Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks

In this article, the security issue of remote state estimation in cyber-physical systems (CPS) for a two-hop relay network is investigated. As the system performance depends on communication topology and communication environment over each channel, we explore the channel selection problem to maximize the attack effect, from the perspective of the jammer. Furthermore, for an energy-constrained jammer, there exists the optimal strategy to decide the attack number and the dropout rate, since the amount of attack number decreases and the dropout rate increases when the energy launched at each attack time becomes larger. For this consideration, the problem of energy dispatch, aiming to derive the optimal tradeoff between the attack number and the energy launched at each attack time, is studied along with the channel selection problem. We first formulate this problem as a mixed integer programming problem to derive the optimal attack schedule including the channel selection, the attack number, and the corresponding energy dispatch. Then, using the optimality equations based on the Markov decision process allows us to present the characteristics of the optimal energy dispatch policy for a given attack number, and further propose the dynamic energy dispatch algorithm with low complexity to approximate the optimal schedule. Besides, for the constant dispatch (CD) case, the optimum solution in an analytical form for the channel selection problem can be obtained, and we thus present a CD algorithm to acquire the optimal schedule. Last, numerical results are given to validate the theoretical findings and the effectiveness of the proposed algorithms.

[1]  Jiming Chen,et al.  Energy-Efficient Data Forwarding for State Estimation in Multi-Hop Wireless Sensor Networks , 2016, IEEE Transactions on Automatic Control.

[2]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[3]  Bimal K. Roy,et al.  Two channel hopping schemes for jamming resistant wireless communication , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[4]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[5]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[6]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[7]  Michael Gastpar,et al.  Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.

[8]  Ling Shi,et al.  Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.

[9]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[10]  Daniel E. Quevedo,et al.  Co-design of jump estimators and transmission policies for wireless multi-hop networks with fading channels , 2017, Autom..

[11]  Mohamed-Slim Alouini,et al.  Average SNR of dual selection combining over correlated Nakagami-m fading channels , 2000, IEEE Communications Letters.

[12]  Ling Shi,et al.  Data-Driven Power Control for State Estimation: A Bayesian Inference Approach , 2015, Autom..

[13]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[14]  Syed Mahfuzul Aziz,et al.  Review of Cyber-Physical System in Healthcare , 2014, Int. J. Distributed Sens. Networks.

[15]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[16]  Ming Li,et al.  Disrupting MIMO Communications With Optimal Jamming Signal Design , 2015, IEEE Transactions on Wireless Communications.

[17]  Changyin Sun,et al.  Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems , 2018, Neurocomputing.

[18]  Panganamala Ramana Kumar,et al.  The transport capacity of wireless networks over fading channels , 2004, IEEE Transactions on Information Theory.

[19]  Daniel E. Quevedo,et al.  On the use of a relay for Kalman filtering over packet dropping links , 2013, 2013 American Control Conference.

[20]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[21]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[22]  Daniel E. Quevedo,et al.  Power Control and Coding Formulation for State Estimation With Wireless Sensors , 2013, IEEE Transactions on Control Systems Technology.

[23]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[24]  Jiming Chen,et al.  Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed , 2010, IEEE Transactions on Industrial Electronics.

[25]  Dongweon Yoon,et al.  On the general BER expression of one- and two-dimensional amplitude modulations , 2002, IEEE Trans. Commun..

[26]  Ling Shi,et al.  Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint , 2012, IEEE Transactions on Signal Processing.

[27]  Ling Shi,et al.  A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[28]  Huaiyu Dai,et al.  A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.

[29]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[30]  Guoxiang Gu,et al.  Generalized LQR control and Kalman filtering with relations to computations of inner-outer and spectral factorizations , 2006, IEEE Transactions on Automatic Control.

[31]  Ling Shi,et al.  On optimal partial broadcasting of wireless sensor networks for Kalman filtering , 2011, Proceedings of the 2011 American Control Conference.

[32]  Ling Shi,et al.  Optimal DoS Attacks on Remote State Estimation with a Router , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[33]  Xiaoqiang Ren,et al.  Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..

[34]  Kwang-Cheng Chen,et al.  Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.

[35]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[36]  Gerhard Fettweis,et al.  Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.

[37]  Jinliang Shao,et al.  An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.

[38]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[39]  Martin L. Puterman,et al.  Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .

[40]  Tansel Yucelen,et al.  An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[41]  Guang-Hong Yang,et al.  Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.

[42]  Mahmoud Ahmadian-Attari,et al.  Worst-Case Jamming Attack and Optimum Defense Strategy in Cooperative Relay Networks , 2019, IEEE Control Systems Letters.