Optimal Attack Energy Allocation against Remote State Estimation
Recently, the security issue of wireless cyber-physical systems (CPS) has attracted much attention from different communities. In this paper, we consider energy-efficient optimal attack power schedule against remote state estimation of wireless CPS under constrained denial-of-service attacks based o...
Saved in:
Published in | IEEE transactions on automatic control Vol. 63; no. 7; pp. 2199 - 2205 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.07.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 0018-9286 1558-2523 |
DOI | 10.1109/TAC.2017.2775344 |
Cover
Loading…
Abstract | Recently, the security issue of wireless cyber-physical systems (CPS) has attracted much attention from different communities. In this paper, we consider energy-efficient optimal attack power schedule against remote state estimation of wireless CPS under constrained denial-of-service attacks based on channels' signal-to-interference-plus-noise ratio (SINR). We propose a wireless communication model with SINRs of channels, in which different attack powers can cause different dropout rates. The problem of optimal attack power schedule that causes the largest performance degradation of the remote state estimation, subject to attacker's average energy constraint in multisystems, is solved by formulating it as a Markov decision process. We show that an optimal deterministic and stationary policy exists and the optimal policy has a threshold structure. |
---|---|
AbstractList | Recently, the security issue of wireless cyber-physical systems (CPS) has attracted much attention from different communities. In this paper, we consider energy-efficient optimal attack power schedule against remote state estimation of wireless CPS under constrained denial-of-service attacks based on channels' signal-to-interference-plus-noise ratio (SINR). We propose a wireless communication model with SINRs of channels, in which different attack powers can cause different dropout rates. The problem of optimal attack power schedule that causes the largest performance degradation of the remote state estimation, subject to attacker's average energy constraint in multisystems, is solved by formulating it as a Markov decision process. We show that an optimal deterministic and stationary policy exists and the optimal policy has a threshold structure. |
Author | Sun, Changyin Shi, Ling Cao, Xianghui Peng, Lianghong |
Author_xml | – sequence: 1 givenname: Lianghong orcidid: 0000-0003-0074-5953 surname: Peng fullname: Peng, Lianghong email: lhpeng@seu.edu.cn organization: Southeast University, Nanjing, China – sequence: 2 givenname: Ling orcidid: 0000-0002-6771-8258 surname: Shi fullname: Shi, Ling email: eesling@ust.hk organization: Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong – sequence: 3 givenname: Xianghui orcidid: 0000-0002-6771-0571 surname: Cao fullname: Cao, Xianghui email: xhcao@seu.edu.cn organization: Southeast University, Nanjing, China – sequence: 4 givenname: Changyin orcidid: 0000-0001-9269-334X surname: Sun fullname: Sun, Changyin email: cysun@seu.edu.cn organization: Southeast University, Nanjing, China |
BookMark | eNp9kE9Lw0AQxRepYFq9C17yBRL3fzY3Q4hVKBS0nsOwmZRompTsXvrt3djiwYOXGYb3fsPjLcliGAck5J7RlDGaP-6KMuWUZSnPMiWkvCIRU8okXHGxIBGlzCQ5N_qGLJ37DKeWkkXkaXv03QH6uPAe7FdcDTjtT3HR96MF341DDHvoBufjNzyMHuN3D2FWbqZm_ZZct9A7vLvsFfl4rnblS7LZrl_LYpNYroVPRGOs0FK1oE0rMkTDjGktshYFz4VClBJokyEgZLJpkOsmSCbYJTUNiBXR5792Gp2bsK1t538S-Am6vma0nnuoQw_13EN96SGA9A94nEL26fQf8nBGOkT8tRvGVLCJb2_yayo |
CODEN | IETAA9 |
CitedBy_id | crossref_primary_10_1109_TSMC_2023_3276352 crossref_primary_10_1016_j_automatica_2020_109182 crossref_primary_10_1109_ACCESS_2020_2995939 crossref_primary_10_1109_TII_2019_2960042 crossref_primary_10_1016_j_automatica_2021_110015 crossref_primary_10_1109_TAC_2023_3301818 crossref_primary_10_3390_s24030850 crossref_primary_10_1109_TSIPN_2022_3174969 crossref_primary_10_1016_j_amc_2020_125821 crossref_primary_10_1016_j_ifacol_2020_12_228 crossref_primary_10_1016_j_jfranklin_2019_02_010 crossref_primary_10_1109_TCNS_2023_3337416 crossref_primary_10_1109_LSP_2024_3521378 crossref_primary_10_1109_JIOT_2019_2932980 crossref_primary_10_1016_j_jfranklin_2020_08_041 crossref_primary_10_1109_TAC_2020_3024143 crossref_primary_10_1109_TCYB_2020_2992762 crossref_primary_10_1109_TGCN_2023_3235118 crossref_primary_10_1109_TNNLS_2022_3148924 crossref_primary_10_1109_TCYB_2019_2939420 crossref_primary_10_1109_TSP_2022_3158759 crossref_primary_10_1016_j_jfranklin_2018_06_016 crossref_primary_10_1016_j_neucom_2022_05_085 crossref_primary_10_1109_TCYB_2020_2978088 crossref_primary_10_1016_j_automatica_2021_110145 crossref_primary_10_1016_j_automatica_2020_109090 crossref_primary_10_1109_TAC_2019_2956021 crossref_primary_10_1109_TCYB_2021_3112677 crossref_primary_10_1109_TSMC_2019_2960541 crossref_primary_10_1109_TCSII_2021_3057134 crossref_primary_10_1109_TSMC_2021_3117742 crossref_primary_10_1016_j_jfranklin_2020_01_029 crossref_primary_10_1080_00207721_2022_2143735 crossref_primary_10_1109_TAC_2020_3029325 crossref_primary_10_1080_00207721_2023_2245949 crossref_primary_10_1016_j_ins_2023_119134 crossref_primary_10_1109_TNSE_2022_3144484 crossref_primary_10_1016_j_isatra_2023_01_020 crossref_primary_10_1109_TCYB_2021_3088321 crossref_primary_10_1109_TCNS_2022_3225282 crossref_primary_10_1109_ACCESS_2024_3520821 crossref_primary_10_1109_JAS_2024_124257 crossref_primary_10_1080_00207721_2021_1938280 crossref_primary_10_1109_TAC_2022_3146079 crossref_primary_10_1002_rnc_4666 crossref_primary_10_1109_LRA_2021_3056340 crossref_primary_10_1016_j_neucom_2020_01_075 crossref_primary_10_1109_TAC_2022_3200963 crossref_primary_10_1016_j_jfranklin_2021_04_014 crossref_primary_10_1109_ACCESS_2021_3135870 crossref_primary_10_1002_itl2_370 crossref_primary_10_1016_j_neunet_2023_02_028 crossref_primary_10_1109_TCYB_2022_3209820 crossref_primary_10_1016_j_neucom_2019_01_099 crossref_primary_10_1016_j_automatica_2020_109128 crossref_primary_10_1016_j_neucom_2023_127116 crossref_primary_10_1109_TAC_2020_2991957 crossref_primary_10_1049_iet_cta_2018_5954 crossref_primary_10_1109_ACCESS_2019_2922272 crossref_primary_10_1016_j_jfranklin_2022_07_024 crossref_primary_10_1080_21642583_2021_1895004 crossref_primary_10_1109_TCSI_2019_2904747 crossref_primary_10_1049_cth2_12359 crossref_primary_10_1109_LCSYS_2024_3398200 crossref_primary_10_1109_TIFS_2020_3031378 crossref_primary_10_1007_s11768_021_00075_7 crossref_primary_10_3934_mmc_2024034 crossref_primary_10_1109_JIOT_2024_3488725 crossref_primary_10_1109_JSYST_2024_3381304 crossref_primary_10_1016_j_isatra_2022_03_005 crossref_primary_10_1016_j_jfranklin_2022_10_019 crossref_primary_10_1109_TAC_2019_2949877 crossref_primary_10_1109_TCNS_2024_3372134 crossref_primary_10_1109_TCYB_2020_2986008 crossref_primary_10_1109_TII_2020_2995385 crossref_primary_10_1002_rnc_7172 crossref_primary_10_1049_iet_cta_2020_0334 crossref_primary_10_1109_TNNLS_2021_3138924 crossref_primary_10_1016_j_neucom_2020_08_007 crossref_primary_10_1002_rnc_5351 |
Cites_doi | 10.1109/JPROC.2011.2161428 10.1109/TAC.2015.2409905 10.1239/jap/1152413725 10.1109/JIOT.2016.2516102 10.1016/j.automatica.2014.10.067 10.1145/2076569.2076581 10.1016/j.automatica.2011.02.037 10.1109/TCNS.2016.2549640 10.1007/978-3-319-42836-9_29 10.1109/TSP.2013.2283838 10.1109/TII.2015.2499123 10.1201/b13595 10.1109/ICIP.2004.1421364 10.1109/TAC.2014.2322153 10.1109/MC.2002.1039518 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TAC.2017.2775344 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2523 |
EndPage | 2205 |
ExternalDocumentID | 10_1109_TAC_2017_2775344 8115201 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61573103; 61533008; 61520106009 funderid: 10.13039/501100001809 – fundername: Fundamental Research Funds for the Central Universities grantid: 2242016K41068 funderid: 10.13039/501100012226 – fundername: State Key Laboratory of Synthetical Automation for Process Industries funderid: 10.13039/501100011248 – fundername: HKUST internal grantid: IEG15EG01 |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 VJK ~02 AAYOK AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c263t-3d8c3645fa68f37ee8188fce1fe32935ee44a0d7eaea74dde26dfe38a68408da3 |
IEDL.DBID | RIE |
ISSN | 0018-9286 |
IngestDate | Tue Jul 01 03:36:21 EDT 2025 Thu Apr 24 23:06:32 EDT 2025 Wed Aug 27 08:34:58 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c263t-3d8c3645fa68f37ee8188fce1fe32935ee44a0d7eaea74dde26dfe38a68408da3 |
ORCID | 0000-0003-0074-5953 0000-0002-6771-0571 0000-0002-6771-8258 0000-0001-9269-334X |
PageCount | 7 |
ParticipantIDs | crossref_primary_10_1109_TAC_2017_2775344 crossref_citationtrail_10_1109_TAC_2017_2775344 ieee_primary_8115201 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-July 2018-7-00 |
PublicationDateYYYYMMDD | 2018-07-01 |
PublicationDate_xml | – month: 07 year: 2018 text: 2018-July |
PublicationDecade | 2010 |
PublicationTitle | IEEE transactions on automatic control |
PublicationTitleAbbrev | TAC |
PublicationYear | 2018 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref13 ref15 ref14 ref20 zhang (ref16) 2008 ref11 ren (ref7) 2016 ref10 antsaklis (ref12) 2006 gunes (ref1) 2014; 8 ref2 ref19 proakis (ref17) 2007 ref8 ref9 ref4 mo (ref3) 2012; 100 rolski (ref21) 2009 ref6 ref5 puterman (ref18) 2005 |
References_xml | – volume: 100 start-page: 195 year: 2012 ident: ref3 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proc IEEE doi: 10.1109/JPROC.2011.2161428 – ident: ref9 doi: 10.1109/TAC.2015.2409905 – ident: ref20 doi: 10.1239/jap/1152413725 – ident: ref4 doi: 10.1109/JIOT.2016.2516102 – ident: ref2 doi: 10.1016/j.automatica.2014.10.067 – ident: ref10 doi: 10.1145/2076569.2076581 – ident: ref13 doi: 10.1016/j.automatica.2011.02.037 – ident: ref8 doi: 10.1109/TCNS.2016.2549640 – year: 2009 ident: ref21 publication-title: Stochastic Processes for Insurance and Finance – ident: ref11 doi: 10.1007/978-3-319-42836-9_29 – year: 2006 ident: ref12 publication-title: Linear Systems – year: 2007 ident: ref17 publication-title: Digital Communications – ident: ref14 doi: 10.1109/TSP.2013.2283838 – year: 2016 ident: ref7 article-title: Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution publication-title: arXiv 1609 00887 – ident: ref5 doi: 10.1109/TII.2015.2499123 – volume: 8 start-page: 4242 year: 2014 ident: ref1 article-title: A survey on concepts, applications, and challenges in cyber-physical systems publication-title: KSII Trans Internet and Inf Syst – year: 2008 ident: ref16 publication-title: Security in Wireless Mesh Networks doi: 10.1201/b13595 – year: 2005 ident: ref18 publication-title: Markov Decision Processes Discrete Stochastic Dynamic Programming – ident: ref15 doi: 10.1109/ICIP.2004.1421364 – ident: ref19 doi: 10.1109/TAC.2014.2322153 – ident: ref6 doi: 10.1109/MC.2002.1039518 |
SSID | ssj0016441 |
Score | 2.5514855 |
Snippet | Recently, the security issue of wireless cyber-physical systems (CPS) has attracted much attention from different communities. In this paper, we consider... |
SourceID | crossref ieee |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 2199 |
SubjectTerms | Cyber-physical systems (CPS) Interference Jamming Kalman filtering Markov processes optimization algorithms Sensors Signal to noise ratio State estimation Wireless communication Wireless sensor networks |
Title | Optimal Attack Energy Allocation against Remote State Estimation |
URI | https://ieeexplore.ieee.org/document/8115201 |
Volume | 63 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA9zT_rg1xTnF33wRbDdmqZN-uYYG0OYgmywt5ImF5HpJtq9-Nd7SbsyRcS30txByF3vd-l9EXKVapSqVIkfK5b7zEjjp6AjP1ecxYAYIV27pvF9Mpqyu1k8a5CbuhYGAFzyGQT20cXy9VKt7K-yjkD3hdpirS28uJW1WnXEwOJ6aXXxA6aiDkl2086k17c5XDygHJ1zxr5B0MZMFQcpwz0yXm-mzCSZB6siD9Tnjz6N_93tPtmtfEuvVyrDAWnA4pDsbHQcbJHbBzQRr5aoKKSaewNX-uf1XiymWRl58kk-o8voPQIKETznjHqDD8tl14_IdDiY9Ed-NUTBVzSJCj_SQtlQo5GJMBEHQIQWRkFoIEKojwEYk13NQYLkDI0dTTQuCWm7wAgto2PSXCwXcEK8UIcRGKpTHUrkARkaHmuacpMImsukTTrrc81U1WHcDrp4ydxNo5tmKInMSiKrJNEm1zXHW9ld4w_alj3jmq463tPfX5-RbWpVwSXWnpNm8b6CC3QfivzS6c0XsxvBxA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA9jHtSDX1Ocnz14EWy3pmmT3hxjY-o2QTbYraTJi8jmJtpd_OtN0q5MEfFWmvcg5L2832vfF0JXsdRS5SJyQ0FSlyiu3Bhk4KaCkhA0RnDbrmkwjHpjcj8JJxV0U9bCAIBNPgPPPNpYvlyIpflV1mDafcGmWGtD4z6J82qtMmZgkD23u_oKY1YGJZtxY9Rqmywu6mGq3XNCvoHQ2lQVCyrdXTRYbSfPJZl6yyz1xOePTo3_3e8e2im8S6eVq8M-qsD8AG2v9RysodtHbSReDVGWcTF1Orb4z2nNDKoZKTn8mb9op9F5Ai1GcKw76nQ-DJdZP0TjbmfU7rnFGAVX4CjI3EAyYYKNikdMBRRAYzRTAnwFgQb7EIAQ3pQUOHBKtLnDkdRLjJs-MEzy4AhV54s5HCPHl34ACstY-lzzAPcVDSWOqYoYTnlUR43VuSai6DFuRl3MEvut0YwTLYnESCIpJFFH1yXHW95f4w_amjnjkq443pPfX1-izd5o0E_6d8OHU7SFjVrYNNszVM3el3CunYksvbA69AUNlMUU |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimal+Attack+Energy+Allocation+against+Remote+State+Estimation&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Peng%2C+Lianghong&rft.au=Shi%2C+Ling&rft.au=Cao%2C+Xianghui&rft.au=Sun%2C+Changyin&rft.date=2018-07-01&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=63&rft.issue=7&rft.spage=2199&rft.epage=2205&rft_id=info:doi/10.1109%2FTAC.2017.2775344&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TAC_2017_2775344 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon |