مقاله انگلیسی رایگان در مورد برآورد امنیت تحت حمله منع سرویس با محدودیت انرژی – الزویر 2018

 

مشخصات مقاله
ترجمه عنوان مقاله برآورد امنیت تحت حمله منع سرویس با محدودیت انرژی
عنوان انگلیسی مقاله Security estimation under Denial-of-Service attack with energy constraint
انتشار مقاله سال 2018
تعداد صفحات مقاله انگلیسی 19 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) scopus – master journals – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
3.241 در سال 2017
شاخص H_index 100 در سال 2018
شاخص SJR 1.073 در سال 2018
رشته های مرتبط مهندسی کامپیوتر
گرایش های مرتبط امنیت اطلاعات
نوع ارائه مقاله
ژورنال
مجله / کنفرانس محاسبات عصبی – Neurocomputing
دانشگاه The Institute of Electrical Engineering – Yanshan University – China
کلمات کلیدی برآورد حالت، سیستم های سایبر-فیزیکی، حمله ی DoS، تئوری بازی، زیر سیستم چندگانه
کلمات کلیدی انگلیسی State estimation, Cyber-Physical Systems, DoS attack, game theory, multiple-subsystem
شناسه دیجیتال – doi
https://doi.org/10.1016/j.neucom.2018.02.086
کد محصول E10157
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
Keywords
1 Introduction
2 Problem statement and preliminaries
3 Game framework
4 CPS with multiple-subsystem
5 Numerical examples
6 Conclusion
Acknowledgment
References
Vitae

بخشی از متن مقاله:
Abstract

This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results.

INTRODUCTION

Cyber-Physical Systems (CPS) are systems integrating computation, network and physical process which consists of sensors, actuators, control units and communication devices [1, 2], which have attracted considerable interest from both academic and industrial communities in the past few years, such as aerospace, smart grid, intelligent transportation, smart building, etc. However, with extensive use of widespread networking, wireless connection among sensors, estimators and actuators are more vulnerable to cyber security threats than wired sensors. The security issue caused by malicious attacks is of fundamental importance to ensure the safe operation of CPS [3–5], which have been investigated from different perspectives. The attack or the jamming is essentially a kind of methods, processes, or means which are utilized to maliciously reduce network reliability. In particular, deception attack and Denial-of-Service (DoS) are two typical attacks in reducing system performance. The former modifies the data packets in a malicious way [6–11], while the DoS attack blocks the information flow between the sender and the receiver to increase the packet drop rate [12–18]. Compared with deception attack, the DoS attack, which does not require comprehensive information about the system and the data, is a more reachable attack pattern in a shared network. Some critical systems which rely on real-time operation may become unstable and even be damaged under DoS attack. Many scholars have acknowledged the importance of addressing the challenge of designing secure CPS. In the existing works, various efforts have been devoted to design estimators influenced by specific malicious attacks [12-21]. In [12], an optimal attack schedule has been investigated to maximize the expected average estimation error variance. To capture the strategic iteration between the sensor and the attacker, the game-theoretic approach provides such a framework to handle interactive decision issues (see [13–15]). In [16], a two-player zero-sum stochastic game is established to model the dynamic interaction between the defender and the DoS attacker. Due to energy constraint is inherent in almost all types of attacks, an integrated game-theoretic framework is proposed to investigate the interactive decision-making process under energy constraints in [17]. A multi-channel transmission schedule for remote state estimation under DoS attack is studied in [18, 19], in which a Nash Q-learning algorithm is proposed to reduce the computation complexity when solving the optimal strategies for both players. Besides, the paper [20] is applied a novel acknowledgement-based cheating scheme for the sensor to confuse the DoS attacker. In [21], multiple channels are used to defense the attacker when system is attacked and the attacker and anti-attacker are modeled as a zero-sum stochastic game. Besides, it is common that many system components share a common communication network (like a communication bus or a wireless local area network) [23].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا