Optimal DoS Attack Strategy against Remote State Estimation Over Lossy Networks

被引:0
作者
Li, Menglin [1 ]
Qin, Jiahu [1 ]
Shi, Ling [2 ]
Yu, Xinghuo [3 ]
Gao, Huijun [4 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Anhui, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Hong Kong, Peoples R China
[3] RMIT Univ, Sch Engn, Melbourne, Vic 3001, Australia
[4] Harbin Inst Technol, Res Inst Intelligent Control & Syst, Harbin 150001, Heilongjiang, Peoples R China
来源
2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC) | 2017年
关键词
Cyber-Physical Systems; DoS attack; lossy networks; energy constraint; remote state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a Denial-of-Service (DoS) attack scheduling problem. Specifically, a sensor employs the wireless link to send the data packet to the remote estimator at each time step, while an energy-constrained attacker launches DoS attacks against the remote state estimation, and designs an optimal attack strategy to maximize damage to the remote estimation quality. The packet will drop if the channel is jammed. In most of the existing works on DoS attacks, it is assumed that the wireless channel is perfect, i.e., the packet dropout never occurs in the absence of attack. However, this is far from the practical situation. To encompass the lossy nature of wireless networks, we study the scenario of lossy networks in which the packet may drop even without attack, and construct the optimal attack strategy that maximizes the average expected estimation error at the remote estimator over lossy networks. Numerical simulations are provided to demonstrate the effectiveness of the theoretical results.
引用
收藏
页码:909 / 914
页数:6
相关论文
共 19 条
[11]  
Qi YF, 2015, IEEE DECIS CONTR P, P6844, DOI 10.1109/CDC.2015.7403297
[12]   Sensor data scheduling for optimal state estimation with communication energy constraint [J].
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming .
AUTOMATICA, 2011, 47 (08) :1693-1698
[13]   Optimal Periodic Sensor Scheduling With Limited Resources [J].
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2011, 56 (09) :2190-2195
[14]  
Shoukry Y, 2013, LECT NOTES COMPUT SC, V8086, P55, DOI 10.1007/978-3-642-40349-1_4
[15]   Detection in Adversarial Environments [J].
Vamvoudakis, Kyriakos G. ;
Hespanha, Joao P. ;
Sinopoli, Bruno ;
Mo, Yilin .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (12) :3209-3223
[16]  
Wu GY, 2016, P AMER CONTR CONF, P1160, DOI 10.1109/ACC.2016.7525074
[17]   Jamming sensor networks: Attack and defense strategies [J].
Xu, Wenyuan ;
Ma, Ke ;
Trappe, Wade ;
Zhang, Yanyong .
IEEE NETWORK, 2006, 20 (03) :41-47
[18]   Optimal DoS Attack Scheduling in Wireless Networked Control System [J].
Zhang, Heng ;
Cheng, Peng ;
Shi, Ling ;
Chen, Jiming .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2016, 24 (03) :843-852
[19]   Optimal Denial-of-Service Attack Scheduling With Energy Constraint [J].
Zhang, Heng ;
Cheng, Peng ;
Shi, Ling ;
Chen, Jiming .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :3023-3028