scispace - formally typeset
Search or ask a question
Author

Heng Zhang

Bio: Heng Zhang is an academic researcher from Huaihai Institute of Technology. The author has contributed to research in topics: Optimization problem & Communication channel. The author has an hindex of 15, co-authored 62 publications receiving 1630 citations. Previous affiliations of Heng Zhang include Zhejiang University & University of Sydney.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: The optimal jamming attack that maximizes the Linear Quadratic Gaussian control cost function under energy constraint is considered and the corresponding cost function is derived and system stability under this optimal attack schedule is considered.
Abstract: Recently, many literature works have considered the security issues of wireless networked control system (WNCS). However, few works studied how the attacker should optimize its attack schedule in order to maximize the effect on the system performance due to the insufficiency of energy at the attacker side. This paper fills this gap from the aspect of control system performance. We consider the optimal jamming attack that maximizes the Linear Quadratic Gaussian (LQG) control cost function under energy constraint. After analyzing the properties of the cost function under an arbitrary attack schedule, we derive the optimal jamming attack schedule and the corresponding cost function. System stability under this optimal attack schedule is also considered. We further investigate the optimal attack schedule in a WNCS with multiple subsystems. Different examples are provided to demonstrate the effectiveness of the proposed optimal denial-of-service attack schedule.

477 citations

Journal ArticleDOI
TL;DR: This technical note investigates how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance.
Abstract: Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules.

427 citations

Journal ArticleDOI
TL;DR: FIND is proposed, a novel method to detect nodes with data faults that neither assumes a particular sensing model nor requires costly event injections and shows that average ranking difference is a provable indicator of possible data faults.
Abstract: Wireless Sensor Networks (WSN) promise researchers a powerful instrument for observing sizable phenomena with fine granularity over long periods. Since the accuracy of data is important to the whole system's performance, detecting nodes with faulty readings is an essential issue in network management. As a complementary solution to detecting nodes with functional faults, this article, proposes FIND, a novel method to detect nodes with data faults that neither assumes a particular sensing model nor requires costly event injections. After the nodes in a network detect a natural event, FIND ranks the nodes based on their sensing readings as well as their physical distances from the event. FIND works for systems where the measured signal attenuates with distance. A node is considered faulty if there is a significant mismatch between the sensor data rank and the distance rank. Theoretically, we show that average ranking difference is a provable indicator of possible data faults. FIND is extensively evaluated in simulations and two test bed experiments with up to 25 MicaZ nodes. Evaluation shows that FIND has a less than 5p miss detection rate and false alarm rate in most noisy environments.

155 citations

Journal ArticleDOI
TL;DR: This paper solves the problem of “how much power the attacker should use to jam the channel in each time” and proposes an attack power allocation algorithm and shows the computational complexity of the proposed algorithm is not worse than $\mathcal{O}(T)$ .
Abstract: This paper considers a remote state estimation problem, where a sensor measures the state of a linear discrete-time process and has computational capability to implement a local Kalman filter based on its own measurements. The sensor sends its local estimates to a remote estimator over a communication channel that is exposed to a Denial-of-Service (DoS) attacker. The DoS attacker, subject to limited energy budget, intentionally jams the communication channel by emitting interference noises with the purpose of deteriorating estimation performance. In order to maximize attack effect, following the existing answer to “when to attack the communication channel”, in this paper we manage to solve the problem of “how much power the attacker should use to jam the channel in each time”. For the static attack energy allocation problem, when the system matrix is normal, we derive a sufficient condition for when the maximum number of jamming operations should be used. The associated jamming power is explicitly provided. For a general system case, we propose an attack power allocation algorithm and show the computational complexity of the proposed algorithm is not worse than $\mathcal{O}(T)$ , where $T$ is the length of the time horizon considered. When the attack can receive the real-time ACK information, we formulate a dynamic attack energy allocation problem, and transform it to a Markov Decision Process to find the optimal solution.

149 citations

Journal ArticleDOI
TL;DR: This paper considers the distributed load sharing problem of the microgrids operating in autonomous mode under FDI, and constructs an FDI attack model, where the attacker is capable of injecting false data into the bus agents.
Abstract: In microgrids, distributed load sharing plays an important role in maintaining the supply–demand balance of power. Because false data injection (FDI) is one of the crucial threats faced by future microgrids, the study of the impact of FDI on distributed load sharing is both of theoretical merit and practical value. In this paper, we consider the distributed load sharing problem of the microgrids operating in autonomous mode under FDI. Each bus is assumed to be equipped with an agent. Under a well-developed distributed load sharing protocol based on multiagent systems, we first construct an FDI attack model, where the attacker is capable of injecting false data into the bus agents. Then, a utilization level is introduced for coordinating generators, and its variation is evaluated in the presence of FDI attacks with given injection strategies. The stable region of the microgrid is defined, and conditions are given to determine stability. Finally, theoretical results are validated on the Canadian urban distribution system.

145 citations


Cited by
More filters
01 Jan 1996

1,282 citations

Journal ArticleDOI
TL;DR: An overview of recent advances on security control and attack detection of industrial CPSs is presented, and robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks.

663 citations

01 Nov 2013
TL;DR: This book was published in 1998, and for nearly 20 years I maintained an associated website at this address.
Abstract: Wed, 05 Dec 2018 22:36:00 GMT forecasting methods and applications 3rd pdf PDF | On Jan 1, 1984, S ~G Makridakis and others published Forecasting: Methods and Applications Tue, 04 Dec 2018 23:06:00 GMT (PDF) Forecasting: Methods and Applications ResearchGate Forecasting: methods and applications. This book was published in 1998, and for nearly 20 years I maintained an associated website at this address. Fri, 30 Nov 2018 14:35:00 GMT Forecasting: methods and applications | Rob J Hyndman Prod 2100-2110 Forecasting Methods 2 1. Framework of planning decisions Let us first remember where the inventory control decisions may take place. Fri, 07 Dec 2018 14:13:00 GMT Forecasting Methods UCLouvain 2002 Forecasting: Methods and Applications Makridakis, ... this 3rd edition very wisely includes some more advanced forecasting methods such as dynamic regression, ... Sat, 01 Dec 2018 22:41:00 GMT 2002 Forecasting: Methods and Applications HEPHAESTUS Methods and Applications Third Edition Spyros Makridakis European Institute of Business ... major forecasting methods 516 The use of different forecasting Tue, 04 Dec 2018 22:37:00 GMT Methods and Applications Max Planck Society MATH6011: Forecasting “All models are wrong, ... S.C. and Hyndman, R.J. 1998, Forecasting: Methods and Applications 3rd Ed., New York: Wiley as text book. Wed, 21 Nov 2018 17:31:00 GMT MATH6011: Forecasting University of Southampton Save As PDF Ebook forecasting methods and applications ... FOUR LAMAS OF DOLPO AUTOBIOGRAPHIES OF FOUR TIBETAN LAMAS INTRODUCTION AND TRANSLATIONS VOL I 3RD [PDF] Tue, 04 Dec 2018 19:10:00 GMT forecasting methods and applications makridakis pdf ... forecasting methods and applications 3rd ed Download forecasting methods and applications 3rd ed or read online books in PDF, EPUB, Tuebl, and Mobi Format. Thu, 06 Dec 2018 07:26:00 GMT forecasting methods and applications 3rd ed | Download ... INDUSTRIAL STATISTICS AND OPERATIONAL MANAGEMENT 6 : ... Some applications of forecasting ... Qualitative techniques in forecasting Time series methods Mon, 19 Nov 2018 11:49:00 GMT INDUSTRIAL STATISTICS AND OPERATIONAL MANAGEMENT 6 ... 3 Hierarchical forecasting 9 3 Advanced methods 9. Forecasting: principles and practice 7 Assumptions • This is not an introduction to R. I assume you are broadly ... Thu, 06 Dec 2018 22:49:00 GMT Forecasting: Principles & Practice, Rob J Hyndman, 2014 forecasting methods and applications 3rd ed Download forecasting methods and applications 3rd ed or read online here in PDF or EPUB. Please click button to get ... Mon, 03 Dec 2018 08:27:00 GMT Forecasting Methods And Applications 3rd Ed | Download ... Forecasting methods can be classified as qualitative or quantitative. ... practical applications. 15-4 Chapter 15 Time Series Analysis and Forecasting Fri, 07 Dec 2018 12:33:00 GMT PDF Time Series Analysis and Forecasting Cengage FORECASTING METHODS AND APPLICATIONS 3RD EDITION PDF READ Forecasting Methods And Applications 3rd Edition pdf. Download Forecasting Methods And Applications 3rd ... Sun, 11 Nov 2018 17:14:00 GMT Free Forecasting Methods And Applications 3rd Edition PDF Forecasting Methods and Applications. 3rd ed. New York: John Wiley & Sons, 1998. Sat, 08 Dec 2018 09:40:00 GMT Forecasting Methods and Applications Book Harvard ... Preface In preparing the manuscript for the third edition of Forecasting: methods and applications, one of our primary goals has been to make the book as complete and ... Wed, 05 Dec 2018

528 citations

Journal ArticleDOI
TL;DR: The optimal jamming attack that maximizes the Linear Quadratic Gaussian control cost function under energy constraint is considered and the corresponding cost function is derived and system stability under this optimal attack schedule is considered.
Abstract: Recently, many literature works have considered the security issues of wireless networked control system (WNCS). However, few works studied how the attacker should optimize its attack schedule in order to maximize the effect on the system performance due to the insufficiency of energy at the attacker side. This paper fills this gap from the aspect of control system performance. We consider the optimal jamming attack that maximizes the Linear Quadratic Gaussian (LQG) control cost function under energy constraint. After analyzing the properties of the cost function under an arbitrary attack schedule, we derive the optimal jamming attack schedule and the corresponding cost function. System stability under this optimal attack schedule is also considered. We further investigate the optimal attack schedule in a WNCS with multiple subsystems. Different examples are provided to demonstrate the effectiveness of the proposed optimal denial-of-service attack schedule.

477 citations

Journal ArticleDOI
TL;DR: This technical note investigates how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance.
Abstract: Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this technical note, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained attacker decides whether to jam the channel at each sampling time. We construct optimal attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal attack schedules.

427 citations