Professional Documents
Culture Documents
In Cyber-Physical Networked Systems (CPNS), any adversary can infuse false estimations into
the controller through traded off sensor hubs, which undermine the security of the framework, as
well as expend system assets. To manage this issue, various in transit separating plans have been
intended for remote sensor systems. Be that as it may, these plans either need flexibility to the
quantity of traded off hubs or rely on upon the statically arranged courses and hub confinement,
which are not reasonable for CPNS. In this research work, we propose False Data Injection
Attack (FDIA), which can channel false infused information successfully and accomplish a high
versatility to the quantity of bargained hubs without depending on static courses and hub
restriction. FDIA receives polynomials rather than Message Authentication Codes (MACs) for
underwriting estimation reports to accomplish versatility to assaults. Every hub stores two sorts
of polynomials: confirmation polynomial and check polynomial, receive from the primitive
polynomial, and utilized for supporting and confirming the estimation reports. Through broad
hypothetical investigation and analyses, our information demonstrates that FDIA accomplishes
better separating limit and versatility to the huge number of traded off hubs in contrast with the
current plans.
i
LIST OF FIGURES
ii
LIST OF TABLES
TABLE No. TABLE NAME PAGE No.
iii
LIST OF PUBLICATIONS
iv
LIST OF ABBREVIATIONS
ACRONYMS ABBREVIATIONS