Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel

This paper addresses the secure control problem of cyber-physical systems (CPSs) under Denial-of-Service (DoS) attack with power constraint. The purpose of the attacker is to degenerate the control performance of CPSs at the reduced cost of attack power. Unlike the existing works developed under the assumption of time-invariant channel states, the sensor-to-estimator communication channel under consideration is a standard block fading communication channel. By taking the angle of the DoS attacker, an optimization problem is formulated to deal with both the linear quadratic control cost of the CPS and the expenditure of attack power. Then, the formulated problem is transformed into a Markov decision problem. As it is difficult to provide an analytical expression of optimal attack power, the objective function is approximated to derive an analytical expression of the suboptimal attack power. Next the attack strategies for two specific communication schemes, namely, the capacity achieving coding scheme and the forward error correction scheme, are studied. Finally, the validity of the proposed attack strategy is demonstrated by an illustrative example.

[1]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[2]  Panos J. Antsaklis,et al.  Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.

[3]  Chao Yang,et al.  Jamming attack in centralized state estimation , 2015, 2015 34th Chinese Control Conference (CCC).

[4]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[5]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[6]  Yu Cheng,et al.  Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems , 2016, WASA.

[7]  Xiaoqiang Ren,et al.  Infinite Horizon Optimal Transmission Power Control for Remote State Estimation Over Fading Channels , 2016, IEEE Transactions on Automatic Control.

[8]  Oscar Vega-Amaya,et al.  The average cost optimality equation: A fixed point approach , 2003 .

[9]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[10]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[11]  P. Spreij Probability and Measure , 1996 .

[12]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[13]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[14]  David P. Fidler Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.

[15]  Pietro Tesi,et al.  Networked Control of Nonlinear Systems under Denial-of-Service , 2016 .

[16]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[17]  Ling Shi,et al.  Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).

[18]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[19]  Yang Han,et al.  Adaptive two-way relaying and outage analysis , 2009, IEEE Transactions on Wireless Communications.

[20]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[21]  W. Fleming Book Review: Discrete-time Markov control processes: Basic optimality criteria , 1997 .

[22]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[23]  Daniel E. Quevedo,et al.  On Kalman filtering over fading wireless channels with controlled transmission powers , 2012, Autom..

[24]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[25]  Alejandro Ribeiro,et al.  Optimal Power Management in Wireless Control Systems , 2014, IEEE Transactions on Automatic Control.

[26]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[27]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[28]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.