Defensive deception against reactive jamming attacks in remote state estimation

被引:18
|
作者
Ding, Kemi [1 ]
Ren, Xiaoqiang [2 ]
Quevedo, Daniel E. [3 ]
Dey, Subhrakanti [4 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai, Peoples R China
[3] Paderborn Univ, Dept Elect Engn, Paderborn, Germany
[4] Natl Univ Ireland, Hamilton Inst, Maynooth, Kildare, Ireland
基金
瑞典研究理事会;
关键词
Kalman filters; System security; Defensive deception; State estimation; Game theory; NETWORKS;
D O I
10.1016/j.automatica.2019.108680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive deception, to defend against jamming attacks in remote state estimation. In the setup studied, an attacker sabotages packet transmissions from a sensor to a remote estimator by congesting the communication channel between them. In order to efficiently degrade the estimation accuracy, the intelligent attacker tailors its jamming strategy by reacting to the real-time information it collects. In response to the jamming attacks, the sensor with a long-term goal will select the transmission power level at each stage. In addition, by modifying the real-time information intentionally, the sensor creates asymmetric uncertainty to mislead the attacker and thus mitigate attacks. Considering the dynamic nature of the process, we model the strategic interaction between the sensor and the attacker by a general stochastic game with asymmetric information structure. To obtain stationary optimal strategies for each player, we convert this game into a belief-based dynamic game and analyze the existence of its optimal solution. For a tractable implementation, we present an algorithm that finds equilibrium strategies based on multi-agent reinforcement learning for symmetric-information stochastic games. Numerical examples illustrate properties of the proposed algorithm. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [42] Secure remote state estimation against linear man-in-the-middle attacks using watermarking
    Huang, Jiahao
    Ho, Daniel W. C.
    Li, Fangfei
    Yang, Wen
    Tang, Yang
    AUTOMATICA, 2020, 121
  • [43] Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework
    Tang, Xiao
    Ren, Pinyi
    Du, Qinghe
    Sun, Li
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 487 - 496
  • [44] On Localized Countermeasure Against Reactive Jamming Attacks in Smart Grid Wireless Mesh Networks
    Shin, Incheol
    Cho, Minkyoung
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [45] Optimal Innovation-Based Deception Attack on Remote State Estimation
    Wu, Shuang
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3017 - 3022
  • [46] Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems
    Peng, Lianghong
    Cao, Xianghui
    Sun, Changyin
    Cheng, Yu
    Jin, Shi
    NEUROCOMPUTING, 2018, 272 : 571 - 583
  • [47] Distributed State and Input Estimation Over Sensor Networks Under Deception Attacks
    Guo, Yongzhen
    Xia, Yuanqing
    IEEE ACCESS, 2023, 11 : 65418 - 65426
  • [48] Optimal jamming attack schedule for remote state estimation with two sensors
    Peng, Lianghong
    Cao, Xianghui
    Shi, Hongbao
    Sun, Changyin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2018, 355 (14): : 6859 - 6876
  • [49] Optimal innovation-based attacks against remote state estimation with side information and historical data
    Shan, Hua-Sheng
    Li, Yi-Gang
    An, Liwei
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025, 56 (03) : 544 - 560
  • [50] Experiments with a testbed for automated defensive deception planning for cyber-attacks
    Rowe, Neil
    Goh, Han
    Lim, Sze
    Duong, Binh
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 185 - 194