Font Size: a A A

Modeling And Analysis Of Cyber-Physical Systems Under Jamming Attack

Posted on:2019-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:H B ShiFull Text:PDF
GTID:2428330596460837Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
The rapid development of computer technology have brought us into a networked,intelligent,and informationized world.The integration of computing technology,control technology and communication technology is deepening.Cyber-Physical Systems(CPS)emerge,as the times require.CPS integrates human space,information space and physical space deeply.In recent years,we have found a wide application spectrum of CPS,such as industrial production,national defense and smart grid.CPS have greatly promoted social productivity and raised people's quality of life.Therefore,it has attracted much attention from many researchers.Remote estimation of system state is one of the basic support technologies of CPS.Most applications of CPS require remote estimation of system state.However,the limitations of sensor resources and the unreliability of communication networks brought great difficulties to the research of remote estimation.At present,there are some achievement in the field,such as the optimal denial of service attack scheduling,attack detecting and defending of the remote estimation.However,there are still some shortcomings in the current research.For example,the attack model of remote estimation is too simple and the ideal assumption of the communication network.In this work,we focuses on the optimal power allocation for jamming attack against remote estimation of CPS.The main contributions of this work as follows:1.We introduce the research background and an overview of existing literatures.Besides that,we point out the shortcomings of the current research.2.We introduce the Kalman filtering which is almost always used in CPS remoteestimation.Furthermore,we describe the improved form of Kalman filtering underunreliable communication and the Kalman filtering under jamming attack.We giventhe stability conditions of remote estimator.3.Study the optimal power allocation for jamming attack against remote estimation ofCPS under single-system scenario.We assume that the attacker can jam the wirelesschannel with various power levels,which will cause different sensory packet dropprobabilities.Our goals was maximize the error covariance of the remote estimator.Power constraints of the jamming attack and intrusion detection was our constraintconditions.According to theoretical analysis,we point out that the optimal powerallocation for jamming attack resembles a parabola shape along time.4.Study the optimal power allocation for jamming attack against remote estimation ofCPS under multi-system scenario.Whether or not under bandwidth constraints,wedivide into two categories: the optimal power allocation for single-channel jammingattack and the optimal power allocation for multi-channel simultaneous jammingattack.Similar to single-system scenario,our goals was maximize the errorcovariance of the remote estimator.Power constraints of the jamming attack andintrusion detection was our constraint conditions.According to theoretical analysis,we find that in both cases,the optimal power allocation for jamming attack wasconcentrate power on the one channel when the system parameters satisfy somesimple conditions.Finally,our work was concluded and we discusses some future research works.
Keywords/Search Tags:CPS, Remote estimation of system state, Jamming attack, Optimal power allocation, Multi-systems scenario
PDF Full Text Request
Related items