uu.seUppsala University Publications
Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 64) Show all publications
Biasson, A., Dey, S. & Zorzi, M. (2018). A decentralized optimization framework for energy harvesting devices. IEEE Transactions on Mobile Computing, 17(11), 2483-2496
Open this publication in new window or tab >>A decentralized optimization framework for energy harvesting devices
2018 (English)In: IEEE Transactions on Mobile Computing, ISSN 1536-1233, E-ISSN 1558-0660, Vol. 17, no 11, p. 2483-2496Article in journal (Refereed) Published
Abstract [en]

Designing decentralized policies for wireless communication networks is a crucial problem, which has only been partially solved in the literature so far. In this paper, we propose a Decentralized Markov Decision Process (Dec-MDP) framework to analyze a wireless sensor network with multiple users which access a common wireless channel. We consider devices with energy harvesting capabilities, that aim at balancing the energy arrivals with the data departures and with the probability of colliding with other nodes. Over time, an access point triggers a SYNC slot, wherein it recomputes the optimal transmission parameters of the whole network, and distributes this information. Every node receives its own policy, which specifies how it should access the channel in the future, and, thereafter, proceeds in a fully decentralized fashion, with no interactions with other entities in the network. We propose a multi-layer Markov model, where an external MDP manages the jumps between SYNC slots, and an internal Dec-MDP computes the optimal policy in the short term. We numerically show that, because of the harvesting, stationary policies are suboptimal in energy harvesting scenarios, and the optimal trade-off lies between an orthogonal and a random access system.

National Category
Telecommunications
Identifiers
urn:nbn:se:uu:diva-365046 (URN)10.1109/TMC.2018.2810269 (DOI)000446655000002 ()
Available from: 2018-11-08 Created: 2018-11-08 Last updated: 2018-11-27Bibliographically approved
Ren, X., Wu, J., Dey, S. & Shi, L. (2018). Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution. Automatica, 87, 187-194
Open this publication in new window or tab >>Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution
2018 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 87, p. 187-194Article in journal (Refereed) Published
Abstract [en]

Abstract

This paper considers optimal attack attention allocation on remote state estimation in multi-systems. Suppose there are M" role="presentation">

independent systems, each of which has a remote sensor monitoring the system and sending its local estimates to a fusion center over a packet-dropping channel. An attacker may generate noises to exacerbate the communication channels between sensors and the fusion center. Due to capacity limitation, at each time the attacker can exacerbate at most N" role="presentation"> of the M" role="presentation"> channels. The goal of the attacker side is to seek an optimal policy maximizing the estimation error at the fusion center. The problem is formulated as a Markov decision process (MDP) problem, and the existence of an optimal deterministic and stationary policy is proved. We further show that the optimal policy has a threshold structure, by which the computational complexity is reduced significantly. Based on the threshold structure, a myopic policy is proposed for homogeneous models and its optimality is established. To overcome the curse of dimensionality of MDP algorithms for general heterogeneous models, we further provide an asymptotically (as M" role="presentation"> and N" role="presentation"> go to infinity) optimal solution, which is easy to compute and implement. Numerical examples are given to illustrate the main results.

National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-365044 (URN)10.1016/j.automatica.2017.09.021 (DOI)
Available from: 2018-11-08 Created: 2018-11-08 Last updated: 2019-01-23Bibliographically approved
Leong, A., Quevedo, D. E. & Dey, S. (2018). Optimal control of energy resources for state estimation over wireless channels. In: SpringerBriefs in Control, Automation and Robotics: . Springer Publishing Company
Open this publication in new window or tab >>Optimal control of energy resources for state estimation over wireless channels
2018 (English)In: SpringerBriefs in Control, Automation and Robotics, Springer Publishing Company, 2018Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer Publishing Company, 2018
National Category
Engineering and Technology
Identifiers
urn:nbn:se:uu:diva-371939 (URN)
Available from: 2019-01-03 Created: 2019-01-03 Last updated: 2019-01-03
Biswas, S., Knorn, S., Dey, S. & Ahlén, A. (2018). Quantized non-Bayesian quickest change detection with energy harvesting. In: : . Paper presented at IEEE Globecom2018 SPC.
Open this publication in new window or tab >>Quantized non-Bayesian quickest change detection with energy harvesting
2018 (English)Conference paper, Published paper (Refereed)
National Category
Engineering and Technology
Identifiers
urn:nbn:se:uu:diva-363299 (URN)
Conference
IEEE Globecom2018 SPC
Available from: 2018-10-16 Created: 2018-10-16 Last updated: 2018-10-16
Li, Y., Quevedo, D. E., Dey, S. & Shi, L. (2017). A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems. IEEE Transactions on Signal and Information Processing over Networks, 3(1)
Open this publication in new window or tab >>A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems
2017 (English)In: IEEE Transactions on Signal and Information Processing over Networks, E-ISSN 2373-776X, Vol. 3, no 1Article in journal (Refereed) Published
Abstract [en]

A class of malicious attacks against remote state estimation in cyber-physical systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, thereby misleading the sensor with subsequent performance degradation. One feasible attack pattern is proposed and the corresponding effect on the estimation performance is derived analytically. Due to the ACKs being unreliable, the sensor needs to decide at each instant, whether to trust the ACK information or not and adapt the transmission schedule accordingly. In the meanwhile, there is also a tradeoff for the attacker between attacking and not attacking when the modification of ACKs is costly. To investigate the optimal strategies for both the sensor and the attacker, a game-theoretic framework is built and the equilibrium for both sides is studied.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:uu:diva-306957 (URN)10.1109/TSIPN.2016.2611446 (DOI)000395668800001 ()
Available from: 2016-11-07 Created: 2016-11-07 Last updated: 2017-03-30Bibliographically approved
Ding, K., Li, Y., Quevedo, D. E., Dey, S. & Shi, L. (2017). A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica, 78, 194-201
Open this publication in new window or tab >>A multi-channel transmission schedule for remote state estimation under DoS attacks
Show others...
2017 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 78, p. 194-201Article in journal (Refereed) Published
Abstract [en]

This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measurements of a sensor are transmitted to a remote estimator over a multi-channel network, which may be congested by a malicious attacker. Among these multiple communication paths with different characteristics and properties at each time step, the sensor needs to choose a single channel for sending data packets while reducing the probability of being attacked. In the meanwhile, the attacker needs to decide the target channel to jam under an energy budget constraint. To model this interactive decision making process between the two sides, we formulate a two-player zero-sum stochastic game framework. A Nash Q-learning algorithm is proposed to tackle the computation complexity when solving the optimal strategies for both players. Numerical examples are provided to illustrate the obtained results.

Keywords
Kalman filtering, Multi-channel networks, State estimation, DoS attack, Markov game, Dropout, Power control
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:uu:diva-321333 (URN)10.1016/j.automatica.2016.12.020 (DOI)000398010500023 ()
Available from: 2017-05-31 Created: 2017-05-31 Last updated: 2017-05-31Bibliographically approved
Biasson, A., Dey, S. & Zorzi, M. (2017). Decentralized Transmission Policies for Energy Harvesting Devices. In: 2017 Ieee Wireless Communications And Networking Conference Workshops (WCNCW): . Paper presented at IEEE Wireless Communications and Networking Conference (WCNC), MAR 19-22, 2017, San Francisco, CA. IEEE
Open this publication in new window or tab >>Decentralized Transmission Policies for Energy Harvesting Devices
2017 (English)In: 2017 Ieee Wireless Communications And Networking Conference Workshops (WCNCW), IEEE , 2017Conference paper, Published paper (Refereed)
Abstract [en]

The problem of finding decentralized transmission policies in a wireless communication network with energy harvesting constraints is formulated and solved using the decentralized Markov decision process framework. The proposed policy defines the transmission strategies of all devices so as to correctly balance the collision probabilities with the energy constraints. After an initial coordination phase, in which the network parameters are initialized for all devices, every node proceeds in a fully decentralized fashion. We numerically show that, unlike in the case without energy constraints where a fully orthogonal scheme can be shown to be optimal, in the presence of energy harvesting this is no longer the best choice, and the optimal strategy lies between an orthogonal and a completely symmetric system.

Place, publisher, year, edition, pages
IEEE, 2017
Series
IEEE Wireless Communications and Networking Conference Workshops, ISSN 2167-8189
National Category
Telecommunications
Identifiers
urn:nbn:se:uu:diva-333849 (URN)10.1109/WCNCW.2017.7919068 (DOI)000403338200021 ()978-1-5090-5908-9 (ISBN)
Conference
IEEE Wireless Communications and Networking Conference (WCNC), MAR 19-22, 2017, San Francisco, CA
Available from: 2017-11-17 Created: 2017-11-17 Last updated: 2018-11-08Bibliographically approved
Guo, X., Leong, A. S. & Dey, S. (2017). Distortion outage minimization in distributed estimation with estimation secrecy outage constraints. IEEE Transactions on Signal and Information Processing over Networks, 3(1), 12-24
Open this publication in new window or tab >>Distortion outage minimization in distributed estimation with estimation secrecy outage constraints
2017 (English)In: IEEE Transactions on Signal and Information Processing over Networks, E-ISSN 2373-776X, Vol. 3, no 1, p. 12-24Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate a class of distortion outage minimization problems for a wireless sensor network in the presence of an eavesdropper. The observation signals transmitted from the sensors to the fusion center (FC) are overheard by the eavesdropper. Both the FC and the eavesdropper reconstruct minimum mean squared error estimates of the physical quantity observed. We address the problem of transmit power allocation to minimize the distortion outage at the FC, subject to an expected total transmit power constraint across the sensor(s) and a secrecy outage constraint at the eavesdropper. Applying a rigorous probabilistic power allocation technique, we derive power policies for the full channel state information (CSI) case. Suboptimal power control policies are studied for the partial CSI case in order to reduce the high computational cost associated with large numbers of sensors or receive antennas. Numerical results show that significantly improved performance can be achieved by adding multiple receive antennas at the FC. In the case of multiple transmit antennas, the distortion outage at the FC can be dramatically reduced and in some cases completely eliminated, by transmitting the observations on the null space of the eavesdropper's channel or deploying an artificial noise technique, in the full CSI and partial CSI cases, respectively.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:uu:diva-306958 (URN)10.1109/TSIPN.2016.2612122 (DOI)000395668800002 ()
Available from: 2016-11-07 Created: 2016-11-07 Last updated: 2018-11-08Bibliographically approved
Guo, X., Leong, A. S. & Dey, S. (2017). Estimation in Wireless Sensor Networks With Security Constraints. IEEE Transactions on Aerospace and Electronic Systems, 53(2), 544-561
Open this publication in new window or tab >>Estimation in Wireless Sensor Networks With Security Constraints
2017 (English)In: IEEE Transactions on Aerospace and Electronic Systems, ISSN 0018-9251, E-ISSN 1557-9603, Vol. 53, no 2, p. 544-561Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the performance of distributed estimation schemes in a wireless sensor network in the presence of an eavesdropper. The sensors transmit observations to the fusion center (FC), which at the same time are overheard by the eavesdropper. Both the FC and the eavesdropper reconstruct a minimum mean-squared error estimate of the physical quantity observed. We address the problem of transmit power allocation for system performance optimization subject to a total average power constraint on the sensor(s), and a security/secrecy constraint on the eavesdropper. We mainly focus on two scenarios: 1) a single sensor with multiple transmit antennas and 2) multiple sensors with each sensor having a single transmit antenna. For each scenario, given perfect channel state information (CSI) of the FC and full or partial CSI of the eavesdropper, we derive the transmission policies for short-term and long-term cases. For the long-term power allocation case, when the sensor is equipped with multiple antennas, we can achieve zero information leakage in the full CSI case, and dramatically enhance the system performance by deploying the artificial noise technique for the partial CSI case. Asymptotic expressions are derived for the long-term distortion at the FC as the number of sensors or the number of antennas becomes large. In addition, we also consider multiple-sensor multiple-antenna scenario, and simulations show that given the same total number of transmitting antennas the multiple-antenna sensor network is superior to the performance of the multiple-sensor single-antenna network.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2017
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:uu:diva-324344 (URN)10.1109/TAES.2017.2649178 (DOI)000400905700002 ()
Available from: 2017-06-15 Created: 2017-06-15 Last updated: 2017-06-15Bibliographically approved
Leong, A. S., Quevedo, D. E., Tanaka, T., Dey, S. & Ahlén, A. (2017). Event-Based Transmission Scheduling and LQG Control Over a Packet Dropping Link. In: Denis Dochain, Didier Henrion, Dimitri Peaucelle (Ed.), 20th IFAC World Congress: . Paper presented at 20th World Congress of the International-Federation-of-Automatic-Control (IFAC),Toulouse, France, July 9-14, 2017. (pp. 8945-8950). Elsevier
Open this publication in new window or tab >>Event-Based Transmission Scheduling and LQG Control Over a Packet Dropping Link
Show others...
2017 (English)In: 20th IFAC World Congress / [ed] Denis Dochain, Didier Henrion, Dimitri Peaucelle, Elsevier, 2017, p. 8945-8950Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies a joint transmission scheduling and controller design problem, which minimizes a linear combination of the control cost and expected energy usage of the sensor. Assuming that the sensor transmission decisions are event-based and determined using the random estimation error covariance information available to the controller, we show a separation in the design of the transmission scheduler and controller. The optimal controller is given as the solution to an LQG-type problem, while the optimal transmission policy is a threshold policy on the estimation error covariance at the controller.

Place, publisher, year, edition, pages
Elsevier, 2017
Series
IFAC-PapersOnLine, E-ISSN 2405-8963 ; 50:1
National Category
Control Engineering
Identifiers
urn:nbn:se:uu:diva-330703 (URN)10.1016/j.ifacol.2017.08.1311 (DOI)000423964900477 ()
Conference
20th World Congress of the International-Federation-of-Automatic-Control (IFAC),Toulouse, France, July 9-14, 2017.
Available from: 2017-10-03 Created: 2017-10-03 Last updated: 2018-05-16Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-0762-5743

Search in DiVA

Show all publications