Abstract
Recently, the security issues of Cyber-Physical Systems (CPS) have gained a growing amount of research attention. As a typical application of CPS, remote state estimation systems over wireless channels are vulnerable to various cyber attacks, such as channel jamming attacks. Standing on the point of the jamming attacker, this paper investigates the problem of optimal attack schedule under energy constraints against a wireless state estimation system, where two sensors transmit data to a remote estimator over two independent wireless channels. Due to its radio constraint, the attacker is assumed to only launch jamming attack on one of the two channels at a time. We formulate the problem of optimal attack schedule as a nonlinear program which aims to maximize the remote estimation error covariance subjecting to the attacker’s energy constraint. We then theoretically derive the optimal schedule and shows that it depends on the attacker’s energy budget, the physical system dynamics and the channel properties. Finally, the theoretical results are validated and evaluated through numerical simulations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Khaitan, S.K., McCalley, J.D.: Design techniques and applications of cyber physical systems: a survey. IEEE Syst. J. 9(2), 350–365 (2014)
Cao, X., Cheng, P., Chen, J., Ge, S.S., Cheng, Y., Sun, Y.: Cognitive radio based state estimation in cyber-physical systems. IEEE J. Sel. Areas Commun. 32(3), 489–502 (2014)
Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)
Zhang, H., Cheng, P., Shi, L., Chen, J.M.: Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans. Autom. Control 60(11), 3023–3028 (2015)
Mo, Y.L., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference, Illinois, USA, pp. 911–918 (2009)
Teixeira, A., Perez, D., Sandberg, H., Johansson, K.H.: Attack models and scenarios for networked control systems. In: 1st International Conference on High Confidence Networked Systems, pp. 55–64 (2012)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46–57 (2005)
Thakur, N., Sankaralingam, A.: Introduction to jamming attacks and prevention techniques using honeypots in wireless networks. IRACST - Int. J. Comput. Sci. Inf. Technol. Secur. 3(2) (2013). ISSN 2249-9555
Akyol, E., Rose, K., Basar, T.: Optimal zero-delay jamming over an additive noise channel. IEEE Trans. Inf. Theor. 61(8), 4331–4344 (2015)
Manandhar, K., Cao, X., Hu, F., Liu, Y.: Combating false data injection attacks in smart grid using kalman filter. In: 2014 International Conference on Computing, Networking and Communications, pp. 16–20 (2014)
Bezzo, N., Weimer, J., Pajic, M., Sokolsky, O., Pappas, G.J., Lee, I.: Attack resilient state estimation for autonomous robotic systems. In: IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 3692–3698 (2014)
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, pp. 1307–1315 (2007)
Rugh, W.J.: Linear System Theory. Prentice hall, Upper Saddle River (1996)
Shi, L., Cheng, P., Chen, J.: Sensor data scheduling for optimal state estimation with communication energy constraint. Automatica 47(8), 1693–1698 (2011)
Cao, X., Zhou, X., Liu, L., Cheng, Y.: Energy-efficient spectrum sensing for cognitive radio enabled remote state estimation over wireless channels. IEEE Trans. Wireless Commun. 14(4), 2058–2071 (2015)
Shi, L., Cheng, P., Chen, J.M.: Optimal periodic sensor scheduling with limited resources. IEEE Trans. Autom. Control 56(9), 2190–2195 (2011)
Acknowledgment
This work was supported in part by National Science Foundation of China under grants 61573103 and 61520106009, and by State Key Laboratory of Synthetical Automation for Process Industries.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Peng, L., Cao, X., Sun, C., Cheng, Y. (2016). Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-42836-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42835-2
Online ISBN: 978-3-319-42836-9
eBook Packages: Computer ScienceComputer Science (R0)