TY - JOUR
T1 - Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems
AU - Peng, Lianghong
AU - Cao, Xianghui
AU - Sun, Changyin
AU - Cheng, Yu
AU - Jin, Shi
N1 - Publisher Copyright:
© 2017
PY - 2018/1/10
Y1 - 2018/1/10
N2 - Recently, there has been a growing volume of literature on the security aspect of wireless cyber-physical systems (CPS). Remote state estimation through wireless channels is a representative application of wireless CPS. However, such a system is exposed to various cyber security threats, such as replay attacks, jamming attacks and bad data injection attacks. In this paper, we focus on the wireless jamming attack and examine, from the standpoint of the attacker, the problem of optimal attack schedule that causes the largest performance degradation of the remote state estimation system, subject to attacker's energy constraint. Unlike some existing studies, we consider estimating multiple systems where sensors transmitting data to the remote estimator through multiple independent wireless channels. Due to the attacker's radio constraint, we assume that it can only launch jamming attack at one of the channels at any time. We start with the two-system case and formulate the energy efficient jamming attack schedule problem as a nonlinear program. The optimal energy efficient schedule is theoretically derived and is shown dependent on the wireless channels’ properties, energy budget of the attacker and dynamics of the systems to be estimated. Then, we extend the results to multi-system cases, and propose both an optimal schedule algorithm and an efficient algorithm of much lower complexity. Finally, we validate the theoretical results by numerical simulations.
AB - Recently, there has been a growing volume of literature on the security aspect of wireless cyber-physical systems (CPS). Remote state estimation through wireless channels is a representative application of wireless CPS. However, such a system is exposed to various cyber security threats, such as replay attacks, jamming attacks and bad data injection attacks. In this paper, we focus on the wireless jamming attack and examine, from the standpoint of the attacker, the problem of optimal attack schedule that causes the largest performance degradation of the remote state estimation system, subject to attacker's energy constraint. Unlike some existing studies, we consider estimating multiple systems where sensors transmitting data to the remote estimator through multiple independent wireless channels. Due to the attacker's radio constraint, we assume that it can only launch jamming attack at one of the channels at any time. We start with the two-system case and formulate the energy efficient jamming attack schedule problem as a nonlinear program. The optimal energy efficient schedule is theoretically derived and is shown dependent on the wireless channels’ properties, energy budget of the attacker and dynamics of the systems to be estimated. Then, we extend the results to multi-system cases, and propose both an optimal schedule algorithm and an efficient algorithm of much lower complexity. Finally, we validate the theoretical results by numerical simulations.
KW - Cyber-physical systems
KW - Energy efficient
KW - Optimal attack schedule
KW - Remote state estimation
KW - Wireless channels
UR - https://www.scopus.com/pages/publications/85028694288
U2 - 10.1016/j.neucom.2017.07.036
DO - 10.1016/j.neucom.2017.07.036
M3 - 文章
AN - SCOPUS:85028694288
SN - 0925-2312
VL - 272
SP - 571
EP - 583
JO - Neurocomputing
JF - Neurocomputing
ER -