Reinforcement learning based anti-jamming schedule in cyber-physical systems

Ruimeng Gan, Yue Xiao, Jinliang Shao, Heng Zhang, Wei Xing Zheng

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

Abstract

![CDATA[In this paper, the security issue of cyber-physical systems is investigated, where the observation data is transmitted from a sensor to an estimator through wireless channels disturbed by an attacker. The failure of this data transmission occurs, when the sensor accesses the channel that happens to be attacked by the jammer. Since the system performance measured by the estimation error depends on whether the data transmission is a success, the problem of selecting the channel to alleviate the attack effect is studied. Moreover, the state of each channel is time-variant due to various factors, such as path loss and shadowing. Motivated by energy conservation, the problem of selecting the channel with the best state is also considered. With the help of cognitive radio technique, the sensor has the ability of selecting a sequence of channels dynamically. Based on this, the problem of selecting the channel is resolved by means of reinforcement learning to jointly avoid the attack and enjoy the channel with the best state. A corresponding algorithm is presented to obtain the sequence of channels for the sensor, and its effectiveness is proved analytically. Numerical simulations further verify the derived results.]]
Original languageEnglish
Title of host publicationProceedings of the 21th IFAC World Congress, Berlin, Germany, 12-17 July 2020
PublisherInternational Federation of Automatic Control
Pages2501-2506
Number of pages6
DOIs
Publication statusPublished - 2020
EventInternational Federation of Automatic Control. World Congress -
Duration: 12 Jul 2020 → …

Publication series

Name
ISSN (Print)2405-8963

Conference

ConferenceInternational Federation of Automatic Control. World Congress
Period12/07/20 → …

Open Access - Access Right Statement

This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)

Fingerprint

Dive into the research topics of 'Reinforcement learning based anti-jamming schedule in cyber-physical systems'. Together they form a unique fingerprint.

Cite this