Loading [MathJax]/jax/output/HTML-CSS/jax.js
A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Ya Zhang, Lishuang Du and Frank L. Lewis, "Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1225-1234, Sept. 2020. doi: 10.1109/JAS.2020.1003285
Citation: Ya Zhang, Lishuang Du and Frank L. Lewis, "Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1225-1234, Sept. 2020. doi: 10.1109/JAS.2020.1003285

Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks

doi: 10.1109/JAS.2020.1003285
Funds:  This work was supported by the National Natural Science Foundation (NNSF) of China (61973082) and Six Talent Peaks Project in Jiangsu Province (XYDXX-005)
More Information
  • In this paper, denial of service (DoS) attack management for destroying the collaborative estimation in sensor networks and minimizing attack energy from the attacker perspective is studied. In the communication channels between sensors and a remote estimator, the attacker chooses some channels to randomly jam DoS attacks to make their packets randomly dropped. A stochastic power allocation approach composed of three steps is proposed. Firstly, the minimum number of channels and the channel set to be attacked are given. Secondly, a necessary condition and a sufficient condition on the packet loss probabilities of the channels in the attack set are provided for general and special systems, respectively. Finally, by converting the original coupling nonlinear programming problem to a linear programming problem, a method of searching attack probabilities and power to minimize the attack energy is proposed. The effectiveness of the proposed scheme is verified by simulation examples.

     

  • WIRELESS sensor networks (WSNs), which are interconnected by a large number of cooperative wireless sensor nodes, have been extensively applied in many areas [1]. The optimal estimation algorithms based on minimum mean square error, such as Kalman filtering and information filtering, are often used in WSN state estimation for obtaining accurate estimate [2]–[7]. However, due to the wireless communication characteristics of WSNs, attackers can easily monitor the channels in the task domain of the network, inject bitstream into the channel, and replay the previously captured packets [8]–[10]. It is important to conduct in-depth research on attacks in sensor networks.

    The research on state estimation of networks under attacks can be classified into two categories: one is secure estimation against attacks, the other is to place the attacks from the standpoint of attackers. Secure estimation in centralized or distributed networks has been studied preliminarily. Chi-square detection and Euclidean detector were used to detect data anomalies caused by attacks [11]–[14]. Scheduling strategies including event triggering strategies were proposed out to mitigate the impact of attacks [15]–[17]. K-means algorithm for classifying trust nodes had also been studied [18]. In [19], a distributed secure estimation problem on GE F404 engine was researched. An efficient distributed resilient estimator and attack detection mechanism for sensor networks under deception attacks on both the system dynamics and sensor intercommunication links were proposed in [20]. A distributed finite-time filter was proposed for discrete time positive systems in sensor networks under random deception attacks [21]. Du et al. [22] studied distributed state estimation problem under deception attacks and denial of service (DoS) attacks, and proposed a novel alternating direction method of multipliers (ADMM)-based distributed state estimation method.

    How to allocate attacks is another hot topic [23]–[29]. DoS attacks can cause network congestion and packet losses, which makes the remote estimator difficult to obtain uniformly bounded state estimation errors in the network. Qin et al. [23] studied the optimal attack scheduling scheme of the energy-constrained attacker in packet-dropping networks. The corresponding time-centralized attack strategies were given to maximize the trace of the average estimation error and the terminal estimation error. Similarly, using the Markov decision process, Ding et al. [24] proposed a two-player zero-sum stochastic game framework to investigate such a situation: sensors need to select a single channel to send data packets and reduce the possibility of being attacked; at the same time, attackers need to determine the attacked channel under the constraints of energy budget. Cao et al. [25] proposed a probabilistic DoS attack scheme against remote state estimator over a Markov channel in cyber-physical systems. Li et al. [26] designed an attack jamming approach on remote state estimation in cyber-physical systems by using a game theory. Zhang et al. [27], [28] studied a scenario, in which the optimal attack power allocation of energy-constrained DoS attackers to maximize the terminal estimation error was discussed. An attack power allocation mechanism with low cost was put forward. A dynamic attack energy disposal algorithm with ascertained attack capability in each period was also designed. In relevant works, most of the considerations focus on DoS attacks in single channel between the sensor and the remote estimator. Few researches have discussed DoS attack allocation in multiple channels of cooperative sensor networks. In [23] an attack scheduling approach was proposed to maximize the sum of the estimation errors of two remote estimators corresponding to two sensors, with the assumption that each sensor was completely observable. Yang et al. [29] studied DoS attack arrangement within an energy budget in centralized state estimation, and proposed a selection scheme of which sensor to be attacked under the assumption that different kinds of sensors are completely observable.

    Although the DoS attack allocation problem has attracted wide attention [23]–[29], to the best of our knowledge, the problem of DoS attack scheduling in collaboratively working sensor networks has not been well addressed in the literature. The main difficulties may come from the following two aspects.

    1) The network is composed of multiple heterogeneous sensors and single sensor is not necessarily observable. Unlike previous works [23], [27], [28], where the steady-state value is used to update estimation when there is no attack, in this paper each sensor transmits its measurement and the remote estimator uses the received measurements to update estimation. The existing attack scheduling schemes for remote estimator with one observable sensor cannot be applicable.

    2) The attack probabilities and attack energy to be exerted by the attacker to the sensors can be different. The function of the packet dropout probability about attack energy is nonlinear and there is trade-off between collective observability and attack energy. Hence the attack scheduling problem is a nonlinear programming problem with high complexity and computation.

    This paper focuses on designing a stochastic scheduling and attack power allocation scheme from the perspective of the energy-constrained DoS attacker, so as to influence the estimation of the collaboratively working sensor network with minimum attack energy cost. An allocation scheme consisting of three steps is proposed. The contributions of this paper contain the following.

    1) Unlike attack allocation in single sensor’s communication [23]–[28], in sensor networks, multiple sensors’ channels should be attacked. The minimum number of channels needed to attack and how to select the channels are given.

    2) A necessary condition and a sufficient condition on the packet loss probabilities of the attacked channels such that the mean square estimation error of the estimator is divergent are provided.

    3) The optimal attack probabilities and attack power with minimum energy consumption to destroy the collective observability of the network are proposed.

    The rest of this paper is arranged as follows. Section II formulates the filter in WSNs and DoS attack model, and states an overview of the problem. In Section III, the minimum number of channels needed to attack and how to select the channels are firstly given, and then the conditions of the packet loss probabilities making the estimation error divergent are provided for general and special systems respectively. In Section IV the optimal attack probability and power with minimum energy consumption are discussed. Finally, in Section V, the simulation results verify the effectiveness of the attack mechanism.

    Notations: Rn denotes the set of n dimensional vectors over real numbers and Rm×n is the set of real matrices with m rows and n columns. Z+ denotes the set of positive integers. We write X0 to denote that X is positive semi-definite. E{} represents the mathematical expectation. tr () and ρ() stand for the trace and spectral radius of matrix, respectively. r denotes the largest integer that does not exceed r, rR. Pr() means the probability. |S| stands for the cardinality of set S. dim() denotes the dimension of space. x(i) denotes the ith element of vector x. diag{Ri,i=1,,n} denotes a diagonal matrix with diagonal blocks Ri,i=1,,n. col{Ci,i=1,,n} is a short form of matrix [CT1,,CTn]T.

    In this section, the target’s system model, the sensor network, the impacts of DoS attacks, and the optimal attack allocation problem are formulated.

    Consider a linear time-invariant system to be monitored:

    xk+1=Axk+vk (1)

    where xkRnx is the state vector of the system at time k, nxZ+, k=0,1,2,. A is the system matrix; vkRnx is the process white Gaussian noise with covariance Q>0. The initial state x0 is a Gaussian random vector with zero mean and covariance Π00.

    A sensor network composed of N sensors is used to measure the system. The sensor set is described as V={sii=1,2,,N}. These sensors have the ability to measure, calculate and communicate. The measurement of sensor si at time step k is obtained with the following form:

    zi,k=Cixk+wi,k (2)

    where zi,kRnzi is a measurement vector for target system, nziZ+; Ci is the measurement matrix; wi,kRnzi is a zero-mean white Gaussian noise with covariance matrix Ri>0, and w1,k,,wN,k, vk are uncorrelated.

    Assumption 1: The system matrix A is known and the system is not necessarily Schur stable. (A,Q12) is controllable. (A,Ci) is not necessarily detectable but (A,C) is detectable, where C=[CT1,CT2,,CTN]T.

    A centralized information Kalman filter is adopted in the remote estimator to estimate the state of the target. Sensors in the network transmit their innovation vectors CTiR1izi,k and innovation matrices CTiR1iCi to the remote estimator, which updates the state estimate by the information received. Denote Ωk and Ω+k as the a priori and a posteriori information matrices of the estimator, respectively, Pk and P+k as the a priori and a posteriori covariance matrices in Kalman filter, respectively. Then, Ωk=(Pk)1, Ω+k=(P+k)1. Similarly, the a priori and a posteriori estimation state vectors of the estimator are denoted as xk and x+k.

    Assumption 2: All sensors are clock synchronized and there is no communication delay in the network. When there is no attack in the network, there is no packet dropout. The packet that each sensor transmits at each time instant consists of L bits and the transmission error is of bit-to-bit independent.

    The estimator firstly computes the a priori information matrix and vector as following:

    Ωk=[A(Ω+k1)1AT+Q]1 (3)
    xk=Ax+k1. (4)

    Then, the information fusion center updates the a posteriori estimate by using the received information [5]

    Ω+k=Ωk+siV0kCTiR1iCi (5)

    and

    x+k=(Ω+k)1(Ωkxk+siV0kCTiR1izi,k) (6)

    where V0k denotes the set of sensors whose packets are successfully received at time k.

    There exists an attacker in the network. The purpose of the attacker is to occupy the communication bandwidth by DoS attack, which jams some channels between sensors and the remote estimator and increases the packet loss probabilities. Under DoS attacks, the remote estimator may not estimate the system state successfully.

    If the communication channel from sensor si to the estimator is attacked by the attacker, from [30] its SNR (signal-to-noise ratio) is

    ρi=δsGsδaiGa+σ2 (7)

    where Ga is the channel gain from the attacker to the remote estimator and Gs is that from a sensor to the estimator. δs is the transmission power of sensors. δai is the attack power statically assigned to the channel. σ2 is the noise power and δsGsσ2.

    The transmitted packet of each sensor consists of multiple bits, and only if every bit is received correctly, the packet is considered as successfully received. Then from Assumption 2, the probability of one packet reception is described as [28]

    μi=[1Q(2ρi)]L (8)

    where Q(x)=1/2πxet2/2dt. Therefore, under the DoS attack, the packet in sensor si’s communication channel is randomly dropped with probability

    pi=1μi. (9)

    When sensor si’s channel is not invaded, which means δai=0, the packet dropout probability is pi=1μiδai=0, which is very close to zero. This fact conforms to Assumption 2 that when there is no attack, the packet loss probability is zero.

    Considering a limited energy budget, there is no need for the attacker to keep implementing DoS attacks to one channel with high attack power at every time. Therefore, we consider the stochastic attack mechanism satisfying the following assumption.

    Assumption 3 (Attack Rule): The attacker randomly exerts DoS attacks to part of transmission channels with certain fixed probabilities and power.

    Under the stochastic DoS attack scheme, each channel is inflicted by attack with some probability. Define γi (0γi1, i=1,2,,N) as the probability that sensor si’s communication channel is attacked. Let θi,k denote the attacked status of sensor si’s channel. If the channel from sensor si to the center suffers from jamming at time k, θi,k=1; otherwise, θi,k=0. Obviously, Pr(θi,k=1)=γi. This paper focuses on allocating intruded channels by appropriate probabilities γi and attack power δai (i=1,2,,N) to destroy the estimation of the estimator with the minimum cost.

    Being exposed to attack results in significantly increased packet loss probability. We define another variable di,k to indicate whether the packet of sensor si is successfully received by the remote estimator at time k, where if the packet on the channel from sensor si to the estimator is not received successfully at time k, di,k=1; otherwise, di,k=0.

    Due to the stochastic properties of the attacks and packet losses, di,k can be modeled by a Bernoulli process with distribution

    di,k={1,withprobabilityγipi0,withprobability1γipi. (10)

    The block diagram for the sensor network under attack is shown in Fig. 1.

    Figure  1.  The estimation network under attack

    The attacker’s intention is to prevent the remote estimator from obtaining the effective state estimate with a bounded mean square estimation error. Since the packets of the sensors are lost randomly, the DoS attacker aims at making the trace of the mathematical expectation on a prior covariance matrix Pk unbounded, and meanwhile, minimizing the attack energy consumed. During a long period T, the number of time steps that sensor si’s transmission channel is attacked can be approximated to γiT, and thus the attack power allocated in this channel is γiTδai. Hence, the problem above can be summarized as follows:

    Problem 1:

    minNi=1γiδais.t.limktrE{Pk}.

    In the following sections, we will investigate how to select γi and δai (i=1,2,,N) to solve Problem 1.

    Remark 1: It should be noted that considering a control input signal for the system does not affect the problem formulation if the control input is known to the estimator.

    To solve Problem 1, we can search the optimal attack probabilities and power by using the condition of limktr E{Pk}. It is a nonlinear programming problem with high complexity and computation. To reduce the complexity and computation, we will solve Problem 1 from three steps. The first step is to look for the minimum number and further the placement of channels to be attacked. Given the attacked node set, the second step is to investigate the conditions on the packet loss probabilities such that the covariance is unbounded. The last step is to search the attack probabilities and power based on the packet loss probability conditions to minimize the energy consumed. In this section, we will discuss the first and the second steps in order.

    To begin with, we give the equation of the expected covariance matrix.

    Define V0k={si|iV,di,k=0} as the set of the sensors successfully sending information to the remote estimator at time k. Besides, Vdk={si|iV,di,k=1} denotes the set of sensors whose packets are dropped at time k. At any time k, V=V0kVdk.

    Define zk=col{zi,k,siV0k} as the augmented vector collecting the sensors’ measurements that are successfully transmitted to the processing center at time k, ˉCk=col{Ci,siV0k} as the collective measurement matrices of the corresponding sensors, and ˉRk=diag{Ri,siV0k}.

    Therefore, from (3), (5), and the Matrix Inversion Lemma, we obtain

    Pk+1=APkAT+QAPkˉCkT×(ˉCkPkˉCkT+ˉRk)1ˉCkPkAT (11)

    and its expected value is

    E{Pk+1}=E{APkAT+QAPkˉCTk×(ˉCkPkˉCkT+ˉRk)1ˉCkPkAT}. (12)

    Let J1,J2,,J2N stand for all possible node sets V0k, ˜J={Jt:t=1,2,,2N} represent the set including all the possible sets Jt,t=1,2,,2N. For convenience, we denote ˉCkand ˉRk as CJt=col{Cjl,1ls} and RJt=diag{Rj1,Rj2,,Rjs} respectively when V0k=Jt={j1,j2,,js}. From the stochastic properties of di,k, we have

    Pr(V0k=Jt)=iJt(1γipi)jJtγjpj. (13)

    Then, the mathematical expectation expression of state error covariance satisfies the following equation:

    E{Pk+1|Pk}=jVγjpjAPkAT+Q+Jt˜JiJt(1γipi)jJtγjpj[APkAT+QAPkCTJt(CJtPkCTJt+RJt)1CJtPkAT)] (14)

    where denotes the empty set.

    For formulation convenience, we define operators g(Jt),Jt˜J as follows: when Jt,

    g(PkJt)=APkAT+QAPkCTJt(CJtPkCTJt+RJt)1CJtPkAT (15)

    when Jt=,

    g(PkJt)=APkAT+Q. (16)

    Therefore,

    E{Pk+1|Pk}=Jt˜JiJt(1γipi)jJtγjpjg(PkJt). (17)

    To destroy the observability of the entire network for the sake of preventing the estimator from obtaining effective state estimation, at least a certain number of channels are required to attack. This subsection discusses the minimum number of attacked channels to destroy the collective observability of the network. An effective way to enhance the aggressivity and reduce the energy of the attacker is to select fixed channels to attack. For design simplicity, we consider the attack model satisfying the following assumption.

    Assumption 4: The attacker is allocated to attack fixed sensors’ channels.

    In the following part, the existence of the minimum number of attacked channels is investigated by the concept of network collaborative observability. Before discussion, the concept of undetectable subspace should be introduced. Let the unstable subspace of system matrix A be expressed as U(A). In Assumption 1, A is assumed to be not Schur stable. Consequently U(A) is not empty. The undetectable subspace of sensor si is defined by

    Ui={xRnxCiAlx=0,l=0,1,,nx1}{xxU(A)}. (18)

    For any node subset VsV, the undetectable subspace of Vs is defined by

    UVs=iVsUi. (19)

    Proposition 1: For system (1) and sensor networks satisfying Assumptions 1–4, there is a minimum number of channels needed to be attacked. Once the number of the attacked channels is less than it, the estimation error of the estimator must be bounded in mean square. The minimum number mmin is equal to

    mmin=min{|Vs|:UV/Vs}. (20)

    Proof: Assume there are m nodes’ channels suffering from random attacks, whose set is denoted as Sa={sa1,sa2,,sam}, and m<mmin. Then from the form of (20), we have that UV/Sa=, which means that even all channels of nodes in Sa are attacked and the packets on them are dropped, the network is still collectively observable. Then, by applying the Kalman information filtering algorithm, the estimation error is bounded. So, the effective number of attacked channels m should be larger than mmin.

    When m=mmin, select one node set in {VsV: UV/Vs,|Vs|=mmin} to be attacked. Then, if sufficiently large attacks are allocated, the attacked channels are nearly always dropped, which can make the estimation error of the network unbounded. ■

    Remark 2: We can search mmin by sorting the node sets according to the cardinality and bisection method. By verifying the condition UV/Vs, we can also obtain an effective attacked node set with minimum cardinality. Single or multiple sets may satisfy the requirement after filtration. Here, we choose the set V to make UV/V have the worst stability, i.e., through structural decomposition, the unobservable part of system (A,CV/V) has the maximum spectral radius, which represents the maximum value of the eigenvalues’ modulus.

    To simplify the problem, in the following, we will fix the possible attacked node set as V, which is designed according to Remark 2. Renumber the nodes in V as 1,2,,m, m=mmin. Then, there are M=2m possible node sets J1,,JM, in which each node successfully transmits its information to the center, and for any Js˜J (1sM), V/JsV. Correspondingly, rJs=iJs(1λi)jJsλj, λi=γipi denotes the probability of packet loss on the communication channel of si, where pi is defined in (9).

    In this subsection, we mainly investigate the condition of the packet loss probabilities on the channels of the nodes in V such that limktr E{Pk}. We firstly give an important lemma.

    Lemma 1: The sequence

    Pk+1=Ms=1rJsg(PkJs) (21)

    is convergent and bounded, if and only if there exist a symmetric positive definite matrix X and matrices YJs, s=1,2,,M, such that Ω(λ1,λ2,,λm)<0, where rJs=iJs(1λi)jJsλj, g(Js) is defined in (15), Ω(λ1,λ2,,λm) is defined in (22) (show at the bottom of this page).

    Proof: According to the Schur complement lemma, Ω(λ1,λ2,,λm)<0 is equivalent to that there exist positive definite matrix ˉP and matrices ˉFJs such that the following inequality holds

    ˉP>Ms=1rJs[(AˉFJsCJs)ˉP(AˉFJsCJs)T]. (23)

    Necessity: If the sequence (21) is convergent, there exists ˉP>0 such that ˉP=Ms=1rJsg(ˉPJs), which implies when ˉFJs=AˉPCTJs(CJsˉPCTJs+RJs)1, the inequality (23) holds.

    Sufficiency: Firstly, we prove that when Ω(λ1,λ2,,λm) < 0 is feasible, the sequence is bounded.

    Define linear operators

    f(P)=Ms=1rJs(AˉFJsCJs)P(AˉFJsCJs)Tϕ(¯K,P)=Ms=1rJs[(AˉKJsCJs)P(AˉKJsCJs)T+ˉKJsRJtˉKTJs]+Q

    where ˉFJs is the gain satisfying (23), ˉK={ˉKJs,1sM}, and ˉKJs is the gain. Obviously, the operator f is linear and non-decreasing with P. For any given P0>0, there exists a positive constant α1 such that P0α1ˉP. Choose 0<β<1 such that f(ˉP)βˉP. Then

    f(P0)f(α1ˉP)=α1f(ˉP)α1βˉP

    and thus

    fk(P0)α1βfk1(ˉP)α1β2fk2(ˉP)α1βkˉP.

    Since when ˉKJs=APkCTJs(CJsPkCTJs+RJs)1, ϕ(ˉK,Pk) is minimum, we have

    Pk+1ϕ(¯F,Pk)=f(Pk)+Ufk(P0)+k1t=0ft(U)α1βkˉP+k1t=0α2βtˉP(α1+α21β)ˉP

    where ˉF={ˉFJs,1sM}, U=Ms=1rJsˉFJsRJsˉFTJs+Q, and α2 is a positive constant satisfying Uα2ˉP.

    Ω(λ1,λ2,,λm)=[XrJ1(XAYJ1CJ1)rJ2(XAYJ2CJ2)rJM(XAYJMCJM)XXX] (22)

    Secondly, we prove its convergence. For sequence {˜Pk,k0} satisfying (21), when ˜P0=0, we have ˜P1=Q˜P0. And then by the fact that g is a monotonically non-decreasing operator, ˜P2Ms=1rJsg(˜P0Js)˜P1. From a simple inductive argument, we have that the sequence is monotonically non-decreasing and bounded. It is obvious that the sequence converges, i.e., limk˜Pk=ˉP, where ˉP is a positive semi-definite solution of equation ˉP=Ms=1rJsg(ˉPJs).

    For sequence {ˆPk,k0} satisfying (21) and ˆP0ˉP, ˆP1=Ms=1rJsg(ˆP0Js)ˆP0. Similarly, for any k0, ˆPkˆP0. Let ˉFJs=AˉPCTJs(CJsˉPCTJs+RJs)1, we have

    0ˆPk+1ˉPϕ(¯F,ˆPk)ϕ(¯F,ˉP)=f(ˆPkˉP).

    Since the operator is stable, i.e., limkf(ˆPkˉP)=0, when ˆP0ˉP, the sequence {ˆPk,k0} also converges to ˉP.

    Under any initial condition P0, there exists ˆPˉP such that 0P0ˆP. From the properties of operator ϕ,

    ˜P1=Ms=1rJsg(0Js)P1=Ms=1rJsg(P0Js)ˆP1=Ms=1rJsg(ˆP0Js)

    and similarly the sequences under these three initial conditions satisfy that ˜PkPkˆPk. Since both ˜Pk and ˆPk converge to ˉP, under any initial condition the sequence Pk converges to ˉP as well. This lemma has been proved. ■

    Lemma 1 gives a necessary and sufficient condition for the convergence of the algebraic Riccati equation (21). By using Lemma 1, we can obtain the following probability conditions making the estimation error unstable.

    Proposition 2: For system (1) and sensor networks under Assumptions 1–4, fix the possible attacked node set as V. The attacker can successfully destroy the estimation of the center, i.e., limktrE{Pk}, if the attack probabilities and attack power make rJ1ρ2(AUJ1)1, and only if the LMI Ω(λ1,λ2,,λm)<0 is unfeasible, where J1=V/V, AUJ1 denotes the undetectable part of system matrix A from observability structural decomposition of (A,CJ1).

    Proof :

    Sufficiency: Define the node set J1=V/V. From the definition of V, it is obvious that UJ1. Since the channels of the sensors in J1 are not attacked, from (17), we have

    E{Pk+1Pk}rJ1(AFJ1,kCJ1)Pk(AFJ1,kCJ1)T+Q

    where FJ1,k=APkCTJ1(CJ1PkCTJ1+RJ1)1. If rJ1ρ2(AUJ1)1, then E{Pk+1} must be divergent, where ρ(AUJ1) denotes the spectral radius of the undetectable part AUJ1 of node set J1, which can be obtained from observability structural decomposition. The sufficient condition has been proved.

    Necessity: Since the operator g(PkJt) in (16) is concave, by using the Jensen’s Inequality and (17) we have

    E{Pk+1}=Jt˜JrJtE{g(PkJt)}Jt˜JrJtg(E{Pk}Jt). (24)

    From Lemma 1 and the inequality (24), if Ω(λ1,λ2,,λm)<0 is feasible, E{Pk+1} must be bounded. The necessity part has been proved. ■

    Remark 3: Proposition 2 provides a necessary condition and a sufficient condition on the packet loss probabilities λi, 1im, to solve Problem 1. We can directly obtain a suboptimal feasible probability set Λ by verifying the sufficient condition rJ1ρ2(AUJ1)1 and decreasing λ1,λ2,,λm in sequence by fixed step from λ1=λ2==λm=1. To propose a better feasible probability set, the idea of traversal and off-line verification can be used. Firstly, by verifying rJ1ρ2(AUJ1)<1 we get a probability set ¯Λ. Secondly, for (λ1,λ2,,λm)¯Λ, when Ω(λ1,λ2,,λm)<0 is unfeasible, the corresponding probability vector is recorded in the solution set Λ_. By using these two steps, we can narrow the scope of traversal in the third step, in which we implement Monte Carlo simulations of the estimation process by using the probability vectors in Λ_ in sequence. When the average estimation errors have tremendous variations around a probability vector, the corresponding probability vector is recorded in the critical solution set Λ.

    In this subsection, we consider a special case and give explicit probability conditions to solve Problem 1.

    Assumption 5: The system state consists of r modes with a corresponding diagonal form of the system matrix A

    xk+1=[A1Ar]xk+vk (25)

    where Q=diag{Qs,1sr}, ρ(As)1, and (As,Q12s) is controllable. r modes of the system are measured by r different types of sensors. Each sensor belongs to only one type, which observes one mode of the system state vector. Denote Os,s=1,2,,r, as the set of sensors that can detect the sth mode in the system. Define |Os|=ns>0. For any iOs, (As,Ci) is observable.

    Because the network is collaboratively observable, the absence of some key measurements will destroy the observability of the whole network. If we attack all the sensors of one type, the network will be intermittently unobservable, which may make it difficult to obtain a uniformly bounded mean square estimation error. Based on this idea, we can give the explicit minimum number of attackers.

    Proposition 3: For system (25) and networks satisfying Assumptions 2–5, the minimum number of attacked communication channels is mmin=min1sr{ns}. Once the number of attacked channels is less than mmin, the estimation error of the estimator must be bounded in mean square sense.

    Proof: The proof is similar to that of Proposition 1. When m<mmin, for any mode of the system there exists at least one sensor to measure it and the network is always collectively observable, which can ensure that the estimation error of the remote estimator is bounded. ■

    From the proof of Proposition 3, to minimize the attack power, it is better to place the attacks to the nodes of the same type. In the following, we will give an explicit sufficient condition and necessary condition on the packet loss probabilities to solve Problem 1.

    Proposition 4: For system (25) and networks satisfying Assumptions 2–5, the attacker can successfully destroy the estimation of the center, if there exists a system mode s (1sr), fix the possible attacked node set as Os, the attack probabilities and attack power make the packet loss probabilities satisfy that

    siOsλi1ρ2(As) (26)

    and only if there exists a system mode s,1sr, such that

    siOsλi1|λu(As)|2 (27)

    where λu(As) stands for unstable eigenvalues of As.

    Proof: For system (25), the equation of the covariance can also be decoupled. Assume the attacked node set is Os, define P(s)k as the covariance matrix corresponding to the sth mode, then

    E{P(s)k+1|P(s)k}=jOsλjAsP(s)kATs+Qs+JtOsiJt(1λi)jJtλj[AsP(s)kATsAsP(s)kCTJt(CJtP(s)kCTJt+RJt)1×CJtP(s)kATs)]. (28)

    Sufficiency: From (28) we have that E{P(s)k+1} jOsλjAsE{P(s)k}ATs+Qs. Similar to the proof of Proposition 2, if siOsλi1ρ2(As), then E{P(s)k} is divergent.

    Necessity: Define ˉP(s)k=E{P(s)k}. From (28) and the proof of Proposition 2, we have

    ˉP(s)k+1jOsλjAsˉP(s)kATs+Qs+(1jOsλj)[AsˉP(s)kATsAsˉP(s)kCTos×(CosˉP(s)kCTos+Ros)1CosˉP(s)kATs)].

    where os denotes any one node in Os, and for any iOs, Ci=Cos, Ri=Ros.

    From [31] and [32], if jOsλj<1|λu(As)|2, the sequence ˉP(s)k will be bounded. ■

    Remark 4: For all nodes in Os, it is optimal to allocate uniform packet loss probability to minimize the sum of their probabilities and guarantee the necessary condition and the sufficient condition in Proposition 4. Define os as one node in Os and assume for iOs, λi=λos. From Proposition 4 we can obtain a lower bound λ_s and an upper bound ˉλs of the optimal probability λs to make the estimation error of the estimator divergent when the node set Os is attacked, i.e., λ_s=1/|λu(As)|2ns, ˉλs=1/(ρ(As))2ns. Then, we implement Monte Carlo simulations of the estimation process by using the probabilities in [λ_s,ˉλs] in sequence and look for the critical probability λs. Although placing attacks to the minimum number of channels can reduce the cost of attack energy to a certain extent, it is not necessarily the optimal solution since the probability condition depends on the system mode As as well. We can search an attack node set Os to minimize the sum of the packet loss probabilities nsλs, i.e., s=argmin1sr{nsλs}. The critical probability vector corresponding to the node set is recorded as set Λ.

    In this section, an attack node set V and a universally applicable approach to finding feasible probability set Λ have been given. In the next section, we will discuss how to design the attack probabilities and power to minimize the overall attack energy.

    In the above section, we have solved the first two steps of the stepwise solution to Problem 1. In this section, the third step, which aims at finding the minimum of siVγiδai based on the first two steps, will be discussed.

    From Section II-B, the probability of the packet loss on the channel is positively correlated with the attack power. We use a function ψ() to briefly represent this relationship, i.e., pi=ψ(δai), where the form of the function ψ() can be obtained by (7)–(9). Since the DoS attacker injects attacks to the communication channel of si with a probability γi at any time step, we obtain λi=γipi=γiψ(δai) accordingly.

    Provided that the placement of attacks V and the feasible packet loss probability set Λ have been given by Remark 2 and Remark 3 (or by Remark 4 for special systems), in the following we investigate the optimal attack power δai and attack probability γi in the feasible packet loss probability set Λ to minimize the attack energy iVγiδai.

    Replacing γi by λi/ψ(δai), the cost function λiδai/ψ(δai) just depends on δai and Problem 1 is simplified to the following problem.

    Problem 2:

    minsiVλiδaiψ(δai) (29)
    s.t.0λiψ(δai)1 (30)
    δa10,,δam0 (31)
    (λ1,,λm)Λ (32)

    where the attack sensor set V is obtained by Remark 2; the set of critical probability vector Λ is obtained by Remark 3 or Remark 4.

    The packet loss probability λi and attack energy depend on both γi and δai. We firstly give an example to show the relationships among the packet loss probability λi, attack power δai, attack probability γi, and energy γiδai. Define the parameters in (7) and (8) as Gs=Ga=1,δs=10,σ=0.1,L=32. The impact of attack parameters γi and δai on attack energy and packet loss probability λi is shown in contour overlap sketch map in Fig. 2. Here dotted lines represent the contours of packet loss probability and solid lines represent that of attack energy. The x-axis indicates attack possibility γi within the range from 0 to 1; the y-axis indicates attack power δai. In Fig. 2, both the packet loss probability and attack energy decline from upper-right to lower-left. Moreover, for fixed λi (represented by a red dotted line), we can always find an optimal solution δai to minimize the energy under the condition that 0λi/ψ(δai)1.

    Figure  2.  Contour overlap sketch map

    Remark 5: To solve Problem 2, we can look for parameters to minimize λiδai/ψ(δai) under condition (30) for fixed λi and search the global optimal parameters by testing all feasible probabilities in Λ.

    By solving Problem 2, the original nonlinear programming problem with high complexity and high coupling is simplified to a linear programming problem with largely reduced difficulties. Moreover, in Problem 1 two optimal coupled attack parameters for each channel should be searched while in Problem 2, just one parameter δai is required to be considered. This solution may be a suboptimal solution of Problem 1. However, the complexity in solving Problem 1 has been reduced considerably.

    We firstly verify the effectiveness of the allocation mechanism for general systems. In this part, we consider a military gas turbine engine as the target model. In order to evaluate and monitor the state information of the engine, an on-board engine monitoring system [33] is used.

    Three incompletely observable sensors send information to process center and the network parameters in (7) and (8) are given as Gs=Ga=1,δs=10,σ=0.1,L=32. According to [33], a discrete-time model of the engine system is concerned as follows:

    x(k+1)=[0.867300.20220.01450.96080.03160.025900.8032]x(k)+[0.01650.07890.0177]vk.

    The measurement matrices of sensors are C1=[0 1 1], C2=[1 1 0] and C3=[0 0 1]. Obviously, we get V={s2}. The effect of attack is shown in Fig. 3. When the channel between sensor s2 and the estimator is attacked by the attacker, the estimation error increases largely.

    Figure  3.  Estimation errors with and without DoS attack: engine monitoring system.

    When the system has an unstable eigenvalue, the same attack results in more lethal effect. When A=[1.089000.20220.01450.96080.03160.025900.8032], according to Proposition 2, λ0.8234 is obtained. The optimal solution for attack energy is then obtained with γ=1,δa=7.5325. Meanwhile, the traces of the estimation error covariance matrices with and without DoS attack are shown in Fig. 4. Obviously, the attack strategy is effective.

    Figure  4.  Estimation errors with and without DoS attack: general unstable case

    In this subsection, we consider a system with diagonal form and there are 4 incompletely observable sensors sending information to the process center through communication channels, where the monitoring process of the smart grid is studied. In the smart grid, some separate self-generating areas can be regarded as independent power agents ([21]). The system is A=[1.010.11360000.382500000.42370.53460001.5] and the sample time is T=0.1s. Each mode of the system state represents the power distribution of an agent, which is detected by a sensor, and there are couplings between agents. Sensor si is only available to agent i. For simple expression, four state components xk(i),1i4, respectively stand for the power distributions of agents 1, 2, 3 and 4.

    The system has two diagonal blocks, thus we easily get mmin=2 based on Proposition 3. O1={s1,s2} and O2={s3,s4}.

    From Proposition 4, we obtain the optimal packet loss probability λ3=λ4=1/1.4692 with V=O2. By solving Problem 2, the optimal attack parameters are γ3=γ4=1,δa3=δa4=7.6821, respectively. It is noteworthy that if we choose V=O1, more attack energy will be consumed with γ1=γ2=1,δa1=δa2=8.4678. The traces of the estimation error matrices with existence and absence of DoS attack are shown in Fig. 5. It is shown that the proposed attack scheme deteriorates the estimation performance.

    Figure  5.  Estimation errors with and without DoS attack: special case

    In this paper, a suboptimal stochastic DoS attack mechanism is designed to destroy the centralized state estimation in wireless sensor networks, which makes the estimation error of the system unbounded with minimum energy consumption. The mechanism is composed of three steps, where the attack node set, the feasible induced packet loss probability set, and the attack probabilities and power are proposed in sequence. This paper focuses on attack management in centralized estimation networks. How to place attacks in distributed estimation networks and delayed networks is of our research interest in future.

  • [1]
    X. M. Zhang, Q. L. Han, X. H. Ge, D. R. Ding, L. Ding, D. Yue, and C. Peng, “Networked control systems: A survey of trends and techniques,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 1, pp. 1–17, Jan. 2020. doi: 10.1109/JAS.2019.1911861
    [2]
    S. L. Sun and Z. L. Deng, “Multi-sensor optimal information fusion Kalman filter,” Automatica, vol. 40, no. 6, pp. 1017–1023, Jun. 2004. doi: 10.1016/j.automatica.2004.01.014
    [3]
    I. Bahceci and A. K. Khandani, “Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation,” IEEE Trans. Commun., vol. 56, no. 7, pp. 1146–1156, Jul. 2008.
    [4]
    Y. L. Mo, R. Ambrosino, and B. Sinopoli, “Sensor selection strategies for state estimation in energy constrained wireless sensor networks,” Automatica, vol. 47, no. 7, pp. 1330–1338, Jul. 2011. doi: 10.1016/j.automatica.2011.02.001
    [5]
    G. Battistelli, L. Chisci, G. Mugnai, A. Farina, and A. Graziano, “Consensus-based linear and nonlinear filtering,” IEEE Trans. Autom. Control, vol. 60, no. 5, pp. 1410–1415, May 2015. doi: 10.1109/TAC.2014.2357135
    [6]
    X. X. Guo, A. S. Leong, and S. Dey, “Estimation in wireless sensor networks with security constraints,” IEEE Trans. Aerosp. Electron. Syst., vol. 53, no. 2, pp. 544–561, Apr. 2017. doi: 10.1109/TAES.2017.2649178
    [7]
    Y. Zhang and Y. P. Tian, “A fully distributed weight design approach to consensus Kalman filtering for sensor networks,” Automatica, vol. 104, pp. 34–40, Jun. 2019. doi: 10.1016/j.automatica.2019.02.052
    [8]
    Y. L. Zou, J. Zhu, X. B. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, Sep. 2016. doi: 10.1109/JPROC.2016.2558521
    [9]
    S. Amin, A. A. Cárdenas, and S. S. Sastry, “Safe and secure networked control systems under denial-of-service attacks,” in Hybrid Systems: Computation and Control, R. Majumdar and P. Tabuada, Eds. Heidelberg, Germany: Springer, 2009, pp. 31-45.
    [10]
    D. Zhang, L. Liu, and G. Feng, “Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and DoS attack,” IEEE Trans. Cybern., vol. 49, no. 4, pp. 1501–1511, Apr. 2019. doi: 10.1109/TCYB.2018.2806387
    [11]
    J. Milosevic, T. Tanaka, H. Sandberg, and K. H. Johansson, “Analysis and mitigation of bias injection attacks against a Kalman filter,” IFAC-PapersOnLine, vol. 50, no. 1, pp. 8393–8398, Jul. 2017. doi: 10.1016/j.ifacol.2017.08.1564
    [12]
    D. W. Shi, R. J. Elliott, and T. W. Chen, “On finite-state stochastic modeling and secure estimation of cyber-physical systems,” IEEE Trans. Autom. Control, vol. 62, no. 1, pp. 65–80, Jan. 2017. doi: 10.1109/TAC.2016.2541919
    [13]
    B. Chen, D. W. C. Ho, G. Q. Hu, and L. Yu, “Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks,” IEEE Trans. Cybern., vol. 48, no. 6, pp. 1862–1876, Jun. 2018. doi: 10.1109/TCYB.2017.2716115
    [14]
    B. Chen, D. W. C. Ho, W. A. Zhang, and L. Yu, “Distributed dimensionality reduction fusion estimation for cyber-physical systems under DoS attacks,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 49, no. 2, pp. 455–468, Feb. 2019. doi: 10.1109/TSMC.2017.2697450
    [15]
    Q. Y. Liu, Z. D. Wang, X. He, and D. H. Zhou, “Event-based recursive distributed filtering over wireless sensor networks,” IEEE Trans. Autom. Control, vol. 60, no. 9, pp. 2470–2475, Sep. 2015. doi: 10.1109/TAC.2015.2390554
    [16]
    W. Yang, L. Lei, and C. Yang, “Event-based distributed state estimation under deception attack,” Neurocomputing, vol. 270, pp. 145–151, Dec. 2017. doi: 10.1016/j.neucom.2016.12.109
    [17]
    A. S. Leong, S. Dey, and D. E. Quevedo, “Transmission scheduling for remote state estimation and control with an energy harvesting sensor,” Automatica, vol. 91, pp. 54–60, May 2018. doi: 10.1016/j.automatica.2018.01.027
    [18]
    F. X. Wen and Z. M. Wang, “Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks,” Digit. Signal Process., vol. 78, pp. 92–97, Jul. 2018. doi: 10.1016/j.dsp.2018.03.002
    [19]
    Y. P. Guan and X. H. Ge, “Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks,” IEEE Access, vol. 5, pp. 10858–10870, Jun. 2017. doi: 10.1109/ACCESS.2017.2713807
    [20]
    X. H. Ge, Q. L. Han, M. Y. Zhong, and X. M. Zhang, “Distributed Krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, pp. 108557, Nov. 2019. doi: 10.1016/j.automatica.2019.108557
    [21]
    S. Y. Xiao, Q. L. Han, X. H. Ge, and Y. J. Zhang, “Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks,” IEEE Trans. Cybern., vol. 50, no. 3, pp. 1220–1229, Mar. 2020. doi: 10.1109/TCYB.2019.2900478
    [22]
    D. J. Du, X. Li, W. T. Li, R. Chen, M. R. Fei, and L. Wu, “ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 49, no. 8, pp. 1698–1711, Aug. 2019. doi: 10.1109/TSMC.2019.2896292
    [23]
    J. H. Qin, M. L. Li, L. Shi, and X. H. Yu, “Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks,” IEEE Trans. Autom. Control, vol. 63, no. 6, pp. 1648–1663, Jun. 2018. doi: 10.1109/TAC.2017.2756259
    [24]
    K. M. Ding, Y. Z. Li, D. E. Quevedo, S. Dey, and L. Shi, “A multi-channel transmission schedule for remote state estimation under DoS attacks,” Automatica, vol. 78, pp. 194–201, Apr. 2017. doi: 10.1016/j.automatica.2016.12.020
    [25]
    X. H. Cao and C. Y. Sun, “Probabilistic denial of service attack against remote state estimation over a Markov channel in cyber-physical systems,” in Proc. 11th Asian Control Conf., Gold Coast, Australia, 2017, 17–20.
    [26]
    Y. Z. Li, L. Shi, P. Cheng, J. M. Chen, and D. E. Quevedo, “Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach,” IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2831–2836, Oct. 2015. doi: 10.1109/TAC.2015.2461851
    [27]
    H. Zhang, P. Cheng, L. Shi, and J. M. Chen, “Optimal Denial-of-Service attack scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023–3028, Nov. 2015. doi: 10.1109/TAC.2015.2409905
    [28]
    H. Zhang, Y. F. Qi, J. F. Wu, L. K. Fu, and L. D. He, “DoS attack energy management against remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 1, pp. 383–394, Mar. 2018. doi: 10.1109/TCNS.2016.2614099
    [29]
    C. Yang, W. Yang, and H. B. Shi, “DoS attack in centralised sensor network against state estimation,” IET Control Theory Appl., vol. 12, no. 9, pp. 1244–1253, Jun. 2018. doi: 10.1049/iet-cta.2017.0819
    [30]
    R. A. Poisel, Modern Communications Jamming: Principles and Techniques. Norwood, USA: Artech House, 2011.
    [31]
    B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and S. S. Sastry, “Kalman filtering with intermittent observations,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453–1464, Sep. 2004. doi: 10.1109/TAC.2004.834121
    [32]
    L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, “Foundations of control and estimation over lossy networks,” Proc. IEEE, vol. 95, no. 1, pp. 163–187, Jan. 2007. doi: 10.1109/JPROC.2006.887306
    [33]
    R. W. Eustace, B. A. Woodyatt, G. L. Merrington, and A. Runacres, “Fault signatures obtained from fault implant tests on an F404 engine,” J. Eng. Gas Turbines Power, vol. 116, no. 1, pp. 178–183, Jan. 1994. doi: 10.1115/1.2906789
  • Related Articles

    [1]Bowen Sun, Xianghui Cao. Optimal Sensor Scheduling for Remote State Estimation With Partial Channel Observation[J]. IEEE/CAA Journal of Automatica Sinica. doi: 10.1109/JAS.2025.125180
    [2]Yifan Zhong, Yuan Yuan, Huanhuan Yuan, Mengbi Wang, Huaping Liu. Multi-Spacecraft Formation Control Under False Data Injection Attack: A Cross Layer Fuzzy Game Approach[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(4): 776-788. doi: 10.1109/JAS.2024.124872
    [3]Haibin Guo, Zhong-Hua Pang, Chao Li. Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 1054-1056. doi: 10.1109/JAS.2023.124086
    [4]Xiaoting Du, Lei Zou, Maiying Zhong. Set-Membership Filtering Approach to Dynamic Event-Triggered Fault Estimation for a Class of Nonlinear Time-Varying Complex Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(3): 638-648. doi: 10.1109/JAS.2023.124119
    [5]Weiwei Sun, Xinci Gao, Lusong Ding, Xiangyu Chen. Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(8): 1865-1876. doi: 10.1109/JAS.2023.124161
    [6]Xueli Wang, Shangwei Zhao, Ming Yang, Xin Wang, Xiaoming Wu. Neural Network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(10): 2182-2184. doi: 10.1109/JAS.2023.123690
    [7]Shuo Zhang, Lei Miao, Xudong Zhao. DoS Attack Schedules for Remote State Estimation in CPSs with two-hop relay networks Under Round-Robin Protocol[J]. IEEE/CAA Journal of Automatica Sinica. doi: 10.1109/JAS.2024.124755
    [8]Jing Zhou, Jun Shang, Tongwen Chen. Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 851-865. doi: 10.1109/JAS.2024.124257
    [9]Zhi-Xin Liu, Xiao-Cao Jin, Yuan-Ai Xie, Yi Yang. Joint Slot Scheduling and Power Allocation in Clustered Underwater Acoustic Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(6): 1501-1503. doi: 10.1109/JAS.2022.106031
    [10]Xiaohua Ge, Qing-Long Han, Qing Wu, Xian-Ming Zhang. Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(5): 1234-1251. doi: 10.1109/JAS.2022.105845
    [11]Haibin Guo, Jian Sun, Zhong-Hua Pang. Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(5): 1181-1191. doi: 10.1109/JAS.2023.123441
    [12]Eman Mousavinejad, Xiaohua Ge, Qing-Long Han, Teng Joon Lim, Ljubo Vlacic. An Ellipsoidal Set-Membership Approach to Distributed Joint State and Sensor Fault Estimation of Autonomous Ground Vehicles[J]. IEEE/CAA Journal of Automatica Sinica, 2021, 8(6): 1107-1118. doi: 10.1109/JAS.2021.1004015
    [13]Xiaobin Gao, Emrah Akyol, Tamer Başar. Communication Scheduling and Remote Estimation With Adversarial Intervention[J]. IEEE/CAA Journal of Automatica Sinica, 2019, 6(1): 32-44. doi: 10.1109/JAS.2019.1911318
    [14]Mayank Agarwal, Sanketh Purwar, Santosh Biswas, Sukumar Nandi. Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System[J]. IEEE/CAA Journal of Automatica Sinica, 2017, 4(4): 792-808. doi: 10.1109/JAS.2016.7510178
    [15]Xiaojuan Chen, Jun Zhang, Tiedong Ma. Parameter Estimation and Topology Identification of Uncertain General Fractional-order Complex Dynamical Networks with Time Delay[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(3): 295-303.
    [16]Zhen Hong, Rui Wang, Xile Li. A Clustering-tree Topology Control Based on the Energy Forecast for Heterogeneous Wireless Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2016, 3(1): 68-77.
    [17]Zhixin Liu, Yazhou Yuan, Xinping Guan, Xinbin Li. An Approach of Distributed Joint Optimization for Cluster-based Wireless Sensor Networks[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 267-273.
    [18]Changqing Xia, Wei Liu, Qingxu Deng. Cost Minimization of Wireless Sensor Networks with Unlimited-lifetime Energy for Monitoring Oil Pipelines[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 290-295.
    [19]Xiaoyuan Luo, Liu Feng, Jing Yan, Xinping Guan. Dynamic Coverage with Wireless Sensor and Actor Networks in Underwater Environment[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 274-281.
    [20]Haiyang Yu, Yisha Liu, Wei Wang. Distributed Sparse Signal Estimation in Sensor Networks Using H-Consensus Filtering[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 149-154.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)

    Article Metrics

    Article views (1684) PDF downloads(114) Cited by()

    Highlights

    • Stochastic DoS attack allocation in networks with multiple sensors is studied.
    • The minimum number of channels needed to attack and how to select them are given.
    • The attack probabilities and power with minimum energy consumption are proposed.

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return