IEEE/CAA Journal of Automatica Sinica
Citation: | Ya Zhang, Lishuang Du and Frank L. Lewis, "Stochastic DoS Attack Allocation Against Collaborative Estimation in Sensor Networks," IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1225-1234, Sept. 2020. doi: 10.1109/JAS.2020.1003285 |
[1] |
X. M. Zhang, Q. L. Han, X. H. Ge, D. R. Ding, L. Ding, D. Yue, and C. Peng, “Networked control systems: A survey of trends and techniques,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 1, pp. 1–17, Jan. 2020. doi: 10.1109/JAS.2019.1911861
|
[2] |
S. L. Sun and Z. L. Deng, “Multi-sensor optimal information fusion Kalman filter,” Automatica, vol. 40, no. 6, pp. 1017–1023, Jun. 2004. doi: 10.1016/j.automatica.2004.01.014
|
[3] |
I. Bahceci and A. K. Khandani, “Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation,” IEEE Trans. Commun., vol. 56, no. 7, pp. 1146–1156, Jul. 2008.
|
[4] |
Y. L. Mo, R. Ambrosino, and B. Sinopoli, “Sensor selection strategies for state estimation in energy constrained wireless sensor networks,” Automatica, vol. 47, no. 7, pp. 1330–1338, Jul. 2011. doi: 10.1016/j.automatica.2011.02.001
|
[5] |
G. Battistelli, L. Chisci, G. Mugnai, A. Farina, and A. Graziano, “Consensus-based linear and nonlinear filtering,” IEEE Trans. Autom. Control, vol. 60, no. 5, pp. 1410–1415, May 2015. doi: 10.1109/TAC.2014.2357135
|
[6] |
X. X. Guo, A. S. Leong, and S. Dey, “Estimation in wireless sensor networks with security constraints,” IEEE Trans. Aerosp. Electron. Syst., vol. 53, no. 2, pp. 544–561, Apr. 2017. doi: 10.1109/TAES.2017.2649178
|
[7] |
Y. Zhang and Y. P. Tian, “A fully distributed weight design approach to consensus Kalman filtering for sensor networks,” Automatica, vol. 104, pp. 34–40, Jun. 2019. doi: 10.1016/j.automatica.2019.02.052
|
[8] |
Y. L. Zou, J. Zhu, X. B. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, Sep. 2016. doi: 10.1109/JPROC.2016.2558521
|
[9] |
S. Amin, A. A. Cárdenas, and S. S. Sastry, “Safe and secure networked control systems under denial-of-service attacks,” in Hybrid Systems: Computation and Control, R. Majumdar and P. Tabuada, Eds. Heidelberg, Germany: Springer, 2009, pp. 31-45.
|
[10] |
D. Zhang, L. Liu, and G. Feng, “Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and DoS attack,” IEEE Trans. Cybern., vol. 49, no. 4, pp. 1501–1511, Apr. 2019. doi: 10.1109/TCYB.2018.2806387
|
[11] |
J. Milosevic, T. Tanaka, H. Sandberg, and K. H. Johansson, “Analysis and mitigation of bias injection attacks against a Kalman filter,” IFAC-PapersOnLine, vol. 50, no. 1, pp. 8393–8398, Jul. 2017. doi: 10.1016/j.ifacol.2017.08.1564
|
[12] |
D. W. Shi, R. J. Elliott, and T. W. Chen, “On finite-state stochastic modeling and secure estimation of cyber-physical systems,” IEEE Trans. Autom. Control, vol. 62, no. 1, pp. 65–80, Jan. 2017. doi: 10.1109/TAC.2016.2541919
|
[13] |
B. Chen, D. W. C. Ho, G. Q. Hu, and L. Yu, “Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks,” IEEE Trans. Cybern., vol. 48, no. 6, pp. 1862–1876, Jun. 2018. doi: 10.1109/TCYB.2017.2716115
|
[14] |
B. Chen, D. W. C. Ho, W. A. Zhang, and L. Yu, “Distributed dimensionality reduction fusion estimation for cyber-physical systems under DoS attacks,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 49, no. 2, pp. 455–468, Feb. 2019. doi: 10.1109/TSMC.2017.2697450
|
[15] |
Q. Y. Liu, Z. D. Wang, X. He, and D. H. Zhou, “Event-based recursive distributed filtering over wireless sensor networks,” IEEE Trans. Autom. Control, vol. 60, no. 9, pp. 2470–2475, Sep. 2015. doi: 10.1109/TAC.2015.2390554
|
[16] |
W. Yang, L. Lei, and C. Yang, “Event-based distributed state estimation under deception attack,” Neurocomputing, vol. 270, pp. 145–151, Dec. 2017. doi: 10.1016/j.neucom.2016.12.109
|
[17] |
A. S. Leong, S. Dey, and D. E. Quevedo, “Transmission scheduling for remote state estimation and control with an energy harvesting sensor,” Automatica, vol. 91, pp. 54–60, May 2018. doi: 10.1016/j.automatica.2018.01.027
|
[18] |
F. X. Wen and Z. M. Wang, “Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks,” Digit. Signal Process., vol. 78, pp. 92–97, Jul. 2018. doi: 10.1016/j.dsp.2018.03.002
|
[19] |
Y. P. Guan and X. H. Ge, “Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks,” IEEE Access, vol. 5, pp. 10858–10870, Jun. 2017. doi: 10.1109/ACCESS.2017.2713807
|
[20] |
X. H. Ge, Q. L. Han, M. Y. Zhong, and X. M. Zhang, “Distributed Krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, pp. 108557, Nov. 2019. doi: 10.1016/j.automatica.2019.108557
|
[21] |
S. Y. Xiao, Q. L. Han, X. H. Ge, and Y. J. Zhang, “Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks,” IEEE Trans. Cybern., vol. 50, no. 3, pp. 1220–1229, Mar. 2020. doi: 10.1109/TCYB.2019.2900478
|
[22] |
D. J. Du, X. Li, W. T. Li, R. Chen, M. R. Fei, and L. Wu, “ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks,” IEEE Trans. Syst.,Man,Cybern.:Syst., vol. 49, no. 8, pp. 1698–1711, Aug. 2019. doi: 10.1109/TSMC.2019.2896292
|
[23] |
J. H. Qin, M. L. Li, L. Shi, and X. H. Yu, “Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks,” IEEE Trans. Autom. Control, vol. 63, no. 6, pp. 1648–1663, Jun. 2018. doi: 10.1109/TAC.2017.2756259
|
[24] |
K. M. Ding, Y. Z. Li, D. E. Quevedo, S. Dey, and L. Shi, “A multi-channel transmission schedule for remote state estimation under DoS attacks,” Automatica, vol. 78, pp. 194–201, Apr. 2017. doi: 10.1016/j.automatica.2016.12.020
|
[25] |
X. H. Cao and C. Y. Sun, “Probabilistic denial of service attack against remote state estimation over a Markov channel in cyber-physical systems,” in Proc. 11th Asian Control Conf., Gold Coast, Australia, 2017, 17–20.
|
[26] |
Y. Z. Li, L. Shi, P. Cheng, J. M. Chen, and D. E. Quevedo, “Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach,” IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2831–2836, Oct. 2015. doi: 10.1109/TAC.2015.2461851
|
[27] |
H. Zhang, P. Cheng, L. Shi, and J. M. Chen, “Optimal Denial-of-Service attack scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023–3028, Nov. 2015. doi: 10.1109/TAC.2015.2409905
|
[28] |
H. Zhang, Y. F. Qi, J. F. Wu, L. K. Fu, and L. D. He, “DoS attack energy management against remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 1, pp. 383–394, Mar. 2018. doi: 10.1109/TCNS.2016.2614099
|
[29] |
C. Yang, W. Yang, and H. B. Shi, “DoS attack in centralised sensor network against state estimation,” IET Control Theory Appl., vol. 12, no. 9, pp. 1244–1253, Jun. 2018. doi: 10.1049/iet-cta.2017.0819
|
[30] |
R. A. Poisel, Modern Communications Jamming: Principles and Techniques. Norwood, USA: Artech House, 2011.
|
[31] |
B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and S. S. Sastry, “Kalman filtering with intermittent observations,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453–1464, Sep. 2004. doi: 10.1109/TAC.2004.834121
|
[32] |
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, “Foundations of control and estimation over lossy networks,” Proc. IEEE, vol. 95, no. 1, pp. 163–187, Jan. 2007. doi: 10.1109/JPROC.2006.887306
|
[33] |
R. W. Eustace, B. A. Woodyatt, G. L. Merrington, and A. Runacres, “Fault signatures obtained from fault implant tests on an F404 engine,” J. Eng. Gas Turbines Power, vol. 116, no. 1, pp. 178–183, Jan. 1994. doi: 10.1115/1.2906789
|