Optimal Transmission Strategy for Sensors to Defend against Eavesdropping and Jamming Attacks

被引:0
|
作者
Yuan, Li [1 ]
Wang, Kun [1 ]
Miyazaki, Toshiaki [2 ]
Guo, Song [3 ]
Wu, Meng [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[2] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima 9658580, Japan
[3] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2017年
关键词
Sensors; Eavesdropping defense; Control feedback; Cyber-Physical System; Stackelberg Game; Smart jammer; GAME;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and controller with the presence of malicious eavesdropper and jammer. The malicious jammer is smart and can choose the optimal power strategy to maximize the side effect with the knowledge of sensor's transmission power. When the sensor adjusts its transmission power to achieve the maximum utility, the control feedback is used to adjust the optimal strategy in CPS. We formulate this proposed problem as a Stackelberg game such that the optimal power allocation strategy is achieved. We further prove the existence of Stackelberg equilibrium by obtaining the interaction between the sensor and the jammer. To tackle this optimization problem, we present a stochastic algorithm with feedback (SAF) algorithm. As a result, the optimal transmission strategy is obtained. Finally, extensive simulations are presented to verify our theoretical analysis.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Intelligent Reflecting Surface Enhanced Secure Transmission Against Both Jamming and Eavesdropping Attacks
    Sun, Yifu
    An, Kang
    Luo, Junshan
    Zhu, Yonggang
    Zheng, Gan
    Chatzinotas, Symeon
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (10) : 11017 - 11022
  • [2] IRS Backscatter Enhancing Against Jamming and Eavesdropping Attacks
    Cao, Yurui
    Xu, Sai
    Liu, Jiajia
    Kato, Nei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10740 - 10751
  • [3] Protection of Optical Networks against Interchannel Eavesdropping and Jamming Attacks
    Yuan, Shengli
    Stewart, Daniel
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 1, 2014, : 34 - 38
  • [4] Defend Against Jamming Attacks Using Deep Reinforcement Learning
    Shen, Weiguo
    Wang, Wei
    Jin, Hu
    Zhang, Weifeng
    13th International Symposium on Antennas, Propagation and EM Theory, ISAPE 2021 - Proceedings, 2021,
  • [5] A network coding transmission strategy for preventing eavesdropping attacks
    Pu, Baoxing
    Huang, Hongben
    Pang, Guangyao
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [6] Spatial Sparsity Based Secure Transmission Strategy for Massive MIMO Systems Against Simultaneous Jamming and Eavesdropping
    Shen, Zhexian
    Xu, Kui
    Xia, Xiaochen
    Xie, Wei
    Zhang, Dongmei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3760 - 3774
  • [7] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [8] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [9] Coding Split and Adjustment to Defend OFDM-IM Against Jamming Attacks
    Chen, Yinglin
    Yuan, Weijie
    Xu, Tongyang
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (02) : 457 - 461
  • [10] Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
    Wu, Yongle
    Wang, Beibei
    Liu, K. J. Ray
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4203 - 4207