Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks

被引:281
作者
Qin, Jiahu [1 ]
Li, Menglin [1 ]
Shi, Ling [2 ]
Yu, Xinghuo [3 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Anhui, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
[3] RMIT Univ, Sch Engn, Melbourne, Vic 3001, Australia
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Cyber-physical systems (CPS); denial-of-service (DoS) attack; energy constraint; packet-dropping networks; remote state estimation; CYBER-PHYSICAL SYSTEMS; INTERMITTENT OBSERVATIONS; STATE ESTIMATION; SENSOR NETWORKS; SPECIAL-ISSUE; STRATEGIES; LOSSES;
D O I
10.1109/TAC.2017.2756259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically, we consider a system where a remote estimator receives the data packet sent by a sensor over a wireless network at each time instant, and an energy-constrained attacker that cannot launch DoS attacks all the time designs the optimal DoS attack scheduling to maximize the attacking effect on the remote estimation performance. Most of the existing works concerning DoS attacks focus on the ideal scenario in which data packets can be received successfully if there is no DoS attack. To capture the unreliability nature of practical networks, we study the packet-dropping network in which packet dropouts may occur even in the absence of attack. We derive the optimal attack scheduling scheme that maximizes the average expected estimation error, and the one which maximizes the expected terminal estimation error over packet-dropping networks. We also present some countermeasures against DoS attacks, and discuss the optimal defense strategy, and how the optimal attack schedule can serve for more effective and resource-saving countermeasures. We further investigate the optimal attack schedule with multiple sensors. The optimality of the theoretical results is demonstrated by numerical simulations.
引用
收藏
页码:1648 / 1663
页数:16
相关论文
共 36 条
[1]  
[Anonymous], 2002, Wireless Communications: Principles and Practice
[2]  
[Anonymous], 2014, IFAC P, DOI DOI 10.3182/20140824-6-ZA-1003.02668
[3]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[4]  
Cardenas A., 2008, HOTSEC, P1
[5]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[6]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[7]  
Foroush HS, 2012, IEEE DECIS CONTR P, P2551, DOI 10.1109/CDC.2012.6425868
[8]   Optimal Linear Cyber-Attack on Remote State Estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :4-13
[9]   Stability of Kalman filtering with Markovian packet losses [J].
Huang, Minyi ;
Dey, Subhrakanti .
AUTOMATICA, 2007, 43 (04) :598-607
[10]   On Optimal Partial Broadcasting of Wireless Sensor Networks for Kalman Filtering [J].
Jia, Qing-Shan ;
Shi, Ling ;
Mo, Yilin ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2012, 57 (03) :715-U69