مشخصات مقاله | |
ترجمه عنوان مقاله | برآورد امنیت تحت حمله منع سرویس با محدودیت انرژی |
عنوان انگلیسی مقاله | Security estimation under Denial-of-Service attack with energy constraint |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 19 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research article) |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | scopus – master journals – JCR |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
3.241 در سال 2017 |
شاخص H_index | 100 در سال 2018 |
شاخص SJR | 1.073 در سال 2018 |
رشته های مرتبط | مهندسی کامپیوتر |
گرایش های مرتبط | امنیت اطلاعات |
نوع ارائه مقاله |
ژورنال |
مجله / کنفرانس | محاسبات عصبی – Neurocomputing |
دانشگاه | The Institute of Electrical Engineering – Yanshan University – China |
کلمات کلیدی | برآورد حالت، سیستم های سایبر-فیزیکی، حمله ی DoS، تئوری بازی، زیر سیستم چندگانه |
کلمات کلیدی انگلیسی | State estimation, Cyber-Physical Systems, DoS attack, game theory, multiple-subsystem |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.neucom.2018.02.086 |
کد محصول | E10157 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Keywords 1 Introduction 2 Problem statement and preliminaries 3 Game framework 4 CPS with multiple-subsystem 5 Numerical examples 6 Conclusion Acknowledgment References Vitae |
بخشی از متن مقاله: |
Abstract
This paper concentrates on security estimation of Cyber-Physical Systems subject to Denial-of-Service attack. A game framework is established to describe the interactive decision making process between the sensor and the attacker under energy constraint. A novel payoff function is used and the optimal strategies for both sides constituting a Nash equilibrium (NE) are obtained by using matrix game. Furthermore, the security issue on state estimation for CPS with multiple-subsystem is investigated based on game theory. To deteriorate the whole system performance, the attacker should decide when to attack and which subsystem to be chosen on account of limited energy. The existence conditions of NE strategies are given. Two numerical examples are provided to demonstrate the feasibility of the results. INTRODUCTION Cyber-Physical Systems (CPS) are systems integrating computation, network and physical process which consists of sensors, actuators, control units and communication devices [1, 2], which have attracted considerable interest from both academic and industrial communities in the past few years, such as aerospace, smart grid, intelligent transportation, smart building, etc. However, with extensive use of widespread networking, wireless connection among sensors, estimators and actuators are more vulnerable to cyber security threats than wired sensors. The security issue caused by malicious attacks is of fundamental importance to ensure the safe operation of CPS [3–5], which have been investigated from different perspectives. The attack or the jamming is essentially a kind of methods, processes, or means which are utilized to maliciously reduce network reliability. In particular, deception attack and Denial-of-Service (DoS) are two typical attacks in reducing system performance. The former modifies the data packets in a malicious way [6–11], while the DoS attack blocks the information flow between the sender and the receiver to increase the packet drop rate [12–18]. Compared with deception attack, the DoS attack, which does not require comprehensive information about the system and the data, is a more reachable attack pattern in a shared network. Some critical systems which rely on real-time operation may become unstable and even be damaged under DoS attack. Many scholars have acknowledged the importance of addressing the challenge of designing secure CPS. In the existing works, various efforts have been devoted to design estimators influenced by specific malicious attacks [12-21]. In [12], an optimal attack schedule has been investigated to maximize the expected average estimation error variance. To capture the strategic iteration between the sensor and the attacker, the game-theoretic approach provides such a framework to handle interactive decision issues (see [13–15]). In [16], a two-player zero-sum stochastic game is established to model the dynamic interaction between the defender and the DoS attacker. Due to energy constraint is inherent in almost all types of attacks, an integrated game-theoretic framework is proposed to investigate the interactive decision-making process under energy constraints in [17]. A multi-channel transmission schedule for remote state estimation under DoS attack is studied in [18, 19], in which a Nash Q-learning algorithm is proposed to reduce the computation complexity when solving the optimal strategies for both players. Besides, the paper [20] is applied a novel acknowledgement-based cheating scheme for the sensor to confuse the DoS attacker. In [21], multiple channels are used to defense the attacker when system is attacked and the attacker and anti-attacker are modeled as a zero-sum stochastic game. Besides, it is common that many system components share a common communication network (like a communication bus or a wireless local area network) [23]. |