Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network

被引:59
|
作者
Qin, Jiahu [1 ]
Li, Menglin [1 ]
Wang, Jie [1 ]
Shi, Ling [2 ]
Kang, Yu [1 ]
Zheng, Wei Xing [3 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Sydney, NSW 2751, Australia
基金
中国国家自然科学基金;
关键词
Cyber-Physical Systems; DoS attack; Energy constraint; Remote state estimation; CYBER-PHYSICAL SYSTEMS;
D O I
10.1016/j.automatica.2020.109090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a scenario in which a DoS attacker with the limited power resource and the purpose of degrading the system performance, jams a wireless network through which the packet from a sensor is sent to a remote estimator. To degrade the estimation quality most effectively with a given energy budget, the attacker aims to solve the problem of how much power to obstruct the channel each time, which is the recently proposed optimal attack energy management problem. The existing works are built on an ideal network model in which the packet dropout never occurs when the attack is absent. To encompass wireless transmission losses, we introduce the signal-to-interference-plus-noise ratio-based network. First we focus on the case when the attacker employs the constant power level. To maximize the expected terminal estimation error at the remote estimator, we provide some more relaxed sufficient conditions compared with the existing work for the existence of an explicit solution to the optimal static attack energy management problem and the solution is constructed. For the other important index of system performance, the average expected estimation error, the associated sufficient conditions are also derived based on a different analysis approach with the existing work. And a feasible method is presented for both indexes to seek the optimal constant attack power level when the system fails to meet the proposed sufficient conditions. Then when the real-time ACK information can be acquired, a Markov decision process (MDP) based algorithm is designed to solve the optimal dynamic attack energy management problem. We further study the optimal tradeoff between attack energy and system degradation. Specifically, by moving the energy constraint into the objective function to maximize the system index and minimize the energy consumption simultaneously, the other MDP based algorithm is proposed to find the optimal dynamic attack power policy which is further shown to have a monotone structure. The theoretical results are illustrated by simulations. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Optimal State Estimation Under the Denial-of-Service Attack: an Operator Approach
    Naghnaeian, Mohammad
    Xuan, Yu
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 5334 - 5339
  • [2] Optimal Denial-of-Service Attack Strategy on State Estimation Over Infinite-Time Horizon
    Li, Yao
    Zhu, Shanying
    Chen, Cailian
    Guan, Xinping
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (08) : 2860 - 2864
  • [3] Optimal SINR-based DoS Attacks against Remote State Estimation
    Hua, Jinxing
    Hao, Fei
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8604 - 8609
  • [4] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028
  • [5] Optimal energy allocation for remote state estimate under Denial-of-Service attack
    Ye, Dan
    Wei, Jiang
    IET CONTROL THEORY AND APPLICATIONS, 2021, 15 (06): : 793 - 804
  • [6] Security estimation under Denial-of-Service attack with energy constraint
    Li, Li
    Zhang, Huixia
    Xia, Yuanqing
    Yang, Hongjiu
    NEUROCOMPUTING, 2018, 292 : 111 - 120
  • [7] Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 339 - 352
  • [8] Optimal Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Li, Chengyu
    Xia, Tianyu
    Ren, Yizhi
    Wang, Dong
    Zhang, Guoyan
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 835 - 850
  • [9] Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks
    Qin, Jiahu
    Li, Menglin
    Shi, Ling
    Yu, Xinghuo
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) : 1648 - 1663
  • [10] Prevention Mechanism for Infrastructure based Denial-of-Service attack over Software Defined Network
    Singh, Sandeep
    Khan, R. A.
    Agrawal, Alka
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 348 - 353