DoS Attack Power Allocation Against Remote State Estimation via a Block Fading Channel

This paper studies the Denial-of-Service (DoS) attack power allocation issue, which aims to aggravate the quality of remote state estimation and save the expenditure of attack power concurrently. Different from the previous literature based on the assumption of time-invariant channel states, we consider the scenario that the observations are transmitted through a standard block fading communication channel. From viewpoint of the DoS attacker, we construct an optimization problem considering jointly the average estimation error and the attack power consumption. Then the framework of Markov decision process is employed to manifest the existence of optimal attack allocation strategy. Since the closed-form of the optimal attack strategy cannot be expressed directly, we restrain it to a specific attack policy to present the unclear part in the solution, and then provide a suboptimal attack power strategy. Finally, a simulation example is presented to show the effectiveness of our proposed attack strategy.

[1]  Xunyuan Yin,et al.  Resilient Estimation for Networked Systems With Variable Communication Capability , 2016, IEEE Transactions on Automatic Control.

[2]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[3]  P. Spreij Probability and Measure , 1996 .

[4]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[5]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[6]  Peng Cheng,et al.  Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks , 2020, IEEE Transactions on Dependable and Secure Computing.

[7]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[8]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[9]  Wei Xing Zheng,et al.  HMM-Based $\mathcal{H}_{\infty}$ Filtering for Discrete-Time Markov Jump LPV Systems Over Unreliable Communication Channels , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[10]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[11]  Heng Zhang,et al.  Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks , 2017, Ad Hoc Networks.

[12]  Ling Shi,et al.  Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).

[13]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[14]  Ling Shi,et al.  Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.

[15]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[16]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[17]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[18]  W. Fleming Book Review: Discrete-time Markov control processes: Basic optimality criteria , 1997 .

[19]  Wei Xing Zheng,et al.  Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid , 2019, IEEE Transactions on Industrial Electronics.

[20]  Heng Zhang,et al.  Sensor transmission power control in remote state estimation over a fading communication channel , 2018 .

[21]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[22]  David P. Fidler,et al.  Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.

[23]  Dimitrios N. Serpanos,et al.  ARMET: Behavior-Based Secure and Resilient Industrial Control Systems , 2018, Proceedings of the IEEE.

[24]  Yu Cheng,et al.  Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems , 2016, WASA.

[25]  Chao Yang,et al.  Jamming attack in centralized state estimation , 2015, 2015 34th Chinese Control Conference (CCC).

[26]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[27]  Heng Zhang,et al.  A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[28]  Wei Xing Zheng,et al.  Optimum transmission policy for remote state estimation with opportunistic energy harvesting , 2018, Comput. Networks.

[29]  Oscar Vega-Amaya,et al.  The average cost optimality equation: A fixed point approach , 2003 .

[30]  Alejandro Ribeiro,et al.  Optimal Power Management in Wireless Control Systems , 2014, IEEE Transactions on Automatic Control.

[31]  Jing Sun,et al.  Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .

[32]  Jiming Chen,et al.  Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.

[33]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[34]  Ling Shi,et al.  Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.

[35]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).