Please use this identifier to cite or link to this item:

Optimal denial-of-service attack scheduling with energy constraint

Authors Zhang, Heng
Cheng, Peng
Shi, Ling View this author's profile
Chen, Jiming
Issue Date 2015
Source IEEE Transactions on Automatic Control , v. 60, (11), November 2015, article number 7054460, p. 3023-3028
Summary Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules. © 1963-2012 IEEE.
ISSN 0018-9286
Language English
Format Article
Access View full-text via DOI
View full-text via Scopus
View full-text via Web of Science