Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Louisiana State University

Detection

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Hypothesis Testing And Model Estimation With Dependent Observations In Heterogeneous Sensor Networks, Sima Sobhiyeh May 2018

Hypothesis Testing And Model Estimation With Dependent Observations In Heterogeneous Sensor Networks, Sima Sobhiyeh

LSU Doctoral Dissertations

Advances in microelectronics, communication and signal processing have enabled the development of inexpensive sensors that can be networked to collect vital information from their environment to be used in decision-making and inference. The sensors transmit their data to a central processor which integrates the information from the sensors using a so-called fusion algorithm. Many applications of sensor networks (SNs) involve hypothesis testing or the detection of a phenomenon. Many approaches to data fusion for hypothesis testing assume that, given each hypothesis, the sensors' measurements are conditionally independent. However, since the sensors are densely deployed in practice, their field of views …


A Frequency Hopping Method To Detect Replay Attacks, Guofu Tang Jan 2016

A Frequency Hopping Method To Detect Replay Attacks, Guofu Tang

LSU Master's Theses

The application of information technology in network control systems introduces the potential threats to the future industrial control system. The malicious attacks undermine the security of network control system, which could cause a huge economic loss. This thesis studies a particular cyber attack called the replay attack, which is motivated by the Stuxnet worm allegedly used against the nuclear facilities in Iran. For replay attack, this thesis injects the narrow-band signal into control signal and adopts the spectrum estimation approach to test the estimation residue. In order to protect the information of the injected signal from knowing by attackers, the …