Jamming Attack on Cyber-Physical Systems: A Game-theoretic Approach

被引:0
作者
Li, Yuzhe [1 ]
Shi, Ling [1 ]
Cheng, Peng [2 ]
Chen, Jiming [2 ]
Quevedo, Daniel E. [3 ]
机构
[1] Hong Kong Univ Sci & Technol, Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
[2] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Zhejiang, Peoples R China
[3] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW 2308, Australia
来源
2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER) | 2013年
关键词
Cyber-Physical Systems; Security; Game Theory; Networked estimation; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remote estimator through a wireless channel which may be jammed by an external attacker. With energy constraints for both the sensor and the attacker, the interactive decision making process of when to send and when to attack is studied. We formulate a game-theoretical framework and prove that the optimal strategies for both sides constitute a Nash equilibrium. The derivation of the optimal strategies for both sides is also provided with examples.
引用
收藏
页码:252 / +
页数:2
相关论文
共 18 条
[11]  
Mo YL, 2012, HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, P47
[12]   Cyber-Physical Security of a Smart Grid Infrastructure [J].
Mo, Yilin ;
Kim, Tiffany Hyun-Jin ;
Brancik, Kenneth ;
Dickinson, Dona ;
Lee, Heejo ;
Perrig, Adrian ;
Sinopoli, Bruno .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :195-209
[13]  
NASH J, 1951, ANN MATH, V54, P286, DOI 10.2307/1969529
[14]  
Roy S., 2010, Conference Papers - New Zealand Association of Economists, P1, DOI [DOI 10.1109/HICSS.2010.35, 10.1109/HICSS. 2010.35., 10.1109/HICSS.2010.35]
[15]  
Shi L., 2011, WORLD C INT FED AUT
[16]   Kalman Filtering Over a Packet-Dropping Network: A Probabilistic Perspective [J].
Shi, Ling ;
Epstein, Michael ;
Murray, Richard M. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2010, 55 (03) :594-604
[17]  
Zhang H., 2013, 12 EUR CONTR C ZUR S
[18]  
Zuba M., 2011, Proceedings of the Sixth ACM International Workshop on Underwater Networks, P12