Jamming Attack on Cyber-Physical Systems: A Game-theoretic Approach

被引:0
作者
Li, Yuzhe [1 ]
Shi, Ling [1 ]
Cheng, Peng [2 ]
Chen, Jiming [2 ]
Quevedo, Daniel E. [3 ]
机构
[1] Hong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
[2] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Zhejiang, Peoples R China
[3] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
来源
2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER) | 2013年
关键词
Cyber-Physical Systems; Security; Game Theory; Networked estimation; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remote estimator through a wireless channel which may be jammed by an external attacker. With energy constraints for both the sensor and the attacker, the interactive decision making process of when to send and when to attack is studied. We formulate a game-theoretical framework and prove that the optimal strategies for both sides constitute a Nash equilibrium. The derivation of the optimal strategies for both sides is also provided with examples.
引用
收藏
页码:252 / +
页数:2
相关论文
共 18 条
[1]  
Agah A, 2004, IEEE IPCCC, P259
[2]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[3]   DETECTABILITY AND STABILIZABILITY OF TIME-VARYING DISCRETE-TIME LINEAR-SYSTEMS [J].
ANDERSON, BDO ;
MOORE, JB .
SIAM JOURNAL ON CONTROL AND OPTIMIZATION, 1981, 19 (01) :20-32
[4]  
Apostol T.M., 1974, Mathematical Analysis
[5]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[6]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89
[7]  
Gibbons R., 1992, PRIMER GAME THEORY
[8]  
Hazewinkel M., 2002, ENCY MATH SUPPLEMENT, V3
[9]  
Hovareshti P, 2007, IEEE DECIS CONTR P, P6083
[10]   False Data Injection Attacks against State Estimation in Electric Power Grids [J].
Liu, Yao ;
Ning, Peng ;
Reiter, Michael K. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)