Optimal Power Control for DoS Attack over Fading Channel: A Game-Theoretic Approach

In this paper, we investigate remote state estimation against an intelligent denial-of-service (DoS) attack over a vulnerable wireless network whose channel undergoes attenuation and distortion caused by fading. We use the sensor to observe system states and transmit its local state estimates to the remote center. Meanwhile, the attacker injects a jamming signal to destroy the packet accepted by the remote center and causes the performance degradation. Most of the existing works are built on a time-invariant channel state information (CSI) model in which the channel fading is stationary. However, the wireless communication channels are more prone to dynamic changes. To capture this time-variant property in the channel quality of the real-world networks, we study the fading channel network whose channel model is characterized by a generalized finite-state Markov chain. With the goals of two players in infinite-time horizon, we describe the conflicting characteristic between the attacker and the sensor with a general-sum stochastic game. Moreover, the Q-learning techniques are applied to obtain an optimal strategy pair at a Nash equilibrium. Also the monotone structure of the optimal stationary strategy is constructed under a sufficient condition. Besides, when channel gain is known a priori, except for the full Channel State Information (CSI), we also investigate the partial CSI, where Bayesian games are employed. Based on the player's own channel information and the belief on the channel distribution of other players, the energy strategy at a Nash equilibrium is obtained.

[1]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[2]  Hao Liu,et al.  SINR-based multi-channel power schedule under DoS attacks: A Stackelberg game approach with incomplete information , 2019, Autom..

[3]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[4]  Shuang Wu,et al.  Learning Optimal Scheduling Policy for Remote State Estimation Under Uncertain Channel Condition , 2018, IEEE Transactions on Control of Network Systems.

[5]  A. M. Fink,et al.  Equilibrium in a stochastic $n$-person game , 1964 .

[6]  Shlomo Shamai,et al.  On the capacity of some channels with channel state information , 1999, IEEE Trans. Inf. Theory.

[7]  P. Sadeghi,et al.  Finite-state Markov modeling of fading channels - a survey of principles and applications , 2008, IEEE Signal Processing Magazine.

[8]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[9]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[10]  Wei Chen,et al.  Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[11]  Paulo Tabuada,et al.  Guest Editorial Special Issue on Control of Cyber-Physical Systems , 2014, IEEE Trans. Autom. Control..

[12]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[13]  Kyriakos G. Vamvoudakis,et al.  Non-zero sum Nash Q-learning for unknown deterministic continuous-time linear systems , 2015, Autom..

[14]  Fatos Xhafa,et al.  Special issue on cyber physical systems , 2013, Computing.

[15]  Li Xiao,et al.  Fusion State Estimation for Power Systems Under DoS Attacks: A Switched System Approach , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[16]  John S. Baras,et al.  Sensor Scheduling using Smart Sensors , 2007, 2007 46th IEEE Conference on Decision and Control.

[17]  Maryam Mohi,et al.  A Game Theory Based Approach for Security in Wireless Sensor Networks , 2008 .

[18]  M. Adibi,et al.  Comparison of Cooperative and Non-Cooperative Game Schemes for SINR-Constrained Power Allocation in Multiple Antenna CDMA Communication Systems , 2007, 2007 IEEE International Conference on Signal Processing and Communications.

[19]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[20]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[21]  Wei Xing Zheng,et al.  Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network , 2020, Autom..

[22]  Richard W. Cottle,et al.  Linear Complementarity Problem. , 1992 .

[23]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[24]  Ling Shi,et al.  Stochastic Game in Remote Estimation Under DoS Attacks , 2017, IEEE Control Systems Letters.

[25]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[26]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[27]  Subhrakanti Dey,et al.  Power Allocation for Outage Minimization in State Estimation Over Fading Channels , 2011, IEEE Transactions on Signal Processing.

[28]  J. Filar,et al.  Competitive Markov Decision Processes , 1996 .

[29]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[30]  Huanshui Zhang,et al.  Optimal Control and Stabilization for Networked Control Systems With Asymmetric Information , 2019, IEEE Transactions on Control of Network Systems.

[31]  Michael P. Wellman,et al.  Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm , 1998, ICML.