Optimal Denial-of-Service Attack Strategy on State Estimation Over Infinite-Time Horizon

被引:11
|
作者
Li, Yao [1 ,2 ]
Zhu, Shanying [1 ,2 ]
Chen, Cailian [1 ,2 ]
Guan, Xinping [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200240, Peoples R China
[2] Minist Educ China, Key Lab Syst Control & Informat Proc, Shanghai 200240, Peoples R China
基金
上海市自然科学基金; 国家重点研发计划;
关键词
Schedules; Optimal scheduling; Denial-of-service attack; Steady-state; State estimation; Processor scheduling; Circuits and systems; CPSs; state estimation; sensor networks; DoS attack;
D O I
10.1109/TCSII.2021.3057134
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security issues of cyber-physical systems have become a timely and hot topic in recent years. In this brief, we investigate the power-constrained optimal denial-of-service (DoS) attack strategy with multiple power levels on state estimation over infinite-time horizon. We start from the two-level case and explicitly derive out the basic form of optimal attack strategy. In order to handle the intractability brought about by the larger number of levels, we develop an equivalent property for general multi-level cases that the multi-level scheduling can be viewed as a feasible combination of several sub-schedules with a designed stochastic-triggered manner, which provides a necessary condition of optimal solution. Moreover, based on the practical communication model, we give the condition under which the optimal schedule can be uniquely and explicitly determined for the two-pick strategy. Numerical simulations are accomplished to verify the effectiveness of our proposed methods.
引用
收藏
页码:2860 / 2864
页数:5
相关论文
共 50 条
  • [1] Optimal State Estimation Under the Denial-of-Service Attack: an Operator Approach
    Naghnaeian, Mohammad
    Xuan, Yu
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 5334 - 5339
  • [2] Optimal denial-of-service attack scheduling for remote state estimation with time-varying interference power
    Yang, Xinxin
    Ni, Yuqing
    Wu, Zhe
    Yang, Wen
    Liu, Fei
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (06) : 3962 - 3974
  • [3] Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network
    Qin, Jiahu
    Li, Menglin
    Wang, Jie
    Shi, Ling
    Kang, Yu
    Zheng, Wei Xing
    AUTOMATICA, 2020, 119
  • [4] Optimal Denial-of-Service Attack Power Allocation Strategy for Remote State Estimation in CPSs With Two-Hop Networks
    Xing, Wei
    Zhao, Xudong
    Liu, Lishuang
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2023, 7 (04): : 1597 - 1606
  • [5] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028
  • [6] Optimal energy allocation for remote state estimate under Denial-of-Service attack
    Ye, Dan
    Wei, Jiang
    IET CONTROL THEORY AND APPLICATIONS, 2021, 15 (06): : 793 - 804
  • [7] Denial-of-service attack hits Ohio State University
    不详
    COMPUTERS & SECURITY, 2003, 22 (03) : 179 - 179
  • [8] Optimal Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Li, Chengyu
    Xia, Tianyu
    Ren, Yizhi
    Wang, Dong
    Zhang, Guoyan
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 835 - 850
  • [9] Security estimation under Denial-of-Service attack with energy constraint
    Li, Li
    Zhang, Huixia
    Xia, Yuanqing
    Yang, Hongjiu
    NEUROCOMPUTING, 2018, 292 : 111 - 120
  • [10] A cost estimation calculus for analyzing the resistance to denial-of-service attack
    Tomioka, D
    Nishizaki, S
    Ikeda, R
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 25 - 44