4.6 Article

Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems

期刊

IEEE ACCESS
卷 9, 期 -, 页码 51679-51688

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3046483

关键词

Jamming; Wireless networks; Mathematical model; Resource management; Licenses; Wireless sensor networks; Estimation error; Wireless networked control systems; jamming attack system; mean impact value algorithm; CMIV evaluation model; terminal estimation error

向作者/读者索取更多资源

This study establishes an attack system through the evaluation model of sensor, time allocation of jamming attack, and attack rules. Experimental results show that the good-sensor-late-attack strategy has the best effect.
Recently, public attention is thoroughly aroused as to the security threats of Wireless Network Control System (WNCS), which can seriously disrupt the system operation. In order to achieve the attack effect that each sensor is damaged and maximize the terminal estimation error covariance, it is necessary to study an attack system from the attacker's perspective. In this paper, we establish an attack system, which includes: the multi-sensor importance evaluation model, the time allocation of jamming attack, and the attack rules. Specifically, we firstly establish the wireless network control system model and the jamming attack model. Then, according to the transmission data and channel parameter information which is intercepted by the attackers, we establish an evaluation model of sensor based on the Mean Impact Value (MIV) algorithm. Then, based on the evaluation results of each sensor, we establish a distribution model of the number of attacks on each sensor. Then, we perform two jamming attack rules(continuous attack rule and good-sensor-late-attack rule)to attack each sensor. Finally, we use the attack system to conduct digital simulation experiments in first-order and high-order system. There is no different between the MIV-based sensor evaluation method in the multi-sensor importance evaluation experiment and sensor performance evaluation based on estimation error. In the jamming attack time allocation experiment, effect that every sensor was attacked had been achieved. In the attack rule experiment, we compare the experimental results of continuous attack and discontinuous attack, and the result shows that the effect of continuous attack is better than that of intermittent attack. Similarly, we have conducted comparative experiments on all attack strategies, and the results show that good-sensor-late-attack strategy has the best effect. The effectiveness of the attack system is proved by digital simulation experiment.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据