{"title":"网络物理系统中针对远程估计干扰攻击的优化功率分配","authors":"Hongbao Shi, Xianghui Cao, Changyin Sun","doi":"10.1109/CAC.2017.8244069","DOIUrl":null,"url":null,"abstract":"Recently, the security issues of CPS have attracted much attention from many researchers. Standing on the point of attacker, this work investigates the optimal channel jamming attack against wireless state estimation in CPS with energy constraint. Specifically, we consider that the attacker can jam the wireless channel with various power levels that will cause different sensory packet drop probabilities. We formulate the optimal attacker power allocation problem as to maximize the estimation error covariance under the attacker's power constraint. We theoretically derive the optimal power allocation for the attacker, which is shown resembling a parabola shape along time. Finally, we demonstrate the performance of the proposal allocation scheme through simulations.","PeriodicalId":116872,"journal":{"name":"2017 Chinese Automation Congress (CAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Optimal power allocation for jamming attack against remote estimation in cyber-physical systems\",\"authors\":\"Hongbao Shi, Xianghui Cao, Changyin Sun\",\"doi\":\"10.1109/CAC.2017.8244069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, the security issues of CPS have attracted much attention from many researchers. Standing on the point of attacker, this work investigates the optimal channel jamming attack against wireless state estimation in CPS with energy constraint. Specifically, we consider that the attacker can jam the wireless channel with various power levels that will cause different sensory packet drop probabilities. We formulate the optimal attacker power allocation problem as to maximize the estimation error covariance under the attacker's power constraint. We theoretically derive the optimal power allocation for the attacker, which is shown resembling a parabola shape along time. Finally, we demonstrate the performance of the proposal allocation scheme through simulations.\",\"PeriodicalId\":116872,\"journal\":{\"name\":\"2017 Chinese Automation Congress (CAC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Chinese Automation Congress (CAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAC.2017.8244069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Chinese Automation Congress (CAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAC.2017.8244069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Optimal power allocation for jamming attack against remote estimation in cyber-physical systems
Recently, the security issues of CPS have attracted much attention from many researchers. Standing on the point of attacker, this work investigates the optimal channel jamming attack against wireless state estimation in CPS with energy constraint. Specifically, we consider that the attacker can jam the wireless channel with various power levels that will cause different sensory packet drop probabilities. We formulate the optimal attacker power allocation problem as to maximize the estimation error covariance under the attacker's power constraint. We theoretically derive the optimal power allocation for the attacker, which is shown resembling a parabola shape along time. Finally, we demonstrate the performance of the proposal allocation scheme through simulations.