Optimal DoS Attack Strategy against Remote State Estimation Over Lossy Networks

被引:0
作者
Li, Menglin [1 ]
Qin, Jiahu [1 ]
Shi, Ling [2 ]
Yu, Xinghuo [3 ]
Gao, Huijun [4 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Anhui, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Hong Kong, Peoples R China
[3] RMIT Univ, Sch Engn, Melbourne, Vic 3001, Australia
[4] Harbin Inst Technol, Res Inst Intelligent Control & Syst, Harbin 150001, Heilongjiang, Peoples R China
来源
2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC) | 2017年
关键词
Cyber-Physical Systems; DoS attack; lossy networks; energy constraint; remote state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a Denial-of-Service (DoS) attack scheduling problem. Specifically, a sensor employs the wireless link to send the data packet to the remote estimator at each time step, while an energy-constrained attacker launches DoS attacks against the remote state estimation, and designs an optimal attack strategy to maximize damage to the remote estimation quality. The packet will drop if the channel is jammed. In most of the existing works on DoS attacks, it is assumed that the wireless channel is perfect, i.e., the packet dropout never occurs in the absence of attack. However, this is far from the practical situation. To encompass the lossy nature of wireless networks, we study the scenario of lossy networks in which the packet may drop even without attack, and construct the optimal attack strategy that maximizes the average expected estimation error at the remote estimator over lossy networks. Numerical simulations are provided to demonstrate the effectiveness of the theoretical results.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 19 条
[1]  
Ahmed SU, 2013, WIRELESS DAYS, P1
[2]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[3]  
Cardenas A., 2008, HOTSEC, P1
[4]   Distributed Covariance Intersection Fusion Estimation for Cyber-Physical Systems With Communication Constraints [J].
Chen, Bo ;
Hu, Guoqiang ;
Ho, Daniel W. C. ;
Yu, Li .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (12) :4020-4026
[5]  
Foroush HS, 2012, IEEE DECIS CONTR P, P2551, DOI 10.1109/CDC.2012.6425868
[6]   A survey of recent results in networked control systems [J].
Hespanha, Joao P. ;
Naghshtabrizi, Payam ;
Xu, Yonggang .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :138-162
[7]   Cyber-Physical Systems: A Perspective at the Centennial [J].
Kim, Kyoung-Dae ;
Kumar, P. R. .
PROCEEDINGS OF THE IEEE, 2012, 100 :1287-1308
[8]   Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach [J].
Li, Yuzhe ;
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2831-2836
[9]   Secure Estimation in the Presence of Integrity Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (04) :1145-1151
[10]  
Peris C. D., 2015, IEEE T AUTOMAT CONTR, V60