Defensive deception against reactive jamming attacks in remote state estimation

被引:18
|
作者
Ding, Kemi [1 ]
Ren, Xiaoqiang [2 ]
Quevedo, Daniel E. [3 ]
Dey, Subhrakanti [4 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai, Peoples R China
[3] Paderborn Univ, Dept Elect Engn, Paderborn, Germany
[4] Natl Univ Ireland, Hamilton Inst, Maynooth, Kildare, Ireland
基金
瑞典研究理事会;
关键词
Kalman filters; System security; Defensive deception; State estimation; Game theory; NETWORKS;
D O I
10.1016/j.automatica.2019.108680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive deception, to defend against jamming attacks in remote state estimation. In the setup studied, an attacker sabotages packet transmissions from a sensor to a remote estimator by congesting the communication channel between them. In order to efficiently degrade the estimation accuracy, the intelligent attacker tailors its jamming strategy by reacting to the real-time information it collects. In response to the jamming attacks, the sensor with a long-term goal will select the transmission power level at each stage. In addition, by modifying the real-time information intentionally, the sensor creates asymmetric uncertainty to mislead the attacker and thus mitigate attacks. Considering the dynamic nature of the process, we model the strategic interaction between the sensor and the attacker by a general stochastic game with asymmetric information structure. To obtain stationary optimal strategies for each player, we convert this game into a belief-based dynamic game and analyze the existence of its optimal solution. For a tractable implementation, we present an algorithm that finds equilibrium strategies based on multi-agent reinforcement learning for symmetric-information stochastic games. Numerical examples illustrate properties of the proposed algorithm. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] On trigger detection against reactive jamming attacks: A localized solution
    Shin, Incheol
    Kim, Sinkyu
    Seo, Jungtaek
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7690 LNCS : 312 - 327
  • [22] Event-Based State Estimation Against Deception Attacks: A Detection-Based Approach
    Zhao, Chang
    Lin, Hong
    Li, Yuman
    Liang, Shi
    Lam, James
    IEEE SENSORS JOURNAL, 2023, 23 (19) : 23020 - 23029
  • [23] Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
    Li, Yuzhe
    Shi, Ling
    Cheng, Peng
    Chen, Jiming
    Quevedo, Daniel E.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) : 2831 - 2836
  • [24] Optimal SINR-based DoS Attacks against Remote State Estimation
    Hua, Jinxing
    Hao, Fei
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8604 - 8609
  • [25] On Information Fusion in Optimal Linear FDI Attacks Against Remote State Estimation
    Zhou, Jing
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (04): : 2085 - 2096
  • [26] Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems
    Yang, Li
    Wen, Chenglin
    IEEE ACCESS, 2021, 9 : 51679 - 51688
  • [27] Secure state estimation for event-triggered cyber-physical systems against deception attacks
    Han, Zhichen
    Zhang, Shengbing
    Jin, Zengwang
    Hu, Yanyan
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2022, 359 (18): : 11155 - 11185
  • [28] Nonlinear stealthy attacks on remote state estimation☆
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2024, 167
  • [29] Modelling of the State of Systems with Defensive Deception
    Hassan, Sharif
    Guha, Ratan
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 1031 - 1036
  • [30] Linear Attacks Against Remote State Estimation: Performance Analysis Under an Encryption Scheme
    Liu, Hanxiao
    Ni, Yuqing
    Wang, Xiaofan
    Xie, Lihua
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (04): : 1812 - 1824