A jointly optimal design of control and scheduling in networked systems under denial-of-service attacks
نویسندگان
چکیده
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) attacks in context networked systems. A sensor takes measurements system output forwards its dynamic state estimates to a remote controller over packet-dropping link. The determines optimal law for process using it receives. An attacker aims at degrading performance by increasing packet-dropout rate with DoS attack on sensor-controller channel. assume both are rational game-theoretic sense establish partially observable game derive control. Using programming we prove that policies can be designed separately without sacrificing optimality, making problem equivalent complete information game. employ Nash Q-learning solve solution is guaranteed constitute an ?-Nash equilibrium. Numerical examples provided illustrate interactions between attacker.
منابع مشابه
Secure Networked Control Systems under Denial of Service Attacks
This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the netwo...
متن کاملSafe and Secure Networked Control Systems under Denial-of-Service Attacks
We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over a communication network. The packets may be jammed or compromised by a malicious adversary. For a class of denial-of-service (DoS) attack models, the goal is to find an (optimal) causal feedback controller that minimizes a give...
متن کاملOptimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems∗
Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...
متن کاملNetworked Systems under Denial-of-Service: Co-located vs. Remote Control Architectures
In this paper, we study networked systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Previous studies have shown that co-located architectures (control unit co-located with the actuators and networked sensor channel) can ensure a high level of robustness against DoS. However, co-location requires a wired or dedic...
متن کاملDenial of Service Attacks
Denial of service attacks are not new. However, the recent increase of their power and their use by organized criminal organizations make necessary to consider them as one of the major issues IT infrastructures will have to face in the next few years. Trying to defeat those attacks without understanding their technical aspects is illusory. As such, this document intends to provide as much detai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Automatica
سال: 2023
ISSN: ['1873-2836', '0005-1098']
DOI: https://doi.org/10.1016/j.automatica.2022.110774