Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping

被引:5
作者
Gan, Ruimeng [1 ]
Xiao, Yue [1 ]
Shao, Jinliang [2 ]
Zhang, Heng [3 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 611731, Peoples R China
[3] Jiangsu Ocean Univ, Sch Sci, Lianyungang 222005, Peoples R China
基金
中国博士后科学基金; 美国国家科学基金会;
关键词
Jamming; Wireless sensor networks; Wireless communication; Approximation algorithms; Transmitters; Optimal scheduling; Robot sensing systems; Channel hopping scheme (CHS); denial-of-service (DoS); linear quadratic Gaussian (LQG); wireless networked control system (WNCS); STATE ESTIMATION;
D O I
10.1109/TII.2019.2932258
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the security issue based on the proactive channel hopping scheme in wireless networked control systems (WNCS), where the sensor sends the measurement data to the controller through multiple channels attacked by a periodic denial-of-service jammer. For a jammer with the limited energy, the number of attacks, which denotes the amount of time expended in launching the attack, increases with the decline in the channel number attacked at each time, which has an effect on the success of receiving the data. On the basis of this, the problem of making an optimal tradeoff between the channel number attacked at each time and the attack number to degrade the WNCS performance maximally is investigated. We formulate this problem as an integer programming problem based on the linear quadratic Gaussian control cost function. Then, a necessary condition of the optimal solution without integrality constraints for this optimization problem is given for the scenario where the sensor utilizes one channel at each time to perform the data transmission. We further investigate this problem for the case where the sensor can select several channels at each time to transmit the measurement data. Moreover, for both cases the corresponding algorithms are presented to approximate optimal schedules. Finally, the theoretical results and the validity of the algorithm proposed are verified via the numerical results.
引用
收藏
页码:2436 / 2446
页数:11
相关论文
共 34 条
[1]  
[Anonymous], 2001, Dynamic Programming and Optimal Control
[2]  
Bag S, 2013, IEEE CONF WIREL MOB, P659, DOI 10.1109/WiMOB.2013.6673427
[3]   Energy-Efficient Spectrum Sensing for Cognitive Radio Enabled Remote State Estimation Over Wireless Channels [J].
Cao, Xianghui ;
Zhou, Xiangwei ;
Liu, Lu ;
Cheng, Yu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (04) :2058-2071
[4]   Cognitive Radio Based State Estimation in Cyber-Physical Systems [J].
Cao, Xianghui ;
Cheng, Peng ;
Chen, Jiming ;
Ge, Shuzhi Sam ;
Cheng, Yu ;
Sun, Youxian .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (03) :489-502
[5]   An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems [J].
Cao, Xianghui ;
Cheng, Peng ;
Chen, Jiming ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :439-450
[6]   Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed [J].
Cao, Xianghui ;
Chen, Jiming ;
Xiao, Yang ;
Sun, Youxian .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) :3596-3605
[7]   Matrix-Based Channel Hopping Algorithms for Cognitive Radio Networks [J].
Chang, Guey-Yun ;
Huang, Jen-Feng ;
Wang, Yao-Shian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (05) :2755-2768
[8]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[9]  
Cho YM, 1997, IEEE T CONTR SYST T, V5, P644, DOI 10.1109/87.641407
[10]   Networked control of nonlinear systems under Denial-of-Service [J].
De Persis, C. ;
Tesi, P. .
SYSTEMS & CONTROL LETTERS, 2016, 96 :124-131