TY - JOUR
T1 - A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems
AU - Li, Yuzhe
AU - Quevedo, Daniel E.
AU - Dey, Subhrakanti
AU - Shi, Ling
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2017/3
Y1 - 2017/3
N2 - A class of malicious attacks against remote state estimation in cyber-physical systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, thereby misleading the sensor with subsequent performance degradation. One feasible attack pattern is proposed and the corresponding effect on the estimation performance is derived analytically. Due to the ACKs being unreliable, the sensor needs to decide at each instant, whether to trust the ACK information or not and adapt the transmission schedule accordingly. In the meanwhile, there is also a tradeoff for the attacker between attacking and not attacking when the modification of ACKs is costly. To investigate the optimal strategies for both the sensor and the attacker, a game-theoretic framework is built and the equilibrium for both sides is studied.
AB - A class of malicious attacks against remote state estimation in cyber-physical systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, thereby misleading the sensor with subsequent performance degradation. One feasible attack pattern is proposed and the corresponding effect on the estimation performance is derived analytically. Due to the ACKs being unreliable, the sensor needs to decide at each instant, whether to trust the ACK information or not and adapt the transmission schedule accordingly. In the meanwhile, there is also a tradeoff for the attacker between attacking and not attacking when the modification of ACKs is costly. To investigate the optimal strategies for both the sensor and the attacker, a game-theoretic framework is built and the equilibrium for both sides is studied.
KW - Cyber-physical systems
KW - fake-ACK attack
KW - game theory
UR - https://www.webofscience.com/wos/woscc/full-record/WOS:000395668800001
UR - https://openalex.org/W2521191201
UR - https://www.scopus.com/pages/publications/85049495737
U2 - 10.1109/TSIPN.2016.2611446
DO - 10.1109/TSIPN.2016.2611446
M3 - Journal Article
SN - 2373-776X
VL - 3
SP - 1
EP - 11
JO - IEEE Transactions on Signal and Information Processing over Networks
JF - IEEE Transactions on Signal and Information Processing over Networks
IS - 1
M1 - 7571185
ER -