Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems

被引:4
|
作者
Peng, Lianghong [1 ,2 ]
Cao, Xianghui [1 ,2 ]
Sun, Changyin [1 ,2 ]
Cheng, Yu [3 ]
机构
[1] Southeast Univ, Sch Automat, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Key Lab Measurement & Control Complex Syst Engn, Minist Educ, Nanjing 210096, Jiangsu, Peoples R China
[3] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016 | 2016年 / 9798卷
关键词
Cyber-Physical System; Energy constraint; Jamming attack; Optimal attack schedule; Remote state estimation;
D O I
10.1007/978-3-319-42836-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the security issues of Cyber-Physical Systems (CPS) have gained a growing amount of research attention. As a typical application of CPS, remote state estimation systems over wireless channels are vulnerable to various cyber attacks, such as channel jamming attacks. Standing on the point of the jamming attacker, this paper investigates the problem of optimal attack schedule under energy constraints against a wireless state estimation system, where two sensors transmit data to a remote estimator over two independent wireless channels. Due to its radio constraint, the attacker is assumed to only launch jamming attack on one of the two channels at a time. We formulate the problem of optimal attack schedule as a nonlinear program which aims to maximize the remote estimation error covariance subjecting to the attacker's energy constraint. We then theoretically derive the optimal schedule and shows that it depends on the attacker's energy budget, the physical system dynamics and the channel properties. Finally, the theoretical results are validated and evaluated through numerical simulations.
引用
收藏
页码:318 / 330
页数:13
相关论文
共 50 条
  • [41] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [42] POSTER: Defense against False Data Injection Attack in a Cyber-Physical System
    Padhan, Sushree
    Turuk, Ashok Kumar
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1943 - 1945
  • [43] Pareto optimal design space exploration of cyber-physical systems
    Amir, Maral
    Givargis, Tony
    INTERNET OF THINGS, 2020, 12
  • [44] Decentralized Event-Triggered Model Predictive Control for Fuzzy Cyber-physical Systems Under Optimal Jamming Attacks
    Wang, Cancan
    Geng, Qing
    Liu, Fucai
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2024, : 749 - 761
  • [45] A Calculus of Cyber-Physical Systems
    Lanotte, Ruggero
    Merro, Massimo
    LANGUAGE AND AUTOMATA THEORY AND APPLICATIONS (LATA 2017), 2017, 10168 : 115 - 127
  • [46] A review on cyber-physical systems
    Lin F.
    Shu S.
    Tongji Daxue Xuebao/Journal of Tongji University, 2010, 38 (08): : 1243 - 1248
  • [47] Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems
    Jiang, Luanjuan
    Chen, Xin
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 529 - 534
  • [48] False Sequential Command Attack of Large-Scale Cyber-Physical Systems
    Xiong, Yinqiao
    Yang, Ziyu
    Wang, Baoyao
    Xun, Peng
    Deng, Tiantian
    ELECTRONICS, 2018, 7 (09):
  • [49] Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems
    Deng, Wenping
    Yang, Ziyu
    Xun, Peng
    Zhu, Peidong
    Wang, Baosheng
    ELECTRONICS, 2019, 8 (09)
  • [50] Jamming Attack in Centralized State Estimation
    Yang, Chao
    Ren, Xiaoqiang
    Yang, Wen
    Shi, Hongbo
    Shi, Ling
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 6530 - 6535