Stochastic Important-Data-Based Attack Power Allocation Against Remote State Estimation in Sensor Networks

被引:6
作者
Tian, Engang [1 ]
Fan, Mengge [1 ]
Ma, Lifeng [2 ]
Yue, Dong [3 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210049, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Resource management; Signal to noise ratio; Covariance matrices; Vectors; Indexes; Fans; Symbols; State estimation; Power measurement; Optical packet switching; Denial-of-service (DoS); power allocation; remote state estimation; sensor networks; DOS ATTACK; SYSTEMS;
D O I
10.1109/TAC.2024.3477009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a novel important-data-based (IDB) attack strategy and stochastic IDB attack power allocation scheme are proposed, from the attacker's perspective, to degrade the remote state estimation in sensor networks. The main feature of the proposed IDB attack is that, by intercepting the measurement output, the adversary can identify the important packets transmitting among sensing nodes, and by injecting more power to increase the attack success probability (ASP) of these packets, thereby enhancing the attack destructiveness. Then, according to the identified ASP of packets, a scheme is designed to allocate the attack power to each channel with the help of the signal-to-noise ratio such that packets with higher ASP would face attacks with more power. Subsequently, the relationships are characterized among the attack parameter, the ASP, the attack power, and the constrained energy via stochastic analysis method, and the threshold of the attack parameter is designed to achieve a balance between the attack effects and the energy constraint. Finally, an illustrative simulation is given to verify the effectiveness of the stochastic IDB attack strategy and stochastic IDB attack power allocation method.
引用
收藏
页码:2012 / 2019
页数:8
相关论文
共 34 条
  • [31] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028
  • [32] Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
    Zhang, Junhui
    Sun, Jitao
    Lin, Hai
    [J]. AUTOMATICA, 2021, 127
  • [33] An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems
    Zhang, Xian-Ming
    Han, Qing-Long
    Zhang, Bao-Lin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) : 4 - 16
  • [34] Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks
    Zhang, Ya
    Du, Lishuang
    Lewis, Frank L.
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2020, 7 (05) : 1225 - 1234