Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network

被引:69
作者
Qin, Jiahu [1 ]
Li, Menglin [1 ]
Wang, Jie [1 ]
Shi, Ling [2 ]
Kang, Yu [1 ]
Zheng, Wei Xing [3 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW 2751, Australia
基金
中国国家自然科学基金;
关键词
Cyber-Physical Systems; DoS attack; Energy constraint; Remote state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
10.1016/j.automatica.2020.109090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a scenario in which a DoS attacker with the limited power resource and the purpose of degrading the system performance, jams a wireless network through which the packet from a sensor is sent to a remote estimator. To degrade the estimation quality most effectively with a given energy budget, the attacker aims to solve the problem of how much power to obstruct the channel each time, which is the recently proposed optimal attack energy management problem. The existing works are built on an ideal network model in which the packet dropout never occurs when the attack is absent. To encompass wireless transmission losses, we introduce the signal-to-interference-plus-noise ratio-based network. First we focus on the case when the attacker employs the constant power level. To maximize the expected terminal estimation error at the remote estimator, we provide some more relaxed sufficient conditions compared with the existing work for the existence of an explicit solution to the optimal static attack energy management problem and the solution is constructed. For the other important index of system performance, the average expected estimation error, the associated sufficient conditions are also derived based on a different analysis approach with the existing work. And a feasible method is presented for both indexes to seek the optimal constant attack power level when the system fails to meet the proposed sufficient conditions. Then when the real-time ACK information can be acquired, a Markov decision process (MDP) based algorithm is designed to solve the optimal dynamic attack energy management problem. We further study the optimal tradeoff between attack energy and system degradation. Specifically, by moving the energy constraint into the objective function to maximize the system index and minimize the energy consumption simultaneously, the other MDP based algorithm is proposed to find the optimal dynamic attack power policy which is further shown to have a monotone structure. The theoretical results are illustrated by simulations. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 41 条
[1]  
Adibi M, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P1151
[2]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[3]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[4]   Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes [J].
Amini, Sajjad ;
Pasqualetti, Fabio ;
Mohsenian-Rad, Hamed .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :2862-2872
[5]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[6]   Risk of Cyber-Physical Attack via Load With Emulated Inertia Control [J].
Brown, Hilary E. ;
DeMarco, Christopher L. .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (06) :5854-5866
[7]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[8]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[9]  
Foroush HS, 2012, IEEE DECIS CONTR P, P2551, DOI 10.1109/CDC.2012.6425868
[10]   Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks [J].
Fu, Weiming ;
Qin, Jiahu ;
Shi, Yang ;
Zheng, Wei Xing ;
Kang, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) :4868-4877