Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach

The performance of wireless remote state estimation depends on the wireless channel quality, and hence is vulnerable to wireless channel jamming attack. In this paper, we investigate the problem of optimal jamming attack schedule that causes the largest performance degradation to the remote state estimation system. Unlike many previous studies, we consider that the sensor transmit data to the remote estimator through one of multiple independent wireless channels. Due to radio constraint of the attacker, we assume that it can only launch jamming attack on one of the channels at each step. We propose a matrix game approach to model the interactions between the attacker and the sensor and theoretically prove the existence of an optimal attack strategy. We further design an online algorithm based on temporal-difference learning for the attacker to make attack decisions. Numerical examples are provided to demonstrate the effectiveness of the game theoretical method.

[1]  Ling Shi,et al.  Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes , 2013, IEEE Transactions on Signal Processing.

[2]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[3]  Haibo He,et al.  Data-Driven Finite-Horizon Approximate Optimal Control for Discrete-Time Nonlinear Systems Using Iterative HDP Approach , 2018, IEEE Transactions on Cybernetics.

[4]  Ling Shi,et al.  Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..

[5]  Ling Shi,et al.  Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.

[6]  Yu Cheng,et al.  On Optimal Device-to-Device Resource Allocation for Minimizing End-to-End Delay in VANETs , 2016, IEEE Transactions on Vehicular Technology.

[7]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[8]  Haibo He,et al.  Novel iterative neural dynamic programming for data-based approximate optimal control design , 2017, Autom..

[9]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[10]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[11]  Frank Vahid,et al.  A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..

[12]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[13]  L. Shapley,et al.  Potential Games , 1994 .

[14]  Yu Cheng,et al.  Towards Energy-Efficient Wireless Networking in the Big Data Era: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[15]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[16]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[17]  Yu Cheng,et al.  Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs , 2017, IEEE Transactions on Industrial Informatics.

[18]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[19]  Ling Shi,et al.  Stochastic Game in Remote Estimation Under DoS Attacks , 2017, IEEE Control Systems Letters.

[20]  Changyin Sun,et al.  An adaptive strategy via reinforcement learning for the prisoner U+02BC s dilemma game , 2018, IEEE/CAA Journal of Automatica Sinica.