Stochastic game in remote estimation under DoS attacks

被引:33
作者
Ding K. [1 ]
Dey S. [2 ]
Quevedo D.E. [3 ]
Shi L. [1 ]
机构
[1] Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong
[2] Department of Engineering Science, Uppsala University, Uppsala
[3] Department of Electrical Engineering, Paderborn University, Paderborn
来源
IEEE Control Systems Letters | 2017年 / 1卷 / 01期
关键词
Cyberphysical systems security; DoS attack; Stochastic game;
D O I
10.1109/LCSYS.2017.2711044
中图分类号
学科分类号
摘要
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmits its local estimate of an underlying physical process to a remote estimator via a wireless communication channel. A DoS attacker is capable to interfere the channel and degrades the remote estimation accuracy. Considering the tactical jamming strategies played by the attacker, the sensor adjusts its transmission power. This interactive process between the sensor and the attacker is studied in the framework of a zero-sum stochastic game. To derive their optimal power schemes, we first discuss the existence of stationary Nash equilibrium for this game. We then present the monotone structure of the optimal strategies, which helps reduce the computational complexity of the stochastic game algorithm. Numerical examples are provided to illustrate the obtained results. © 2017 IEEE.
引用
收藏
页码:146 / 151
页数:5
相关论文
共 21 条
  • [1] Kim K.-D., Kumar P.R., Cyber–physical systems: A perspective at the centennial, Proc. IEEE, 100, pp. 1287-1308, (2012)
  • [2] Assante M., Confirmation of A Coordinated Attack on The Ukrainian Power Grid, (2017)
  • [3] Farwell J.P., Rohozinski R., Stuxnet and the future of cyber war, Survival, 53, 1, pp. 23-40, (2011)
  • [4] Cardenas A.A., Amin S., Sastry S., Secure control: Towards survivable cyber-physical systems, Proc. IEEE 28th Int. Conf. Distrib. Comput. Syst. Workshops, pp. 495-500, (2008)
  • [5] Zhang H., Cheng P., Shi L., Chen J., Optimal Denial-of-service attack scheduling with energy constraint, IEEE Trans. Autom. Control, 60, 11, pp. 3023-3028, (2015)
  • [6] Teixeira A., Perez D., Sandberg H., Johansson K.H., Attack models and scenarios for networked control systems, Proc. 1st Int. Conf. High Confidence Netw. Syst., pp. 55-64, (2012)
  • [7] Miao F., Pajic M., Pappas G.J., Stochastic game approach for replay attack detection, Proc. 52nd IEEE Conf. Decis. Control, pp. 1854-1859, (2013)
  • [8] Li Y., Shi L., Chen T., Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst.
  • [9] Li Y., Quevedo D.E., Dey S., Shi L., SINR-based DoS attack on remote state estimation: A game-theoretic approach, IEEE Trans. Control Netw. Syst.
  • [10] Zhu Q., Basar T., Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems, IEEE Control Syst, 35, 1, pp. 46-65, (2015)