{"title":"针对篡改攻击的量化通信远程状态估计传输调度","authors":"Mengqi Li, Yanpeng Hu, Jin Guo","doi":"10.1016/j.adhoc.2025.103997","DOIUrl":null,"url":null,"abstract":"<div><div>This paper studies transmission scheduling in energy-constrained multi-sensor networks under tampering attacks. From the attacker’s perspective, a stochastic tampering strategy with selective channel targeting is devised to maximize estimation degradation at a remote estimator with limited reception capacity. Concurrently, the defender employs an identification algorithm to infer the attack strategy and uses the inferred result to drive a state-compensated estimator, mitigating the attack’s impact. To reconcile the conflicting demands of accurately identifying the attack and estimating the system state under communication constraints, we derive an optimal transmission scheduling policy that balances these goals. Theoretical results are verified through simulation studies.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"178 ","pages":"Article 103997"},"PeriodicalIF":4.8000,"publicationDate":"2025-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Transmission scheduling for remote state estimation with quantized communication against tampering attacks\",\"authors\":\"Mengqi Li, Yanpeng Hu, Jin Guo\",\"doi\":\"10.1016/j.adhoc.2025.103997\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This paper studies transmission scheduling in energy-constrained multi-sensor networks under tampering attacks. From the attacker’s perspective, a stochastic tampering strategy with selective channel targeting is devised to maximize estimation degradation at a remote estimator with limited reception capacity. Concurrently, the defender employs an identification algorithm to infer the attack strategy and uses the inferred result to drive a state-compensated estimator, mitigating the attack’s impact. To reconcile the conflicting demands of accurately identifying the attack and estimating the system state under communication constraints, we derive an optimal transmission scheduling policy that balances these goals. Theoretical results are verified through simulation studies.</div></div>\",\"PeriodicalId\":55555,\"journal\":{\"name\":\"Ad Hoc Networks\",\"volume\":\"178 \",\"pages\":\"Article 103997\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1570870525002458\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870525002458","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Transmission scheduling for remote state estimation with quantized communication against tampering attacks
This paper studies transmission scheduling in energy-constrained multi-sensor networks under tampering attacks. From the attacker’s perspective, a stochastic tampering strategy with selective channel targeting is devised to maximize estimation degradation at a remote estimator with limited reception capacity. Concurrently, the defender employs an identification algorithm to infer the attack strategy and uses the inferred result to drive a state-compensated estimator, mitigating the attack’s impact. To reconcile the conflicting demands of accurately identifying the attack and estimating the system state under communication constraints, we derive an optimal transmission scheduling policy that balances these goals. Theoretical results are verified through simulation studies.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.