Time Synchronization Attack and Countermeasure for Multisystem Scheduling in Remote Estimation

被引:10
作者
Guo, Ziyang [1 ]
Ni, Yuqing [1 ]
Wong, Wing Shing [2 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[2] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Peoples R China
关键词
Multisystem scheduling; remote state estimation; shift invariance; time synchronization attack; SYSTEMS;
D O I
10.1109/TAC.2020.2997318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider time synchronization attack against multisystem scheduling in a remote state estimation scenario where a number of sensors monitor different linear dynamical processes and schedule their transmissions through a shared collision channel. We show that by randomly injecting relative time offsets on the sensors, the malicious attacker is able to make the expected estimation error covariance of the overall system diverge without any system knowledge. For the case that the attacker has full system information, we propose an efficient algorithm to calculate the optimal attack, which spoofs the least number of sensors and leads to unbounded average estimation error covariance. To mitigate the attack consequence, we further propose a countermeasure by constructing shift invariant transmission policies and characterize the lower and upper bounds for system estimation performance. Simulation examples are provided to illustrate the obtained results.
引用
收藏
页码:916 / 923
页数:8
相关论文
共 28 条
[1]  
[Anonymous], 2012, Optimal Filtering
[2]  
[Anonymous], 2010, PROC 1 WORKSHOP SECU
[3]  
Clausen Jens., 1999, BRANCH BOUND ALGORIT
[4]  
Frank R, 2013, ARTECH HSE INTEGR MI, P1
[5]   INTEGER PROGRAMMING ALGORITHMS - FRAMEWORK AND STATE-OF-ART SURVEY [J].
GEOFFRION, AM ;
MARSTEN, RE .
MANAGEMENT SCIENCE SERIES A-THEORY, 1972, 18 (09) :465-491
[6]  
Goodin D, US SPY DRONE HIJACKE
[7]  
Goodwin G.C., 1977, Dynamic system identification: experiment design and data analysis, V26
[8]  
Google, GPS GOV TIM APPL
[9]   Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches [J].
Gungor, Vehbi C. ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (10) :4258-4265
[10]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124