to offline schedule is provided.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.