SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach

被引:221
|
作者
Li, Yuzhe [1 ]
Quevedo, Daniel E. [2 ]
Dey, Subhrakanti [3 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Elect & Comp Engn Dept, Kowloon, Hong Kong, Peoples R China
[2] Paderborn Univ, Dept Elect Engn EIM E, D-33100 Paderborn, Germany
[3] Uppsala Univ, Dept Engn Sci, S-75121 Uppsala, Sweden
来源
关键词
Cyberphysical systems; game theory; remote state estimation; security; wireless sensors; SECURITY;
D O I
10.1109/TCNS.2016.2549640
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise ratio-based denial-of-service attacks. A sensor sends its local estimate to a remote estimator through a wireless network that may suffer interference from an attacker. Both the sensor and the attacker have energy constraints. We first study an associated two-player game when multiple power levels are available. Then, we build a Markov game framework to model the interactive decision-making process based on the current state and information collected from previous time steps. To solve the associated optimality (Bellman) equations, a modified Nash Q-learning algorithm is applied to obtain the optimal solutions. Numerical examples and simulations are provided to demonstrate our results.
引用
收藏
页码:632 / 642
页数:11
相关论文
共 50 条
  • [31] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255
  • [32] A game-theoretic approach to decision in FDI
    Darkhovski, B
    Staroswiecki, M
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (05) : 853 - 858
  • [33] The spread of an epidemic: a game-theoretic approach
    Karmakar, Sayar
    Podder, Moumanti
    Roy, Souvik
    Sadhukhan, Soumyarup
    ADVANCES IN APPLIED PROBABILITY, 2025,
  • [34] A Game-Theoretic Approach to Graph Clustering
    Mandala, Supreet
    Kumara, Soundar
    Chatterjee, Kalyan
    INFORMS JOURNAL ON COMPUTING, 2014, 26 (03) : 629 - 643
  • [35] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [36] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [37] Trading the Cloud: A Game-Theoretic Approach
    Zheng, Xianrong
    AMCIS 2020 PROCEEDINGS, 2020,
  • [38] Petty corruption: A game-theoretic approach
    Lambert-Mogiliansky, Ariane
    Majumdar, Mukul
    Radner, Roy
    INTERNATIONAL JOURNAL OF ECONOMIC THEORY, 2008, 4 (02) : 273 - 297
  • [39] Contested Logistics: A Game-Theoretic Approach
    Cerny, Jakub
    Ling, Chun Kai
    Chakrabarti, Darshan
    Zhang, Jingwen
    Farina, Gabriele
    Kroer, Christian
    Iyengar, Garud
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2024, 2025, 14908 : 124 - 146