4.7 Article

Optimal Denial-of-Service Attack Scheduling With Energy Constraint

Journal

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
Volume 60, Issue 11, Pages 3023-3028

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2015.2409905

Keywords

DoS attack; energy constraint; state estimation

Funding

  1. NSFC [U1401253]
  2. National Program for Special Support of Top-Notch Young Professionals
  3. Fundamental Research Funds for Central Universities [2014XZZX003-25, NCET-11-0445]
  4. HKUST Caltech Partnership [FP004]

Ask authors/readers for more resources

Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available