Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems

被引:4
|
作者
Peng, Lianghong [1 ,2 ]
Cao, Xianghui [1 ,2 ]
Sun, Changyin [1 ,2 ]
Cheng, Yu [3 ]
机构
[1] Southeast Univ, Sch Automat, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Key Lab Measurement & Control Complex Syst Engn, Minist Educ, Nanjing 210096, Jiangsu, Peoples R China
[3] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016 | 2016年 / 9798卷
关键词
Cyber-Physical System; Energy constraint; Jamming attack; Optimal attack schedule; Remote state estimation;
D O I
10.1007/978-3-319-42836-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the security issues of Cyber-Physical Systems (CPS) have gained a growing amount of research attention. As a typical application of CPS, remote state estimation systems over wireless channels are vulnerable to various cyber attacks, such as channel jamming attacks. Standing on the point of the jamming attacker, this paper investigates the problem of optimal attack schedule under energy constraints against a wireless state estimation system, where two sensors transmit data to a remote estimator over two independent wireless channels. Due to its radio constraint, the attacker is assumed to only launch jamming attack on one of the two channels at a time. We formulate the problem of optimal attack schedule as a nonlinear program which aims to maximize the remote estimation error covariance subjecting to the attacker's energy constraint. We then theoretically derive the optimal schedule and shows that it depends on the attacker's energy budget, the physical system dynamics and the channel properties. Finally, the theoretical results are validated and evaluated through numerical simulations.
引用
收藏
页码:318 / 330
页数:13
相关论文
共 50 条
  • [31] Moving-horizon false data injection attack design against cyber-physical systems
    Zheng, Yu
    Mudhangulla, Sridhar Babu
    Anubi, Olugbenga Moses
    CONTROL ENGINEERING PRACTICE, 2023, 136
  • [32] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352
  • [33] H∞ control for cyber-physical system under periodic denial-of-service jamming attack
    Wang M.-F.
    Xu B.-G.
    Chen L.-D.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (11): : 2146 - 2153
  • [34] Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach
    Li, Yi-Gang
    Yang, Guang-Hong
    Wang, Xiangdong
    ISA TRANSACTIONS, 2023, 137 : 1 - 12
  • [35] Holistic Cyber-Physical Management for Dependable Wireless Control Systems
    Ma, Yehan
    Gunatilaka, Dolvara
    Li, Bo
    Gonzalez, Umberto
    Lu, Chenyang
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2019, 3 (01)
  • [36] Trustworthy Data Management for Wireless Networks in Cyber-Physical Systems
    Li, Wenjia
    Kotut, Lindah
    2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [37] Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
    Cheh, Carmen
    Fawaz, Ahmed
    Noureddine, Mohammad A.
    Chen, Binbin
    Temple, William G.
    Sanders, William H.
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 125 - 134
  • [38] Active Eavesdropping Attack Scheduling for Cyber-Physical Systems With Operation Constraints
    Tao, Fei
    Ye, Dan
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 3067 - 3075
  • [39] Resilient Control for Wireless Cyber-Physical Systems Subject to Jamming Attacks: A Cross-Layer Dynamic Game Approach
    Zhao, Ling
    Xu, Hao
    Zhang, Jinhui
    Yang, Hongjiu
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (04) : 2599 - 2608
  • [40] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13