Remote State Estimation in the Presence of an Active Eavesdropper

We consider remote state estimation in the presence of an active eavesdropper. A sensor forward local state estimates to a remote estimator over a network, which may be eavesdropped by an intelligent adversary. Aiming at improving the eavesdropping performance efficiently, the adversary may adaptively alternate between an eavesdropping and an active mode. In contrast to eavesdropping, the active attack enables the adversary to sabotage the data transfer to the estimator, and improve the data reception to itself at the same time. However, launching active attacks may increase the risk of being detected. As a result, a tradeoff between eavesdropping performance and stealthiness arises. We present a generalized framework for active eavesdropping and propose a criterion based on the packet reception rate at the estimator to evaluate the stealthiness of the eavesdropper. Moreover, the tradeoff is formulated as a constrained Markov decision process. After deriving a sufficient condition under which at least one stationary policy satisfies the stealthiness constraint and also bounds the eavesdropping performance, we develop an optimal attack policy for the eavesdropper and focus on the structural analysis of the optimal policy. Furthermore, numerical examples are provided to illustrate the developed results.

[1]  Keith W. Ross,et al.  Randomized and Past-Dependent Policies for Markov Decision Processes with Multiple Constraints , 1989, Oper. Res..

[2]  Markku Renfors,et al.  Comparison of decision-directed and pilot-aided algorithms for complex channel tap estimation in a downlink WCDMA system , 2000, 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525).

[3]  Vikram Krishnamurthy,et al.  ${Q}$-Learning Algorithms for Constrained Markov Decision Processes With Randomized Monotone Policies: Application to MIMO Transmission Control , 2007, IEEE Transactions on Signal Processing.

[4]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[5]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.

[6]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[7]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[8]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[9]  Xiaoqiang Ren,et al.  Infinite Horizon Optimal Transmission Power Control for Remote State Estimation Over Fading Channels , 2016, IEEE Transactions on Automatic Control.

[10]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[11]  Petros G. Voulgaris,et al.  On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..

[12]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[13]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[14]  George J. Pappas,et al.  State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.

[15]  O. Hernández-Lerma,et al.  Discrete-time Markov control processes , 1999 .

[16]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[17]  Vivek S. Borkar,et al.  An actor-critic algorithm for constrained Markov decision processes , 2005, Syst. Control. Lett..

[18]  John S. Baras,et al.  Sensor Scheduling using Smart Sensors , 2007, 2007 46th IEEE Conference on Decision and Control.

[19]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[20]  Daniel E. Quevedo,et al.  Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.

[21]  Rolando Cavazos-Cadena,et al.  Comparing recent assumptions for the existence of average optimal stationary policies , 1992, Oper. Res. Lett..

[22]  Ling Shi,et al.  Dynamic sensor transmission power scheduling for remote state estimation , 2014, Autom..

[23]  W. Cary Huffman,et al.  Fundamentals of Error-Correcting Codes , 1975 .

[24]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[25]  Xiaoqiang Ren,et al.  Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..

[26]  Henrik Sandberg,et al.  Differentially private state estimation in distribution networks with smart meters , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[27]  Daniel E. Quevedo,et al.  Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.

[28]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[29]  Ling Shi,et al.  Probabilistic performance of state estimation across a lossy network , 2008, Autom..

[30]  Peter Geibel,et al.  Reinforcement Learning for MDPs with Constraints , 2006, ECML.

[31]  Ling Shi,et al.  Time and Event-based Sensor Scheduling for Networks with Limited Communication Resources , 2011 .

[32]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[33]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[34]  F. Beutler,et al.  Optimal policies for controlled markov chains with a constraint , 1985 .

[35]  Ling Shi,et al.  Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..