Effects of Jamming Attacks on a Control System With Energy Harvesting

We consider the problem of control and remote state estimation with battery constraints and energy harvesting at the sensor (transmitter) under DoS/jamming attacks. We derive the optimal non-causal energy allocation policy that depends on current properties of the channel and on future energy usage. The performance of this policy is analyzed under jamming attacks on the wireless channel, in which the assumed and the true channel gains differ, and we show that the resulting control cost is not monotonic with respect to the assumed channel gain used in the transmission policy. Additionally, we show that, in case there exists a stabilizing policy, then the optimal causal policy ensures stability of the estimation process. The results were illustrated for non-causal and causal energy allocation policies under different jamming attacks.

[1]  Valery A. Ugrinovskii,et al.  Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links , 2017, Autom..

[2]  Jing Yang,et al.  Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter , 2013, Comput. Commun..

[3]  Tomohisa Hayakawa,et al.  Networked Control Under Random and Malicious Packet Losses , 2016, IEEE Transactions on Automatic Control.

[4]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[5]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[6]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[7]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[8]  Daniel E. Quevedo,et al.  State Estimation Over Sensor Networks With Correlated Wireless Fading Channels , 2013, IEEE Transactions on Automatic Control.

[9]  Mikael Gidlund,et al.  Future research challenges in wireless sensor and actuator networks targeting industrial automation , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[10]  Federico Chiariotti,et al.  A game-theoretic analysis of energy-depleting jamming attacks , 2019, 2017 International Conference on Computing, Networking and Communications (ICNC).

[11]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[12]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[13]  Danial Senejohnny,et al.  A Jamming-Resilient Algorithm for Self-Triggered Network Coordination , 2016, IEEE Transactions on Control of Network Systems.

[14]  Tamer Başar,et al.  Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems , 2017, IEEE Transactions on Control of Network Systems.

[15]  Rui Zhang,et al.  Optimal Energy Allocation for Wireless Communications With Energy Harvesting Constraints , 2011, IEEE Transactions on Signal Processing.

[16]  Chin Keong Ho,et al.  Markovian models for harvested energy in wireless communications , 2010, 2010 IEEE International Conference on Communication Systems.

[17]  Subhrakanti Dey,et al.  Optimal sensor transmission energy allocation for linear control over a packet dropping link with energy harvesting , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[18]  Xiaoqiang Ren,et al.  DoS Attacks on Remote State Estimation With Asymmetric Information , 2019, IEEE Transactions on Control of Network Systems.