Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control

Recently a flood of literature concerned on the security issues of wireless networked control system. However, it is still lack of investigation on how the attacker should optimize its attack schedule in order to maximize the effect on the system performance due to the insufficiency of energy at the attacker side. This paper fills this gap from the aspect of control system performance. Especially, this paper investigates the optimal jamming attack which maximizes the linear quadratic Gaussian control cost function under energy constraint. After analyzing the properties of the cost function under an arbitrary attack schedule, we derive the optimal jamming attack schedule and the corresponding cost function. System stability under this optimal attack schedule is also considered. Different examples are provided to demonstrate the effectiveness of the proposed optimal jamming schedule.

[1]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[2]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[3]  Bruno Sinopoli,et al.  Networked Sensing, Estimation and Control Systems , 2009 .

[4]  Sonia Martínez,et al.  On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[5]  Michael Zuba,et al.  Launching denial-of-service jamming attacks in underwater sensor networks , 2011, WUWNet '11.

[6]  Lihua Xie,et al.  Optimal controller location in wireless networked control systems , 2015 .

[7]  Jiming Chen,et al.  Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks , 2010, IEEE Transactions on Industrial Electronics.

[8]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[9]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[10]  Leiba Rodman,et al.  Algebraic Riccati equations , 1995 .

[11]  Yan Zhang,et al.  Development of an integrated wireless sensor network micro-environmental monitoring system. , 2008, ISA transactions.

[12]  Ling Shi,et al.  Online Deception Attack against Remote State Estimation , 2014 .

[13]  Mo-Yuen Chow,et al.  Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.

[14]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[15]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[16]  Richard M. Murray,et al.  Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..

[17]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[18]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[19]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[20]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[21]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[22]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[23]  Ling Shi,et al.  SATS: Secure Average-Consensus-Based Time Synchronization in Wireless Sensor Networks , 2013, IEEE Transactions on Signal Processing.

[24]  Ling Shi,et al.  Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).

[25]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[26]  S. Sastry,et al.  Optimal control with unreliable communication: the TCP case , 2005, Proceedings of the 2005, American Control Conference, 2005..

[27]  Eitan Altman,et al.  A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.