Communication scheduling and remote estimation with adversarial intervention
The motto “united we stand, divided we fall” has found new application in an unlikely discipline – in cyber security.
Machines – from simple ones like a personal computer to a complex one like a self-driving car – must transmit information in order to process it. A self-driving car, for instance, is designed to collect the same kinds of information a human driver might, and respond in kind. From traffic lights to the behavior of other cars, the self-driving car must sense and process information quickly and securely in order to decide on a course of action: braking, turning, and potentially saving lives.
But what if there’s another, adversarial signal in the mix, jeopardizing the communication? A research team based at the University of Illinois at Urbana-Champaign has developed a method to potentially avoid the interruptions caused by these signals, called jammers.
The research was published in the January issue of IEEE/CAA Journal of Automatica Sinica (JAS), a joint publication of the IEEE and the Chinese Association of Automation.
“The ability to transmit data from a source to a destination reliably in the presence of adversarial intervention, such as jamming, is of paramount importance and concern,” said lead author Tamer Ba?ar.
Ba?ar is Swanlund Endowed Chair of the department of electrical and computer engineering and director of the Center for Advanced Study at the University of Illinois at Urbana-Champaign.
“The prototype introduced in the paper captures scenarios that arise in many application areas, such as remote sensing systems, networked control systems, and cyber-physical systems,” Ba?ar said.
For example, a sensor collects information over a period of time and transmits the data to a decision center that must work to accurately process the original data. The data can become corrupted as it must be encoded prior to the decision center and decoded afterwards. Time constraints and limited energy resources further complicate matters. To further complicate issues, a jammer can stop everything by literally jamming the system with a gluttony of noise.
“The sensor, the encoder, and the decoder act in unison, toward a common goal, whereas a jammer operates in a way to counteract the actions of the first three,” Ba?ar said.
The researchers grouped the three pieces together, comprising one actor in the system, working to counter the actions of the jammer. By having all three pieces work as one, they simultaneously announce their policies regarding information.
It’s the difference between communicating via a carrier pigeon or a phone. A person must tie a message to the pigeon’s leg, the pigeon must travel, and the receiver must retrieve the message from the pigeon. Then the receiver must respond and repeat the process in reverse. The message could be lost or damaged at several points. If the same people picked up the phone, it’s far more likely they could decide on a course of action together with minimal interference.
When the sensor, encoder, and decoder work together, they commit to their next actions together. They don’t block the jammer altogether, but the jammer doesn’t have the opportunity to interrupt the work and cause a substantial error as the actors communicate back and forth.
Called a Stackelberg feedback solution, this hierarchal maneuver allows the system to commit to processing information based on a set of pre-computable thresholds, which depends on time and the number of transmission opportunities left. The jammer is left out of consideration as the sensor, encoder, and decoder decide together what, how, and when to process.
While effective, the solution is currently limited to one channel. The researchers hope to change that.
“Our goal is to extend the model introduced in the paper to more complex systems, allowing for more general source processes, multiple sensors, multiple channels, and sensors that are equipped with an energy harvester that has the potential to replenish the sensor’s used energy based on random availability of such resources – such as solar or wind power,” Ba?ar said.
###
The other authors are Xiaobin Gao, who recently earned his doctorate degree from the University of Illinois at Urbana-Champaign, and Emrah Akyol, an assistant professor of electrical and computer engineering at the State University of New York at Binghamton. Akyol contributed to this research during the time when he worked as a postdoctoral research associate in the Coordinated Science Laboratory in Ba?ar’s research group.
This work was supported in part by the U.S. Army Research Labs, the U.S. Army Research Office, and the Office of Naval Research.
Fulltext of the paper is available:
http://www.
https:/
IEEE/CAA Journal of Automatica Sinica aims to publish high-quality, high-interest, far-reaching research achievements globally, and provide an international forum for the presentation of original ideas and recent results related to all aspects of automation. Researchers (including globally highly cited scholars) from institutions all over the world, such as NASA Ames Research Center, MIT, Yale University, Stanford University, Princeton University, select to share their research with a large audience through JAS.
We are pleased to announce IEEE/CAA Journal Automatica Sinica (JAS) has its latest CiteScore as 3.18, which ranks it among top 18% (40/224) in the category of “Control and Systems Engineering”, and top 19% (48/251, 32/168) both in the categories of “Information System” and “Artificial Intelligence”. JAS has entered the 1st quantile (Q1) in all three categories it belongs to.
Why publish with us: Fast and high quality peer review; Simple and effective online submission system; Widest possible global dissemination of your research; Indexed by IEEE, ESCI, EI, Scopus, Inspec.
JAS papers can be found at http://ieeexplore.
Media Contact
Yan Ou
[email protected]
http://dx.