Abstract

Recently, public attention is thoroughly aroused as to the security threats of Cyber-Physical Systems (CPS), which can seriously disrupt the system operation. In order to analyze the impact of potential cyber-attacks, one needs to investigate the attack scheduling strategy from the attacker's perspective. In this paper, we investigate the optimal attack schedules to degrade the system performance through multiple interactive channels against remote state estimation, which is different from the studies through multiple independent channels. Specifically, a channel is affected when the attacker launches an attack on another one, causing two different loss rates of the data package. Based on this, we represent the estimation error covariance of the remote estimator. Then we give the optimal jamming attack schedule theoretically. Finally, the effectiveness of the theoretical results is shown by numerical simulations.

Highlights

  • Cyber-Physical Systems are agents with integrated control, communication, computation

  • Based on the attacker’s model knowledge, disclosure and disruption resources, cyber-attacks can be categorized into Denial-of-Service (DoS) attack, replay attack, false data injection attack, zero dynamics attack, covert attack and eavesdropping attack [7], [10]

  • We investigate the optimal attack schedules to degrade the system performance through multiple interactive channels, which is different from the above studies through multiple independent channels

Read more

Summary

INTRODUCTION

Cyber-Physical Systems are agents with integrated control, communication, computation. DoS attack aims to cause random loss of transmitted data by jamming the wireless communication channels to block the exchange of information between the system components, which is the most reachable attack [11]–[13]. L. Wu et al.: Optimal Jamming Attack Scheduling of Interactive Channels is only one channel to transmit data [23]. Paper [23] firstly uses two sensors to observe a system, and transmits data to remote estimator through two independent wireless channels. The main contribution of this paper is to construct the optimal jamming attack schedules when data packets are transmitted through two interactive wireless channels.

ATTACK MODEL
PROBLEM FORMULATION
ILLUSTRATIVE EXAMPLES
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call