Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems

Abstract This article studies denial-of-service (DoS) attack energy allocation problem for remote state estimation in cyber-physical systems (CPSs). The attacker having the ability to harvest energy sabotages packet transmission from the sensor to the remote state estimator, and it can receive information about whether the packet has arrived at the destination through an erroneous feedback channel. Because of the uncertainty of energy collection and the limitation of battery storage, the adversary needs to tailor jamming power to maximize finite and infinite horizon average estimation error covariance on the remote estimator side, respectively. The energy allocation problem of imperfect feedback is transformed into Markov decision process (MDP) of perfect acknowledgments via the iteration of state information. Then we get the optimal DoS attack energy allocation strategy with imperfect acknowledgments and energy harvesting constraints. A myopic strategy for energy allocation and some structural results are also presented. Finally, the theoretical results are verified via a numerical example.

[1]  Ling Shi,et al.  Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..

[2]  Ling Shi,et al.  Optimal Periodic Sensor Scheduling With Limited Resources , 2011, IEEE Transactions on Automatic Control.

[3]  Dimitris A. Pados,et al.  SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[4]  Daniel E. Quevedo,et al.  Optimal Energy Allocation in Multisensor Estimation Over Wireless Channels Using Energy Harvesting and Sharing , 2019, IEEE Transactions on Automatic Control.

[5]  Dan Ye,et al.  Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[6]  Xiaodong Wang,et al.  Transmission With Energy Harvesting Nodes in Frequency-Selective Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[7]  Subhrakanti Dey,et al.  Optimal Energy Allocation for Kalman Filtering Over Packet Dropping Links With Imperfect Acknowledgments and Energy Harvesting Constraints , 2014, IEEE Transactions on Automatic Control.

[8]  Dan Ye,et al.  False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach , 2020, Autom..

[9]  Xianghui Cao,et al.  Optimal Transmit Power Allocation for an Energy-Harvesting Sensor in Wireless Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.

[10]  Rui Zhang,et al.  Optimal Energy Allocation for Wireless Communications With Energy Harvesting Constraints , 2011, IEEE Transactions on Signal Processing.

[11]  Pravin Varaiya,et al.  Stochastic Systems: Estimation, Identification, and Adaptive Control , 1986 .

[12]  Xiao-Jian Li,et al.  Output feedback secure control for cyber-physical systems against sparse sensor attacks , 2020, Appl. Math. Comput..

[13]  O. Hernández-Lerma,et al.  Discrete-time Markov control processes , 1999 .

[14]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[15]  Dimitri P. Bertsekas,et al.  Discretized Approximations for POMDP with Average Cost , 2004, UAI.

[16]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[17]  Manfred Schäl,et al.  Average Optimality in Dynamic Programming with General State Space , 1993, Math. Oper. Res..

[18]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[19]  Purushottam Kulkarni,et al.  Energy Harvesting Sensor Nodes: Survey and Implications , 2011, IEEE Communications Surveys & Tutorials.

[20]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[21]  Daniel E. Quevedo,et al.  Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.

[22]  N. Jazdi,et al.  Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.

[23]  Dan Ye,et al.  Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology , 2020, IEEE Transactions on Cybernetics.

[24]  David P. Fidler Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.

[25]  Jiuxiang Dong,et al.  A Robust Dynamic Compensation Approach for Cyber-Physical Systems Against Multiple Types of Actuator Attacks , 2020, Appl. Math. Comput..

[26]  Ling Shi,et al.  Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.

[27]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[28]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[29]  Subhrakanti Dey,et al.  Dynamic Quantizer Design for Hidden Markov State Estimation Via Multiple Sensors With Fusion Center Feedback , 2006, IEEE Transactions on Signal Processing.

[30]  Soegijardjo Soegijoko A brief review on existing cyber-physical systems for healthcare applications and their prospective national developments , 2013, 2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME).

[31]  Ling Shi,et al.  Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes , 2013, IEEE Transactions on Signal Processing.

[32]  Ling Shi,et al.  Infinite-horizon sensor scheduling for estimation over lossy networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[33]  Guoxiang Gu,et al.  Generalized LQR control and Kalman filtering with relations to computations of inner-outer and spectral factorizations , 2006, IEEE Transactions on Automatic Control.

[34]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[35]  Ling Shi,et al.  Optimal denial-of-service attack on feedback channel against acknowledgment-based sensor power schedule for remote estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[36]  Jinliang Shao,et al.  An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.

[37]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[38]  Dan Ye,et al.  Optimal periodic DoS attack with energy harvester in cyber-physical systems , 2020, Neurocomputing.

[39]  Ling Shi,et al.  Dynamic sensor transmission power scheduling for remote state estimation , 2014, Autom..

[40]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.