Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems

  • Lianghong Peng
  • , Xianghui Cao
  • , Changyin Sun
  • , Yu Cheng
  • , Shi Jin

Research output: Contribution to journalArticlepeer-review

43 Scopus citations

Abstract

Recently, there has been a growing volume of literature on the security aspect of wireless cyber-physical systems (CPS). Remote state estimation through wireless channels is a representative application of wireless CPS. However, such a system is exposed to various cyber security threats, such as replay attacks, jamming attacks and bad data injection attacks. In this paper, we focus on the wireless jamming attack and examine, from the standpoint of the attacker, the problem of optimal attack schedule that causes the largest performance degradation of the remote state estimation system, subject to attacker's energy constraint. Unlike some existing studies, we consider estimating multiple systems where sensors transmitting data to the remote estimator through multiple independent wireless channels. Due to the attacker's radio constraint, we assume that it can only launch jamming attack at one of the channels at any time. We start with the two-system case and formulate the energy efficient jamming attack schedule problem as a nonlinear program. The optimal energy efficient schedule is theoretically derived and is shown dependent on the wireless channels’ properties, energy budget of the attacker and dynamics of the systems to be estimated. Then, we extend the results to multi-system cases, and propose both an optimal schedule algorithm and an efficient algorithm of much lower complexity. Finally, we validate the theoretical results by numerical simulations.

Original languageEnglish
Pages (from-to)571-583
Number of pages13
JournalNeurocomputing
Volume272
DOIs
StatePublished - 10 Jan 2018
Externally publishedYes

Keywords

  • Cyber-physical systems
  • Energy efficient
  • Optimal attack schedule
  • Remote state estimation
  • Wireless channels

Fingerprint

Dive into the research topics of 'Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems'. Together they form a unique fingerprint.

Cite this