DocumentCode
3601488
Title
Optimal Denial-of-Service Attack Scheduling With Energy Constraint
Author
Heng Zhang ; Peng Cheng ; Ling Shi ; Jiming Chen
Author_Institution
State Key Lab. of Ind. Control Technol., Zhejiang Univ., Hangzhou, China
Volume
60
Issue
11
fYear
2015
Firstpage
3023
Lastpage
3028
Abstract
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules.
Keywords
computer network security; estimation theory; optimisation; scheduling; CPS security; DoS attack; IDS; cyber-physical system security; energy-constrained attacker; expected average estimation error maximization; intrusion detection system; optimal Denial-of-Service attack scheduling; remote estimator; Channel estimation; Computer crime; Estimation error; Schedules; State estimation; Wireless communication; Wireless sensor networks; DoS attack; State estimation; energy constraint; state estimation;
fLanguage
English
Journal_Title
Automatic Control, IEEE Transactions on
Publisher
ieee
ISSN
0018-9286
Type
jour
DOI
10.1109/TAC.2015.2409905
Filename
7054460
Link To Document