Defensive deception against reactive jamming attacks in remote state estimation

被引:18
|
作者
Ding, Kemi [1 ]
Ren, Xiaoqiang [2 ]
Quevedo, Daniel E. [3 ]
Dey, Subhrakanti [4 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai, Peoples R China
[3] Paderborn Univ, Dept Elect Engn, Paderborn, Germany
[4] Natl Univ Ireland, Hamilton Inst, Maynooth, Kildare, Ireland
基金
瑞典研究理事会;
关键词
Kalman filters; System security; Defensive deception; State estimation; Game theory; NETWORKS;
D O I
10.1016/j.automatica.2019.108680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive deception, to defend against jamming attacks in remote state estimation. In the setup studied, an attacker sabotages packet transmissions from a sensor to a remote estimator by congesting the communication channel between them. In order to efficiently degrade the estimation accuracy, the intelligent attacker tailors its jamming strategy by reacting to the real-time information it collects. In response to the jamming attacks, the sensor with a long-term goal will select the transmission power level at each stage. In addition, by modifying the real-time information intentionally, the sensor creates asymmetric uncertainty to mislead the attacker and thus mitigate attacks. Considering the dynamic nature of the process, we model the strategic interaction between the sensor and the attacker by a general stochastic game with asymmetric information structure. To obtain stationary optimal strategies for each player, we convert this game into a belief-based dynamic game and analyze the existence of its optimal solution. For a tractable implementation, we present an algorithm that finds equilibrium strategies based on multi-agent reinforcement learning for symmetric-information stochastic games. Numerical examples illustrate properties of the proposed algorithm. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [11] Deception Attacks on Remote Estimation With Disclosure and Disruption Resources
    Li, Yuzhe
    Yang, Yake
    Zhao, Zhengen
    Zhou, Jing
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4096 - 4112
  • [12] Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems
    Ning, Chuanyi
    Hao, Fei
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 882 - 893
  • [13] Mitigation of Jamming Attacks via Deception
    Nan, Satyaki
    Brahma, Swastik
    Kamhoua, Charles A.
    Leslie, Nandi O.
    2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [14] Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2022, 500 : 461 - 470
  • [15] Reconstruction of measurements in state estimation strategy against deception attacks for cyber physical systems
    Li Q.
    Xu B.
    Li S.
    Liu Y.
    Cui D.
    Control Theory and Technology, 2018, 16 (01) : 1 - 13
  • [16] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Li, Huanruo
    Guo, Yunfei
    Huo, Shumin
    Hu, Hongchao
    Sun, Penghao
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [17] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Huanruo LI
    Yunfei GUO
    Shumin HUO
    Hongchao HU
    Penghao SUN
    Science China(Information Sciences), 2022, 65 (07) : 67 - 85
  • [18] Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
    Huanruo Li
    Yunfei Guo
    Shumin Huo
    Hongchao Hu
    Penghao Sun
    Science China Information Sciences, 2022, 65
  • [19] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587
  • [20] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607