Optimal jamming attack schedule for remote state estimation with two sensors

被引:16
作者
Peng, Lianghong [1 ,2 ,3 ]
Cao, Xianghui [1 ,3 ]
Shi, Hongbao [1 ,3 ]
Sun, Changyin [1 ,3 ]
机构
[1] Southeast Univ, Sch Automat, Nanjing 210096, Jiangsu, Peoples R China
[2] Qingdao Univ, Coll Automat & Elect Engn, Qingdao 266071, Peoples R China
[3] Southeast Univ, Minist Educ, Key Lab Measurement & Control Complex Syst Engn, Nanjing 210096, Jiangsu, Peoples R China
来源
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS | 2018年 / 355卷 / 14期
基金
美国国家科学基金会;
关键词
INTERMITTENT OBSERVATIONS; SYSTEMS; SECURITY;
D O I
10.1016/j.jfranklin.2018.06.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cyber-physical systems (CPS), cyber threats emerge in many ways which can cause significant destruction to the system operation. In wireless CPS, adversaries can block the communications of useful information by channel jamming, incurring the so-called denial of service (DoS) attacks. In this paper, we investigate the problem of optimal jamming attack scheduling against remote state estimation wireless network. Specifically, we consider that two wireless sensors report data to a remote estimator through two wireless communication channels lying in two unoverlapping frequency bands, respectively. Meanwhile, an adversary can select one and only one channel at a time to execute jamming attack. We prove that the optimal attack schedule is continuously launching attack on one channel determined based on the system dynamics matrix. The theoretical results are validated by numerical simulations. (C) 2018 Published by Elsevier Ltd on behalf of The Franklin Institute.
引用
收藏
页码:6859 / 6876
页数:18
相关论文
共 29 条
[1]   Stabilization and optimization of linear systems via pathwise state-feedback impulsive control [J].
Ai, Zidong .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2017, 354 (03) :1637-1657
[2]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[3]  
[Anonymous], 1998, LINEAR SYSTEM THEORY
[4]   Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs [J].
Cao, Xianghui ;
Liu, Lu ;
Shen, Wenlong ;
Laha, Aurobinda ;
Tang, Jin ;
Cheng, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :186-197
[5]   Energy-Efficient Spectrum Sensing for Cognitive Radio Enabled Remote State Estimation Over Wireless Channels [J].
Cao, Xianghui ;
Zhou, Xiangwei ;
Liu, Lu ;
Cheng, Yu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (04) :2058-2071
[6]   Networked control of nonlinear systems under Denial-of-Service [J].
De Persis, C. ;
Tesi, P. .
SYSTEMS & CONTROL LETTERS, 2016, 96 :124-131
[7]   Multisensor Nonlinear Fusion Methods Based on Adaptive Ensemble Fifth-Degree Iterated Cubature Information Filter for Biomechatronics [J].
Ge, Quanbo ;
Shao, Teng ;
Yang, Qinmin ;
Shen, Xingfa ;
Wen, Chenglin .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (07) :912-925
[8]   Analysis on Strong Tracking Filtering for Linear Dynamic Systems [J].
Ge, Quanbo ;
Shao, Teng ;
Wen, Chenglin ;
Sun, Ruoyu .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
[9]   Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :48-59
[10]   Distributed Secure Estimation Over Wireless Sensor Networks Against Random Multichannel Jamming Attacks [J].
Guan, Yanpeng ;
Ge, Xiaohua .
IEEE ACCESS, 2017, 5 :10858-10870