Sorry, you need to enable JavaScript to visit this website.

In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks (WSNs). In this paper, we formulate this problem as one of sparse signal processing. In order to identify the existence of the spoofing attacker, we explore using the feature extraction and fusion

Categories:
2 Views

This is an overview poster on recent research of investigating malicious attacks against power transmission systems with the assumption that attacks can happen on substations and transmission lines.

For more information, please check out the publication at IEEE Xplore:

Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun and Haibo He, "Coordinated attacks against substations and transmission lines in power grids," 2014 IEEE Global Communications Conference (GLOBECOM, pp.655-661, Dec. 8-12, 2014.
<10.1109/GLOCOM.2014.7036882>

Categories:
7 Views

Pages