DoS Attacks on Remote State Estimation with Asymmetric Information

Kemi Ding, Xiaoqiang Ren*, Daniel E. Quevedo, Subhrakanti Dey, Ling Shi

*Corresponding author for this work

Research output: Contribution to journalJournal Articlepeer-review

63 Citations (Scopus)

Abstract

In this paper, we consider remote state estimation in an adversarial environment. A sensor forwards local state estimates to a remote estimator over a vulnerable network, which may be congested by an intelligent denial-of-service attacker. It is assumed that the acknowledgment information from the remote estimator to the sensor is hidden from the attacker, which, thus, leads to asymmetric information between the sensor and attacker. Considering the infinite-time goals of the two agents and their asymmetric information structure, we model the conflicting nature between the sensor and the attacker by a stochastic Bayesian game. Solutions for this game under two different structures of public information history are investigated, that is, the open-loop structure (in which players cannot observe their opponents' play) and the closed-loop one (in which players can observe the play causally). For the open-loop history case, the original game problem is transformed into a static Bayesian game. We provide the unique mixed-strategy equilibrium explicitly for this game, and analyze the sensor's advantages brought by the extra information. When it comes to the closed-loop case, the dynamic nature of history structure introduces additional difficulties solving the original problem. Thus, to derive stationary optimal power schemes for each agent, we convert the original game into a continuous-state stochastic game and discuss the existence of optimal transmission/jamming power strategies. Furthermore, an algorithm based on multiagent reinforcement learning is proposed to find such strategies, and numerical examples are provided to illustrate the developed results.

Original languageEnglish
Article number8445595
Pages (from-to)653-666
Number of pages14
JournalIEEE Transactions on Control of Network Systems
Volume6
Issue number2
DOIs
Publication statusPublished - Jun 2019

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Asymmetric information
  • cyber-physical systems
  • network security
  • state estimation

Fingerprint

Dive into the research topics of 'DoS Attacks on Remote State Estimation with Asymmetric Information'. Together they form a unique fingerprint.

Cite this