False Data Injection Attacks on Sensor Systems
Abstract
References
Index Terms
- False Data Injection Attacks on Sensor Systems
Recommendations
Defending collaborative false data injection attacks in wireless sensor networks
False data filtering is an important issue in wireless sensor networks. In this paper, we consider a new type of false data injection attacks called collaborative false data injection, and propose two schemes to defend such attacks. In collaborative ...
A technique to detect and mitigate false data injection attacks in Cyber–Physical Systems
AbstractThe advancement in communication, computation, and control technology has led to the integration of the cyber-world and physical-world. This has also increased the incidence of malicious attacks in Cyber–Physical Systems (CPSs), of which false ...
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation
CPS-SPC '16: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and PrivacySmart grid aims to improve control and monitoring routines to ensure reliable and efficient supply of electricity. The rapid advancements in information and communication technologies of Supervisory Control And Data Acquisition (SCADA) networks, however,...
Comments
Information & Contributors
Information
Published In

- Conference Chair:
- Tulika Mitra,
- Program Chairs:
- Evangeline Young,
- Jinjun Xiong
Sponsors
In-Cooperation
- IEEE-EDS: Electronic Devices Society
- IEEE CAS
- IEEE CEDA
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Invited-talk
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 95Total Downloads
- Downloads (Last 12 months)32
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in