Next Article in Journal
Comparison of Total Hemispherical Reflectance and Emittance Values Between Metformin Extended-Release Tablets Stored Under Ambient and Stress Conditions
Previous Article in Journal
Strain Decay Monitoring and Analytical Prediction of RC Columns Using Brillouin Optical Technology and Time-Dependent Deterioration Factor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach

1
Institute of Complexity Science, College of Automation, Qingdao University, Qingdao 266071, China
2
Shandong Key Laboratory of Industrial Control Technology, Qingdao 266071, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(3), 742; https://doi.org/10.3390/s25030742
Submission received: 16 December 2024 / Revised: 22 January 2025 / Accepted: 23 January 2025 / Published: 26 January 2025
(This article belongs to the Section Sensor Networks)

Abstract

:
This study aims to explore the optimal power allocation problem under Distributed Denial of Service (DDoS) attack in wireless communication networks. The Starkberg Equilibrium (SE) framework is employed to analyze the strategic interactions between defenders and attacker under conditions of incomplete information. Considering the energy constraints of both sensors and attacker, this paper also proposes an Intrusion Detection System (IDS) based on remote estimation to achieve an optimal defense strategy, with Packet Reception Rate (PPR) serving as a criterion for intrusion detection. Targeting leaders and followers, the optimal power allocation solution is derived with Signal-to-Interference-Noise Ratio (SINR) and transmission cost as the objective functions. By combining the Adaptive Penalty Function (APF) method with the Differential Evolution (DE) algorithm, the study effectively addresses related non-linear and non-convex optimization problems. Finally, the effectiveness of the proposed method is verified through case studies.

1. Introduction

In recent years, cyber-physical systems (CPSs) have achieved fruitful results in the research field and have found extensive applications in domains including military defense, intelligent transportation, and smart grids [1,2,3,4,5]. However, due to the involvement of numerous critical infrastructures, any attack on CPSs can result in severe losses. With the emergence of various sophisticated intrusion techniques, attackers can disrupt network systems in a short period [6,7,8,9]. Major security incidents worldwide have highlighted the importance of CPS security issues. For example, in 2018, GitHub experienced 1.35 Tbps delayed traffic, leading to a 10 min service interruption; in September 2021, the Russian internet giant Yandex suffered a large-scale Distributed Denial of Service (DDoS) attack with requests per second reaching up to 21.8 million [10]. Therefore, with the rapid development of CPSs, the identification and prevention of network security intrusions have become particularly crucial.
In the literature [11,12,13], researchers have discussed the optimal power scheduling problem for Denial of Service (DoS) attacks based on Signal-to-Interference-plus-Noise Ratio (SINR) in CPSs, considering energy constraints of sensors and attackers. Li et al. [11] simulated the interaction decision-making process between sensors and attackers by establishing a Markov game framework. Ref. [12] proposed a Stackelberg Equilibrium (SE) framework to examine the strategic interaction between defenders and attackers in situations involving two distinct forms of incomplete information. Additionally, ref. [13] delved into a Stackelberg game involving a defender and multiple attackers. Distinguishing itself from the existing literature, which predominantly centers on equilibrium in static games, this study also reflects the dynamic process of Stackelberg games, demonstrating the intelligence of attackers in switching channel allocation for attack energy.
To ensure the security and reliability of network system resources, real-time monitoring of network transmissions is necessary to maintain confidentiality, integrity, and availability. The research in [14,15,16,17,18,19,20,21,22] proposes attack detection methods tailored to the constructed attack models, highlighting the existence of trade-off thresholds. In particular, the work in [19] designed a replay attack detection framework based on model-free reinforcement learning to effectively deal with attackers purposefully changing attack strategies. Furthermore, Agah et al. proved through a game theory framework that a Nash equilibrium is reached between attackers and Intrusion Detection System (IDS) [20]. In another study [22], a game-theoretic intrusion detection and defense method for DDoS attacks on the internet was proposed, modeling the interaction between the system and entities as a two-player Bayesian signal zero-sum game. These studies hold significant theoretical and practical value within the realm of network security, offering invaluable perspectives and solutions for real-time monitoring of network transmissions and the security of network system resources.
A Denial of Service (DoS) attack is a type of cyberattack where a single attacker floods a target system with excessive traffic or requests, aiming to overwhelm its resources and make it unavailable to legitimate users. The attack is typically launched from a single machine or a small number of machines [23,24,25,26,27,28]. A Distributed Denial of Service (DDoS) attack is a more advanced form of a DoS attack, where multiple compromised systems (often referred to as a “botnet”) are used to flood the target system with traffic. The distributed nature of the attack makes it much harder to defend against, as the traffic comes from many different sources, making it difficult to block all incoming connections without affecting legitimate users [6,29]. In most literature, Nash Equilibrium (NE) is commonly used to describe game situations where participants simultaneously choose actions. However, when decisions of defenders and attackers are made sequentially, the Stackelberg game framework is better suited to elucidate this procedure [12,30].
Although traditional DDoS attacks typically occur at the network layer, such as by flooding target servers with a large number of packets, physical layer attacks pose a significant threat in wireless sensor networks (WSNs). The open and interference-prone nature of wireless channels allows attackers to disrupt sensor node communications by transmitting high-power wireless signals, leading to degraded signal quality and even complete communication outages. Studies have shown that high-power interference can significantly reduce the signal-to-noise ratio (SINR) at the receiver, causing communication interruptions [31]. Additionally, physical layer attacks possess characteristics such as strong stealth and high energy efficiency, enabling attackers to achieve significant disruption with minimal energy expenditure [32]. To address this challenge, this study assumes that the attacker primarily influences system performance through physical layer interference. This assumption is supported by multiple studies that highlight the effectiveness of physical layer attacks in WSNs, especially under conditions of limited energy resources [33].
Unlike existing research, which typically assumes a static network environment and symmetric information between attackers and defenders [13,21], our study introduces dynamic channel changes, transmission costs, and the signal-to-interference-plus-noise ratio (SINR) into a Stackelberg game framework. This approach provides a more realistic simulation of real-world attack and defense scenarios. Additionally, our IDS uses remote state estimation for more precise detection, offering a clear advantage over traditional feature or anomaly-based methods. By considering energy constraints, environmental background noise, and time factors, we have developed a multi-stage Stackelberg game model that better reflects actual attack and defense interactions. These innovations significantly enhance system security and robustness, providing new theoretical and technical support for the field of wireless network security. The primary contributions of this research are outlined as follows:
  • Optimal energy scheduling under Distributed Denial of Service (DDoS) attack: The optimal energy scheduling problem is modeled in consideration of channels’ Signal-to-Interference-Noise Ratio (SINR) and transmission cost under Distributed Denial of Service (DDoS) attack. In the absence of an Intrusion Detection System (IDS), profit functions for the attacker and defenders are provided. To find the optimal solution, an improved differential evolution algorithm based on Adaptive Penalty Function (APF) is used to address the corresponding non-linear and non-convex optimization problems. Remote state estimation-based Detection System (IDS): We design an Intrusion Detection System (IDS) at the receiver end based on remote state estimation, using Packet Reception Rate (PPR) as the intrusion detection criterion. Unlike traditional feature- or anomaly-based methods [12,13], this approach is more suitable for real-world applications. Experimental results demonstrate that the presence of IDS can reduce the attacker’s profit and increase the defender’s profit. Multi-stage Stackelberg game model: A multi-stage Stackelberg game model is constructed to deal with the optimization problem, considering energy constraints of attacker and defenders, defenders’ awareness of environmental background noise, and introducing a time factor to build a finite-time Stackelberg game model. Compared to existing game models [12,13], our model better reflects the dynamic interactions between attackers and defenders, providing a more complex and realistic description of the attack and defense process. This new model offers valuable insights into developing effective defense strategies.
Notations: R n and R m represent the n-dimensional and m-dimensional Euclidean space. N and N + represent the sets of natural numbers and nonnegative integers, respectively. The superscript denotes transpose. The symbols P r ( · ) and E [ · ] represent the probability and expectation. S + n is the aggregation of n × n positive semidefinite matrices. x · y is defined as x y for vectors x and y. 1 N = { 1 , 1 , , 1 } N   dimensional . ρ ( · ) presents the spectral radius of a matrix. For any two functions f and g, their composition is defined as ( f g ) ( x ) = f ( g ( x ) ) .

2. Model Setup

2.1. Process and Sensor Model

We consider discrete linear systems with multiple sensors as shown in Figure 1, consisting of a total of N independent discrete-time linear time-invariant systems and N sensors. The i-th sensor monitors the i-th system as follows:
x i k + 1 = A i x i k + u i k y i k = C i x i k + v i k ,
where i 1 , 2 , N , the time index k N + . A i R n i × n i is the state transition matrix, where n i is the dimension of the state vector x i k R n i . C i R m i × m i is the observation matrix, where m i is the dimension of the observation vector y i k R m i . u i k R n i and v i k R m i are independent zero-mean Gaussian white noises, satisfying E [ u i k u i t ] = Q i R n i × n i , E [ v i k v i t ] = R i R m i × m i , E [ u i k v i t ] = 0 , the covariance Q i 0 , R i 0 , t , k N + , i = 1 , 2 , , N . The initial state x i 0 is a zero-mean Gaussian random vector with covariance Σ i 0 0 , which is uncorrelated with u i k and v i k . To avoid trivial issues, we assume that the system is unstable, i.e.,  ρ ( A i ) > 1 , i = 1 , 2 , , N . We assume that ( A i , C i ) is observable, and  ( A i , Q i ) is controllable.
We assume that the sensors are “smart” and have sufficient computational capabilities. Following the measurement of the respective system at time step k, every sensor initiates a local Kalman filter to gauge the state of the process, incorporating all amassed measurements up to time k [34]. Subsequently, each sensor forwards its local estimate to a remote estimator. Based on the local estimate of the current state, we can calculate the minimum error estimate x ^ i k of the local state of the i-th subsystem and the corresponding estimate error covariance matrix P ^ i k :
x ^ i k = E [ x i k | y i 0 , y i 1 , , y i k ]
P ^ i k = E [ ( x i k x ^ i k ) ( x i k x ^ i k ) | y i 0 , y i 1 , , y i k ] .
Computed by standard Kalman filtering [35]:
( x ^ i k , P ^ i k ) = KF ( x ^ i k 1 , P ^ i k 1 , y i 0 , , y i k ) .
We further define the Lyapunov operator and Riccati operators h i and g ˜ i : S + n S + n :
h i ( X ) A i X A i + Q i
g ˜ i ( X ) X X C i [ C i X C i + R i ] 1 C i X
h i k ( X ) = Δ h i h i h i k times ( X ) .
where ∘ denotes the k-fold composition of the function h i , i.e., the function h i applied consecutively k times. X S + n is an n × n symmetric positive semi-definite matrix, representing the system’s covariance matrix or the estimation error covariance matrix.
The local estimate error covariance P ^ i k converges to a steady-state value at an exponential rate. Therefore, we make the assumption:
P ^ i k = P i ¯ , k 1 , i 1 , 2 , , N ,
where P i ¯ is the unique positive semi-definite solution to g i ˜ h i .

2.2. Communication Model with SINR

After receiving the data packet, sensor i obtains a local estimate x ^ i k , which is then sent to the data fusion center through a wireless lossy channel. Due to channel attenuation and interference effects, random data loss occurs. To simulate this scenario, we assume that the channel uses an Additive White Gaussian Noise (AWGN) channel with Quadrature Amplitude Modulation (QAM) [11]. Subsequently, utilizing digital communication theory reveals the relationship between Symbol Error Rate (SER) and signal-to-noise ratio (SNR) [24]:
S E R = 2 G ( ϖ S N R ) , G ( x ) 1 2 π x e ϱ 2 2 d ϱ ,
where ϖ > 0 is a parameter.
SNR can be described as:
ι i k ζ i θ i k σ i 2 + j = 1 , j i N H i j ζ j θ j k ,
where ζ i > 0 is the fading channel gain for channel i, σ i is the background noise, θ i k represents the transmission power allocated by sensor i to channel i at time k, H i j is the correlation coefficient between channels i and j.
We assume that DDoS attacks primarily occur at the physical layer, where the attacker interferes with sensor node communications by transmitting high-power wireless signals. If considering a DDoS attack on channel i, the SNR should be modified to the signal-to-interference-plus-noise ratio (SINR) as follows:
μ i k ζ i θ i k σ i 2 + j = 1 , j i N H i j ζ j θ j k + ϕ i δ i k ,
where ϕ i > 0 is the fading channel gain for the attacker on channel i, and δ i k represents the transmission power allocated by the attacker to channel i at time k. Additionally, for sensors and attackers, the cost of transmitting unit power is assumed to be β d and β a , respectively. In CPSs, wireless channels are susceptible to external interference. Attackers can significantly reduce the SINR at the receiver by increasing the transmission power δ i k , thereby impacting the system’s performance.

2.3. DDoS Attack

Distributed Denial of Service (DDoS) attacks can block communication between components of cyber-physical systems (CPSs), thereby reducing the overall system performance. In current research, the attacker weakens system performance by continuously invading and maliciously disrupting communication channels. In real-life scenarios, energy constraints are an unavoidable issue for both sensors and attackers, impacting the performance of remote estimation and the strategies of both sides. Due to the presence of energy constraints, sensors need to manage energy efficiently to prolong their operational time, while attackers may exploit this limitation to design more destructive attack strategies. Therefore, when designing and deploying remote estimation systems, considering energy constraints is crucial for system stability and security. Attackers can use noise to interfere with communication channels between sensors and the fusion center.
In practical applications, both the defender and the attacker can estimate each other’s power levels by monitoring Channel State Information (CSI) or through other methods such as historical data analysis and predictive models [36,37]. Therefore, we assume that at time k, the defender knows the total power of the attacker is δ ¯ k , and the attacker knows the total power of the defender is θ ¯ k . Here, δ ¯ k = i = 1 N δ i k represents the total power of the attacker across all channels at time k, while θ ¯ k = i = 1 N θ i k represents the total power of the defender across all channels at time k. On channel i, the total power of the attacker and the defender over the time horizon T is denoted as δ ¯ i and θ ¯ i , respectively, where δ ¯ i = k = 1 T δ i k , θ ¯ i = k = 1 T θ i k . Within the entire time range T, the total power of the attacker and the defender across all channels is denoted as δ ¯ and θ ¯ , respectively, where δ ¯ = i = 1 N k = 1 T δ i k , θ ¯ = i = 1 N k = 1 T θ i k .
In practical applications, attackers face energy budget constraints and therefore need to carefully decide whether to launch the DDoS attack on the wireless channel at each sampling instant. This strategic decision involves balancing the impact of the attack with energy expenditure. Attackers may formulate attack strategies based on system performance metrics, communication requirements, and their own energy resources. By effectively managing energy budgets and strategically timing attack, attackers can maximize the impact on the performance of remote estimators while ensuring their ability to sustain attack behavior. We use γ i k = 1 to represent the attacker’s attack on channel i at time k; otherwise, γ i k = 0 . Within a finite time domain T, the i-th communication channel suffers a DDoS attack denoted by δ i { δ i 1 , δ i 2 , , δ i k , , δ i T } , i = 1 , 2 , , N . If δ i k > 0 , then γ i k = 1 ; if δ i k = 0 , then γ i k = 0 . Within the time domain T, assuming the DDoS attacker applies constant interference power on the i-th communication channel, when the constant power δ i k is given, we can determine the total number of attacks on channel i within the time range T as γ i = δ ¯ i δ i k .
Therefore, the attacker’s attack strategy δ can be represented as:
δ { δ 1 , δ 2 , , δ N } ,
The energy constraint faced by the attacker is:
i = 1 N k = 1 T δ i k = δ ¯ , 0 δ m i n δ i k δ m a x ,
where δ m i n and δ m a x represent the lower and upper power limits of δ i k , respectively.
Similarly, we use ϑ i k = 1 to represent the i-th sensor selecting to transmit a data packet at time k; otherwise, ϑ i k = 0 . Within a finite time domain T, the i-th sensor sends data packets denoted by θ i { θ i 1 , θ i 2 , , θ i k , , θ i T } , i = 1 , 2 , , N . If θ i k > 0 , then ϑ i k = 1 ; if θ i k = 0 , then ϑ i k = 0 . Assuming the i-th sensor maintains a constant transmission power within the time domain T, when the constant power θ i k is given, we can determine the total number of data packets sent by the i-th sensor within the time range T as ϑ i = θ ¯ i θ i k .
Therefore, the sensor’s transmission strategy θ can be represented as:
θ { θ 1 , θ 2 , , θ N } ,
The energy constraint faced by the sensor is:
i = 1 N k = 1 T θ i k = θ ¯ , θ m i n θ i k θ m a x ,
where θ m i n and θ m a x represent the lower and upper bounds of the transmission power θ i k , respectively.

2.4. Remote Estimation with a Lossy Channel

In each time step k, sensor i transmits its result from the local Kalman filter x ^ i k to a fusion center through a lossy communication channel. Let α i k 0 , 1 represent whether the data packet is received by the fusion center without errors. If it is successfully received, α i k = 1 ; otherwise, α i k = 0 . When an attacker launches an attack and blocks the channel, sensor data packets are received with a probability ω i k . Assume that α i k follows a Bernoulli distribution and
P r ( α i k = 1 ) = ω i k .
Using D ( δ ) to represent all the data packets received by the remote estimator at time step k, the remote estimator estimates the minimum mean square error x ¯ i k and covariance P ¯ i k ( δ ) of the remote end based on the received D ( δ ) , as follows:
x ¯ i k = E [ x i k | D ( δ ) ] ,
P ¯ i k = E [ ( x i k x ¯ i k ) ( x i k x ¯ i k ) | D ( δ ) ] .
If x ^ i k is successfully received, it is used to estimate x ¯ i k ; otherwise, the estimator forecasts the estimate using its prior estimate and the system model. Therefore, the minimum mean square error x ¯ i k and covariance P ¯ i k obtained by the remote estimator can be derived as follows:
( x ¯ i k , P ¯ i k ) = ( x ^ i k , P ¯ i ) , if x ^ i k arrives , A i x ¯ i k 1 , h i ( P ¯ i k 1 ) , otherwise .
At time k, P ¯ i k can only take values from a finite set P ¯ i , h i P ¯ i , h i 2 P ¯ i , , h i k P ¯ i , where h i P ¯ i satisfies P ¯ i h i P ¯ i h i 2 P ¯ i h i k P ¯ i .
Therefore, we can represent the expected error covariance as:
E P ¯ i k = ω i k P ¯ i + ( 1 ω i k ) h i ( E P ¯ i k 1 ) .

3. Payoff Functions

This section will present the payoff functions of attackers and defenders in Figure 1 (Section 3.1), as well as the payoff functions of both parties with the presence of the Intrusion Detection System (IDS) detector in Figure 2 along with the corresponding constraint conditions (Section 3.2).

3.1. Rewards

We assume that the likelihood of the sensor perceiving solely background noise in the environment is denoted by ε 1 . Therefore, the probability of a Intrusion Detection System (IDS) occurring is ( 1 ε 1 ) . The N systems we are considering are mutually independent, so we assume that the attack sequence for each system satisfies the following form:
( 0 , , 0 , 1 , , 1 κ i , 1 , 0 , , 0 , 1 , , 1 κ i , 2 , 0 , , 0 , 1 , , 1 κ i , , 0 , , 0 )
where 1 represents the attacker choosing to attack the channel at this moment, and 0 represents the attacker choosing not to attack at this moment, satisfying: s = 1 κ i , s = γ i = δ ¯ i δ i k .
To evaluate the quality of estimation within the time interval T, we introduce the profit function of the attacker:
O a ( θ , δ ) = 1 T k = 1 T { i = 1 N ζ i θ i k σ 2 + j = 1 , j i N H i j ζ j θ j k + ϕ i δ i k + β d i = 1 N θ i k β a i = 1 N δ i k } = 1 T 1 T · { ( 1 N · μ ) + β d ( 1 N · θ ) β a ( 1 N · δ ) } ,
where
μ i k = { μ i 1 , μ i 2 , , μ i T } , μ = { μ 1 , μ 2 , , μ N } ,
In (21), β a ( 1 N · δ ) represents the total power cost for the attacker. Additionally, introducing β d ( 1 N · θ ) in the attacker’s reward function aims to deplete the defender’s energy.
Similarly, we assume that the transmission sequence for each sensor satisfies the following form:
( 1 , , 1 χ i , 1 , 0 , , 0 , 1 , , 1 χ i , 2 , 0 , , 0 , 1 , , 1 χ i , )
The equation to satisfy is s = 1 χ i , s = ϑ i = θ ¯ i θ i k .
To evaluate the quality of estimation within the time interval T, we introduce the profit function of the defender:
O d ( θ , δ ) = 1 T k = 1 T { ε 1 i = 1 N ζ i θ i k σ 2 + j = 1 , j i N H i j ζ j θ j k β d i = 1 N θ i k + ( 1 ε 1 ) i = 1 N ζ i θ i k σ 2 + j = 1 , j i N H i j ζ j θ j k + ϕ i δ i k = 1 T 1 T · { ε 1 ( 1 N · ι ) β d ( 1 N · θ ) + ( 1 ε 1 ) ( 1 N · μ ) } ,
where
ϑ i k = { ϑ i 1 , ϑ i 2 , , ϑ i T } , ϑ = { ϑ 1 , ϑ 2 , , ϑ N } ,
In (22), β d ( 1 N · θ ) represents the total power cost for the defender.

3.2. Profit Function in the Presence of an IDS

In practical applications, when the estimator detects data loss due to unknown factors such as environmental changes or enemy intrusions, an Intrusion Detection System (IDS) is typically introduced at the receiving end, as shown in Figure 2, to effectively mitigate these influencing factors. This section introduces the concept of Packet Reception Rate (PRR) at the receiver end as a standard for intrusion detection. PRR refers to the ratio between successfully received packets by the estimator and the packets sent by the sensor. Therefore, P R R i can be expressed as:
P R R i = i k ,
The parameter k represents the length of the time window, and the parameter i represents the number of packets received on the i-th channel within that time window.
Remark 1. 
When the packet reception rate is low, indicating a high packet loss rate, an Intrusion Detection System (IDS) may infer the presence of intruders in the system and issue an alert. To ensure the safe arrival of packets at the remote computer, sensors can adopt new technologies such as channel hopping. Channel hopping is a technique that dynamically changes channels during communication, enhancing the reliability and security of data transmission. Specifically, channel hopping technology switches between different channels at different time intervals, allowing packets to be transmitted through multiple channels. The benefit of this approach is that even if a specific channel experiences interference or packet loss, the system can still transmit data through other channels, improving the overall reliability of the communication link. By using channel hopping technology, sensors can select available channels to ensure that packets reach the remote computer safely, reduce the likelihood of packet loss, and enhance the performance and security of the system.
We assume that when P R R i P R R i 0 , an alert will be triggered, where P R R i 0 represents a predefined threshold value for triggering the alert.
Lemma 1. 
P R R i P R R i 0 P ¯ i k > h d i ( P ¯ i ) , k = 1 , 2 , , T , where d i = k i 0 , i 0 = m a x { i | i k P R R i 0 } .
Proof. 
The triggering condition of the alarm P R R i P R R i 0 is equivalent to i i 0 . Therefore, we assume that the number of packet losses d i n u m for the i-th channel in any time window is less than or equal to d i n u m d i = k i 0 , which leads to P ¯ i k h d i ( P ¯ i ) . This contradicts the triggering condition P R R i P R R i 0 ; thus, the assumption is not valid. By proof of contradiction, it is demonstrated that the triggering condition P R R i P R R i 0 is also equivalent to d i n u m > d i = k i 0 .    □
From Lemma 1, it can be deduced that if the length of any attack sequence does not exceed d i , the attack will not be detected by the detector. In fact, the attacker can steal the values of time window k and P R R i 0 through the wireless channel, and then take action to carry out the attack. When the system has an IDS detector, the optimization of the payoff functions for the attacker and defender is as follows:
O a I D S ( θ , δ ) = O a ( θ , δ ) 1 T k = 1 T i = 1 N s = 1 ( d i κ i , s ) ζ i θ i k σ 2 + j = 1 , j i N H i j ζ j θ j k + ϕ i δ i k = 1 T 1 T · { ( 1 N · μ [ 1 s · ( d κ ) ] ) + β d ( 1 N · θ ) β a ( 1 N · δ ) }
O d I D S ( θ , δ ) = O d ( θ , δ ) + 1 T k = 1 T i = 1 N s = 1 ( d i κ i , s ) ζ i θ i k σ 2 + j = 1 , j i N H i j ζ j θ j k + ϕ i δ i k = 1 T 1 T · { ε 1 ( 1 N · ι ) β d ( 1 N · θ ) + ( 1 ε 1 ) ( 1 N · μ [ 1 s · ( d κ ) ] ) ,
where
κ i , s = κ 1 , κ 2 , , κ N ; κ i = κ i , 1 , κ i , 2 , , κ i , d i = d 1 , d 2 , , d N .
In reality, the attacker can eavesdrop on the values of time i and k through wireless channels before taking any attack actions. In order not to be detected by the IDS, on the basis of the optimal attack strategy of the attacker in (13), a constraint condition is added:
κ i , s d i , i = 1 , 2 , , N , s = 1 , 2 , , .
Both the sensor and the attacker aim to maximize their own objective functions. Under the premise of energy constraints, the optimal strategies for both sides need to be found, and the main problem 1 needs to be solved.
Problem 1. 
The optimal attack schedule for the attacker:
Ω a * ( δ ) = a r g m a x O a I D S ( θ , δ ) s . t . i = 1 N k = 1 T δ i k = δ ¯ , 0 δ m i n δ i k δ m a x , κ i , s d i , i = 1 , 2 , , N , k = 1 , 2 , , T , s = 1 , 2 , , ;
and the optimal defense schedule for the defender:
Ω d * ( θ ) = a r g m a x O d I D S ( θ , δ ) s . t . i = 1 N k = 1 T θ i k = θ ¯ , 0 θ m i n θ i k θ m a x , i = 1 , 2 , , N , k = 1 , 2 , , T .

4. Stackelberg Game for the Optimization Problem

The Stackelberg game is an important model in game theory. It describes a game process between a leader and a follower, where the defender, as the leader, formulates a strategy first, and the attacker reacts after observing the defender’s strategy. Both parties can formulate their own optimal strategies by analyzing the best response of the other party, and thus engage in a repeated game process, gradually approaching an equilibrium point. Under conditions of incomplete information, both parties need to infer the possible behaviors of the other party based on known information and probabilities, in order to formulate the optimal strategy. The elements of the Stackelberg game framework outlined in this paper are as follows:
  • Players: N sensors and a Distributed Denial of Service (DDoS) attack.
  • Strategy: The strategies of the defender and attacker are, respectively, θ { θ 1 , θ 2 , , θ N } and δ { δ 1 , δ 2 , , δ N } .
  • Reward: The reward function of the defender is O d I D S ( θ , δ ) , and the reward function of the attacker is O a I D S ( θ , δ ) .
  • Interaction: A continuous-time two-stage dynamic game. First, the defender makes a decision as the leader, and then the attacker makes their own decision based on the defender’s decision, and so on.
We define the best responses of both sides in the game as follows [38].
Definition 1. 
The best response is the action that brings the maximum return to a player while taking into account the actions of the other players. Specifically, the best responses for the defender and attacker are Ω d * ( θ ) and Ω a * ( δ ) , respectively.
Theorem 1. 
The solution of the Stackelberg game first involves calculating:
θ S E = Ω d * ( Ω a * ( θ S E ) ) ,
then computing
δ S E = Ω a * ( δ S E ) ,
Thus, ( θ S E , δ S E ) ( θ , δ ) represents the equilibrium solution of the Stackelberg game.
Proof. 
When the defender’s defense strategy θ is given, the attacker chooses the attack strategy as δ = Ω a * ( θ ) . The defender is aware of this reaction from the attacker, so the defender will choose a corresponding defense strategy to maximize their payoff O d ( θ , Ω a * ( θ ) ) , which can be represented as:
θ S E = Ω d * ( Ω a * ( θ S E ) ) .
Upon observing the defender’s strategy θ S E , the attacker responds accordingly to determine the optimal strategy δ S E :
δ S E = Ω a * ( δ S E ) .
Proof completed.    □
Remark 2. 
The Stackelberg equilibrium ( θ S E , δ S E ) and the Nash equilibrium ( θ N E , δ N E ) have significant differences. In the Stackelberg model, the leader first chooses the strategy θ S E , and then the follower selects the optimal response δ S E based on the leader’s strategy. This sequential decision making mechanism allows the leader to optimize global performance, maximize the system’s total utility, and enhance security. In contrast, in the Nash equilibrium, all participants choose their strategies simultaneously, with each participant’s strategy considering only their own interests, which can lead to suboptimal solutions, especially in cases of conflict or competition. Additionally, the Stackelberg model typically offers better stability and predictability, making it suitable for long-term planning and global optimization scenarios. On the other hand, the Nash model may exhibit higher short-term utility in environments with high information transparency and ideal market conditions, but it tends to be less stable in dynamic and complex environments. The Stackelberg equilibrium must satisfy the following conditions:
O d I D S ( θ , δ * ) O d I D S ( θ * , δ * ) ,
O a I D S ( θ * , δ ) O a I D S ( θ * , δ * ) .
Considering the conditions that need to be met in problem 1, we design the attacker’s best response through the following optimization problem:
Problem 2. 
m a x δ 1 T 1 T · { ( 1 N · μ [ 1 s · ( d κ ) ] ) } s . t . ( 1 N · δ ) δ ¯ = 0 , 0 δ m i n δ i k δ m a x , κ i , s d i , i = 1 , 2 , , N , s = 1 , 2 , , ,
which is equivalent to the following problem:
Problem 3. 
m i n δ 1 T · { ( 1 N · μ [ 1 s · ( d κ ) ] ) } s . t . ( 1 N · δ ) δ ¯ = 0 , 0 δ m i n δ i k δ m a x , κ i , s d i , i = 1 , 2 , , N , s = 1 , 2 , , .
Then, by calculation, we can obtain
1 T · { ( 1 N · μ ) } δ i k = ( 1 + d i κ i , s ) ζ i θ i k ϕ i [ σ 2 + j = 1 , j i N ( H i j ζ j θ j k + ϕ i δ i k ) ] 2
and
2 1 T · { ( 1 N · μ ) } δ i k 2 = ( 1 + d i κ i , s ) 2 ζ i θ i k ϕ i 2 [ σ 2 + j = 1 , j i N ( H i j ζ j θ j k + ϕ i δ i k ) ] 3 .
The results indicate that when θ i k > 0 and κ i , s < d i + 1 , we have 2 1 T { ( 1 N μ ) δ i k 2 > 0 . Clearly, for all θ i k = 0 , we have δ i k ( θ ) = 0 . The attacker can observe the defense strategy chosen by the defender; therefore, they only launch attacks upon detecting the transmission of sensor data to save energy. We assume that at time k, if  i Ξ , then θ i k > 0 ; if i N Ξ , then θ i k = 0 , where Ξ = 1 , 2 , , ψ , ψ denotes the number of θ i k > 0 . Therefore, (36) can be solved through the following convex optimization problem:
Problem 4. 
m i n δ 1 T · { ( 1 N · μ [ 1 s · ( d κ ) ] ) } s . t . ( 1 ψ · δ ) δ ¯ = 0 , δ i k δ m a x 0 , δ i k + δ m i n 0 , κ i , s d i 0 , i = 1 , 2 , , ψ , s = 1 , 2 , , ,
where
μ ^ = { μ 1 , μ 2 , , μ ψ } , γ ^ = { γ 1 , γ 2 , , γ ψ } , δ ^ = { δ 1 , δ 2 , , δ ψ } .
Theorem 2. 
If the defender’s strategy is θ, then the attacker’s best response can be calculated by the following formula:
δ i k ( θ ) = m a x 1 ϕ i ( 1 + d i κ i , s ) ζ i θ i k ϕ i Φ ¯ i k σ 2 j = 1 , j i N H i j ζ j θ j k , 0 , i Ξ 0 , i N Ξ
where Φ ¯ i k is obtained from the following equation:
k = 1 T i = 1 ψ m a x 1 ϕ i ( 1 + d i κ i , s ) ζ i θ i k ϕ i Φ ¯ i k σ 2 j = 1 , j i N H i j ζ j θ j k , 0 = δ ¯ .
Proof. 
We define the Lagrangian function at each time point k as:
L ( δ ^ , k , k , i k , k ) = 1 T · { ( 1 N · μ [ 1 s · ( d κ ) ] ) } + i = 1 ψ i k ( δ i k δ m a x ) + i = 1 ψ i k ( δ i k + δ m i n ) + i = 1 ψ i k ( κ i , s d i ) + 0 k [ ( 1 ψ · δ ) δ ¯ ] ,
where 0 k > 0 , i k 0 , 0 k 0 , i k 0 , i = 1 , 2 , , ψ . Thus, the Karush–Kuhn–Tucker (KKT) conditions can be represented as:
L ( δ ^ , k , k ) δ i k = 0 , i Ξ
( 1 ψ · δ ) δ ¯ = 0
0 k [ ( 1 ψ · δ ) δ ¯ ] = 0
i k ( δ i k δ m a x ) = 0 , i Ξ
i k ( δ i k + δ m i n ) = 0 , i Ξ
i = 1 ψ i k ( κ i , s d i ) = 0 , i Ξ
δ i k δ m a x 0
δ i k + δ m i n 0 , i Ξ
κ i , s d i 0 , i Ξ
Through Equations (44) to (52), we systematically verify each part of the KKT conditions. Equation (44) ensures that the gradient of the objective function, when combined linearly with the Lagrange multipliers of all constraints, is zero, thereby satisfying the stationarity condition. Equations (45) to (49) ensure that all primal feasibility and dual feasibility conditions are met, including constraints such as energy limits and transmission power limits. Equations (50) to (52) utilize the complementary slackness conditions to determine which constraints are active, i.e., which constraints are binding at the optimal solution, where
L ( δ ^ , k , k , i k , k ) δ i k = ( 1 + d i κ i , s ) ζ i θ i k ϕ i [ σ 2 + j = 1 , j i N ( H i j ζ j θ j k + ϕ i δ i k ) ] 2 + 0 k + i k + k + k + i k ,
Define Φ ¯ i k = 0 k + i k + k + k + i k > 0 . Therefore, the relationship between δ i k and θ is given by (41).    □
Remark 3. 
It should be noted that Φ ¯ i k is crucial for designing the optimal strategy δ i k ( θ ) and the parameters Φ ¯ i k should be computed first. However, since Φ ¯ i k is not easily computable, we provide Algorithm 1 to solve for it.
Algorithm 1 Calculating parameter Φ ¯ i k
1:
Calculate Φ ¯ i k = ζ i θ i k ϕ i [ σ 2 + j = 1 , j i N H i j ζ j θ j k ] 2 , i Ξ
2:
Sort Φ ¯ i k : 0 Φ ¯ i 1 k Φ ¯ i 2 k Φ ¯ i ψ k
3:
Find Φ ¯ i k [ Φ ¯ i h 1 k , Φ ¯ i h k ] such that f ( Φ ¯ i h k ) δ ¯ f ( Φ ¯ i h 1 k ) , where f ( Φ ¯ ) = k = 1 T w = h ψ 1 ϕ i w ζ i w θ i w k ϕ i w Φ ¯ σ 2 w = h , w h ψ H i w j ζ j w θ j w k
4:
if f ( Φ ¯ ) = δ ¯ , then Φ ¯ i k = Φ ¯
The defender’s best response can be obtained by solving the following optimization problem:
m a x G ( ι ( θ ) , μ ( θ ) ) s . t . ( 1 N · θ ) θ ¯ = 0 , 0 θ m i n θ i k θ m a x . i = 1 , 2 , , N , k = 1 , 2 , , T ,
where G ( ι ( θ ) , μ ( θ ) ) = 1 T · { ε 1 ( 1 N · ι ( θ ) ) + ( 1 ε 1 ) ( 1 N · μ ( θ ) [ 1 s · ( d κ ) ] ) } .
Theorem 3. 
If ε 1 ( 0 , 1 ) is given, then there exists θ S E θ , so the defender’s best strategy can be θ S E . After obtaining θ S E , Algorithm 2 can be used to calculate δ S E δ . Therefore, ( θ S E , δ S E ) is the Stackelberg equilibrium.
Algorithm 2 APF-based Differential Evolution
1:
Construct adaptive penalty function:
Θ ( θ ) = Δ ( θ ) + η ( θ ) Λ ( θ )
where Δ ( θ ) = 1 T { ε 1 ( 1 N ι ( θ ) ) + ( 1 ε 1 ) ( 1 N μ ( θ ) [ 1 s ( d κ ) ] ) } , η ( θ ) = 1 + Δ ( θ ) 1 + Λ ( θ ) , Λ ( θ ) = ( 1 N θ ) θ ¯
2:
Initialize:  θ i k ( G ) represents an N-dimensional variable, where i = 1 , 2 , , N p and G is the generation. Choose θ j , i k ( 0 ) = θ j m i n k + r a n d ( 0 , 1 ) ( θ j m a x k θ j m i n k ) , where i = 1 , 2 , , N p , j = 1 , 2 , , N and θ j m i n k θ j k θ j m a x k .
3:
Variation: Generate variogram vector, as follows: δ i k ( G ) = θ z 1 k ( G ) + F ( θ z 2 k ( G ) θ z 3 k ( G ) ) , where z 1 , z 2 , z 3 1 , 2 , , N p and z 1 z 2 z 3 , and the adaptive mutation operator F can be given by F = F 0 × 2 , where = e 1 G m a x G m a x + 1 G . G m a x represents the maximum generation.
4:
Crossover: Denote δ i k ( G + 1 ) = [ δ 1 , i k ( G + 1 ) , , δ N , i k ( G + 1 ) ] ,
If  r a n d ( 0 , 1 ) C R or j = j r a n d ,
     δ j , i k ( G + 1 ) = δ j , i k ( G + 1 )
else
     δ j , i k ( G + 1 ) = θ j , i k ( G + 1 )
where C R is crossover operator, and  j r a n d { 1 , 2 , , N } is a sequence selected randomly.
To obtain the defender’s strategy, the optimization problem (54) needs to be solved. However, due to the nonlinearity and possible non-convexity of the reward function O d I D S ( θ , δ ( θ ) ) , solving (54) is not easy. This paper combines the Adaptive Penalty Function (APF) method and the Differential Evolution Algorithm to handle related non-convex and nonlinear optimization problems [39]. Algorithm 2 details the main steps of the Differential Evolution algorithm based on APF. Differential Evolution (DE) is an efficient global optimization algorithm suitable for nonlinear, non-convex, and multimodal problems. Artificial Potential Field (APF) is a path-planning method that quickly finds feasible paths using potential fields. By combining DE and APF, we leverage DE’s global search capabilities to find the global optimum and APF’s local guidance to speed up convergence. This integration enhances optimization efficiency and better handles complex environments and constraints. Once θ S E is obtained, the attacker’s best response δ S E can be calculated according to Theorem 2.

5. Simulations

In this section, we use numerical examples to demonstrate the theoretical results of the Stackelberg game strategies under the presence of Intrusion Detection System (IDS) detectors as proposed in this paper. We set the following parameters: N = 3 ,   T = 1000 ,   ζ = [ 0.2 ; 0.3 ; 0.3 ] , ϕ = [ 0.3 ; 0.2 ; 0.2 ] ,   σ 2 = 0.02 ,   β d = 0.2 ,   β a = 0.2 ,   0 θ j k 5 ,   H 12 = 0.01 ,   H 13 = 0.03 , H 21 = 0.02 ,   H 23 = 0.01 ,   H 31 = 0.01 ,   H 32 = 0.02 ,   N p = 50 ,   G = 100 ,   F = 0.4 ,   C R = 0.3 , P R R 1 0 = P R R 2 0 = P R R 3 0 = P R R 0 . To further validate the proposed framework’s effectiveness in practical wireless communication, we refer to recent experiments using real-world datasets and testbeds. For instance, ref. [40] evaluated a similar strategy on an IEEE 802.11-based testbed, showing improved throughput and SINR under interference. Similarly, ref. [41] used USRP devices to simulate a multi-user environment and showed effective attack mitigation while maintaining high communication quality. These studies demonstrate advantages and achievements from different perspectives, providing useful references. It is worth noting that our proposed framework includes an IDS detector. Compared with [12], its uniqueness is introducing this detector at the estimator end. This innovation makes our framework more effective in practical scenarios. Through in-depth analyses, we find it more robust and applicable, offering more reliable guarantees and better performance.
When the IDS does not exist in the system model, as shown in Figure 1, the reward functions of both sides are as given by Equations (21) and (22). Keeping other parameters constant, we can establish the relationship between time k and the reward functions of both sides, as shown in Figure 3. In this paper, we have designed an IDS at the remote estimator end, as depicted in Figure 2. By choosing ε 1 = 0.6 and P R R 0 = 5 , we are able to obtain the relationship between time k and the reward functions of both sides, as shown in Figure 4, as well as the strategic choices of both participants when reaching equilibrium in Figure 5. The three graphs from top to bottom in Figure 5, respectively, display the strategy values of attackers and defenders on channels 1, 2, and 3. By comparing Figure 3 and Figure 4, it can be observed that the proposed IDS detector in this paper can reduce the reward value of attackers and effectively increase the reward value of defenders. In Figure 4, after each participant undergoes 650 iterations, the reward function converges to the optimal value.
By solving Theorem 2 and Algorithm 2, the relationship between the boundary values P R R 0 , ε 1 triggering alarms in the IDS detector, and the reward values of both players is illustrated in Figure 6. We choose P R R 0 [ 0 , 10 ] and ε 1 [ 0 , 1 ] . The first graph in Figure 6 represents the reward function of the defender, while the second graph illustrates the reward function of the attacker. From the graph, we can conclude that when P R R 0 is fixed, ε 1 has a significant impact on O d I D S ( θ , δ ) , with an increase in ε 1 corresponding to a larger O d I D S ( θ , δ ) . The influence of ε 1 on O a I D S ( θ , δ ) is minimal. When ε 1 is determined, changes in P R R 0 result in different reward values for both players in the game. As P R R i 0 transitions from 0 to 1, it is evident that the reward function value of the attacker sharply decreases, while the defender’s reward value slightly increases. For P R R i 0 1 the attacker’s reward value exhibits minor periodic fluctuations, while the defender’s reward value remains relatively stable.
In the simulation, we can select the range of values for θ j k based on the communication constraints of each channel, which in turn affects the optimization results. Therefore, the results obtained may not be the optimal solution but a suboptimal one. Given this, the nonlinear and non-convex optimization proposed in this paper can provide a feasible solution. In Figure 4, we have chosen 0 θ j k 5 . If we set 0 θ j k 0.5 , the reward function values for both parties are depicted in Figure 7.
Our optimization scheme combines the global search capabilities of Differential Evolution (DE) with the local guidance advantages of the Artificial Potential Field (APF) method. The time complexity of DE is O ( N p × G × D ) , where N p is the population size, G is the maximum number of iterations, and D is the dimensionality of each individual. This complexity arises from the matrix operations involved in evaluating the fitness function. The time complexity of APF is O ( N 2 ) , primarily dependent on the number of nodes N and the size of the channel gain matrix H. Therefore, the overall time complexity of our combined approach is O ( N p × G × ( D + N 2 ) . Based on our current experimental setup ( N = 3 ,   T = 1000 ,   N p = 50 ,   G = 100 ), the average runtime is 2.5 s. Although these experiments were conducted on a smaller scale, we can extrapolate the performance for larger scales by adjusting parameters (e.g., N = 50 ,   N p = 200 ,   G = 500 ). Our complexity analysis suggests that while runtime will increase, it will remain within a reasonable range. To evaluate real-time performance, we simulated a scenario requiring one optimization decision per second. Under current settings, the optimization completes within 1 s, meeting real-time requirements. However, for larger problem scales, we may need to adjust parameters, such as reducing population size or lowering the number of iterations, to maintain real-time performance. We also explored parallel computing, where processing individuals across multiple nodes can significantly reduce runtime without sacrificing optimization effectiveness. This approach is a promising direction for future research.

6. Conclusions

This study aims to explore the optimal power control problem when the wireless channel undergoes Distributed Denial of Service (DDoS) attacks with the presence of an Intrusion Detection System at the remote estimator. Considering the impact of the attacker on the wireless channel, we quantify it using signal-to-noise ratio as a metric. To address this, we propose a Stackelberg game framework to analyze the game situation when both sides are in an incomplete information state. In such scenarios, the optimal strategy relationship between attackers and defenders can be determined through Karush–Kuhn–Tucker (KKT) conditions. We employ a Differential Evolution (DE) method based on Artificial Potential Field (APF) to design the optimal strategy for the defense side. Finally, we not only provide specific steps to solve the corresponding optimization problem but also observe that this optimization scheme can effectively reduce the reward function value for attackers and simultaneously increase the reward value for defenders when an Intrusion Detection System exists at the remote estimator. In future work, we plan to investigate integrated defense strategies that combine DDoS attacks with other network attacks (e.g., man-in-the-middle attacks, data tampering). By developing a multi-layered, multi-dimensional defense system, we aim to enhance overall security and improve the system’s resilience against complex attack environments.

Author Contributions

Conceptualization, Y.Y. and L.P.; methodology, Y.Y. and L.P.; software, Y.Y.; validation, Y.Y.; investigation, L.P.; data curation, Y.Y.; writing—original draft preparation, Y.Y.; writing—review and editing, L.P.; visualization, Y.Y.; supervision, L.P.; funding acquisition, L.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Shandong Province (No. ZR2023MF023), Natural Science Foundation postdoctoral project of Qingdao of China (No. QDBSH20230102058), Science and Technology Support Plan for Youth Innovation of Colleges and Universities of Shandong Province of China (No. 2022KJ301), Systems Science Plus Joint Research Program of Qingdao University (No. XT2024101).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be made available on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sun, Q.; Zhang, K.; Shi, Y. Resilient model predictive control of cyber–physical systems under DoS attacks. IEEE Trans. Ind. Inform. 2020, 16, 4920–4927. [Google Scholar] [CrossRef]
  2. Zou, L.; Liu, X. Robust adaptive control for a class of networked nonlinear systems under denial-of-service attacks. Nonlinear Dyn. 2023, 111, 1385–1398. [Google Scholar] [CrossRef]
  3. Gan, R.; Xiao, Y.; Shao, J.; Qin, J. An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems. IEEE Trans. Cybern. 2019, 51, 994–1003. [Google Scholar] [CrossRef] [PubMed]
  4. Tahoun, A.; Arafa, M. Secure control design for nonlinear cyber–physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels. ISA Trans. 2022, 128, 294–308. [Google Scholar] [CrossRef] [PubMed]
  5. Li, Y.; Yang, G.; Wang, X. Optimal energy constrained deception attacks in cyber–physical systems with multiple channels: A fusion attack approach. ISA Trans. 2023, 137, 1–12. [Google Scholar] [CrossRef]
  6. Aktar, S.; Nur, A. Towards DDoS attack detection using deep learning approach. Comput. Secur. 2023, 129, 103251. [Google Scholar] [CrossRef]
  7. An, L.; Yang, G. Opacity enforcement for confidential robust control in linear cyber-physical systems. IEEE Trans. Autom. Control 2022, 65, 1234–1241. [Google Scholar] [CrossRef]
  8. Ye, C.Q.; Li, J.; Chen, X.Y. Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments. Sensors 2024, 24, 7405. [Google Scholar] [CrossRef]
  9. Ji, Y.; Gao, Q.; Liu, J. Adaptive resilient control for cyber-physical systems against unknown injection attacks in sensor networks. Nonlinear Dyn. 2023, 111, 11105–11114. [Google Scholar] [CrossRef]
  10. Kumari, P.; Jain, A. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput. Secur. 2023, 127, 103096. [Google Scholar] [CrossRef]
  11. Li, Y.; Quevedo, D.; Dey, S.; Shi, L. SINR-based DoS attack on remote state estimation: A game-theoretic approach. IEEE Trans. Control Netw. Syst. 2016, 4, 632–642. [Google Scholar] [CrossRef]
  12. Liu, H. SINR-based multi-channel power schedule under DoS attacks: A Stackelberg game approach with incomplete information. Automatica 2019, 100, 274–280. [Google Scholar] [CrossRef]
  13. Wang, Z.; Shen, H.; Zhang, H.; Gao, S.; Yan, H. Optimal DoS attack strategy for cyber-physical systems: A Stackelberg game-theoretical approach. Inf. Sci. 2023, 642, 119134. [Google Scholar] [CrossRef]
  14. Lu, A.; Yang, G. Detection and identification of sparse sensor attacks in cyber physical systems with side information. IEEE Trans. Autom. Control 2022, 68, 5349–5364. [Google Scholar] [CrossRef]
  15. Saba, T.; Rehman, A.; Sadad, T.; Kolivand, H.; Bahaj, S. Anomaly-based Intrusion Detection System for IoT networks through deep learning model. Comput. Electr. Eng. 2022, 99, 107810. [Google Scholar] [CrossRef]
  16. Li, Y.; Yang, Y.; Chai, T.; Chen, T. Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis. Automatica 2022, 144, 110461. [Google Scholar] [CrossRef]
  17. Ao, W.; Song, Y.; Wen, C.; Lai, J. Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries. Inf. Sci. 2018, 451, 67–82. [Google Scholar] [CrossRef]
  18. Kalinin, M.; Pavlenko, E.; Gavva, G.; Pakhomov, M. Maintaining Cyber Resilience in the Reconfigurable Networks with Immunization and Improved Network Game Methods. Sensors 2024, 24, 7116. [Google Scholar] [CrossRef] [PubMed]
  19. Yu, Y.; Yang, W.; Ding, W.; Zhou, J. Reinforcement learning solution for cyber-physical systems security against replay attacks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1556–6021. [Google Scholar] [CrossRef]
  20. Agah, A.; Das, S.; Basu, K.; Asadi, M. Intrusion detection in sensor networks: A non-cooperative game approach. In Proceedings of the Third IEEE International Symposium on Network Computing and Applications, Boston, MA, USA, 30 August–1 September 2004; pp. 343–346. [Google Scholar]
  21. Alabdulwahab, S.; Kim, Y.T.; Son, Y. Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN. Sensors 2024, 24, 7389. [Google Scholar] [CrossRef] [PubMed]
  22. Govindaraj, L.; Sundan, B. Thangasamy, An intrusion detection and prevention system for ddos attacks using a 2-player bayesian game theoretic approach. In Proceedings of the 2021 4th International Conference on Computing and Communications Technologies (ICCCT), Chennai, India, 16–17 December 2021; pp. 319–324. [Google Scholar]
  23. Tian, X.; Ai, Z.; Wang, G. Switching-like dynamic event-triggered load frequency control for multi-area power systems with electric vehicles under DoS attacks. J. Frankl. Inst. 2024, 361, 513–525. [Google Scholar] [CrossRef]
  24. Zhang, S.; Peng, L.; Chang, X. Optimal energy allocation based on SINR under DoS attack. Neurocomputing 2024, 570, 127116. [Google Scholar] [CrossRef]
  25. Yu, Y.; Liu, G.; Hu, W. Learning-based secure control for multichannel networked systems under smart attacks. IEEE Trans. Ind. Electron. 2023, 70, 7183–7193. [Google Scholar] [CrossRef]
  26. Wang, X. Optimal attack strategy against fault detectors for linear cyber-physical systems. Inf. Sci. 2021, 581, 390–402. [Google Scholar] [CrossRef]
  27. Salahuddin, M.; Pourahmadi, V.; Alameddine, H.; Bari, M.; Boutaba, R. Chronos: DDos attack detection using time-based autoencoder. IEEE Trans. Netw. Serv. Manag. 2021, 19, 627–641. [Google Scholar] [CrossRef]
  28. Wen, L.; Yu, S.; Zhao, Y. Event-based secure consensus of multiple AUVs under DoS attacks. Nonlinear Dyn. 2022, 107, 2407–2419. [Google Scholar] [CrossRef]
  29. Wabi, A.; Idris, I.; Olaniyi, O.; Ojeniyi, J. DDoS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps. Comput. Secur. 2023, 139, 103652. [Google Scholar] [CrossRef]
  30. Liu, X.; Yang, G. Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach. Inf. Sci. 2022, 610, 674–693. [Google Scholar] [CrossRef]
  31. Banday, Y.; Rather, G.M.; Begh, G.R. SINR analysis and interference management of macrocell cellular networks in dense urban environments. Wirel. Pers. Commun. 2020, 111, 1645–1665. [Google Scholar] [CrossRef]
  32. Salahdine, F.; Kaabouch, N. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Phys. Commun. 2020, 39, 101001. [Google Scholar] [CrossRef]
  33. Oztoprak, A.; Hassanpour, R.; Ozkan, A. Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Comput. Surv. 2024, 57, 1–29. [Google Scholar] [CrossRef]
  34. Wu, J.; Yuan, Y.; Zhang, H.; Shi, L. How can online schedules improve communication and estimation tradeoff? IEEE Trans. Signal Process. 2013, 61, 1625–1631. [Google Scholar] [CrossRef]
  35. Shi, L.; Epstein, M.; Murray, R. Kalman filtering over a packet-droping network: A probabilistic perspective. IEEE Trans. Autom. Control 2010, 55, 594–604. [Google Scholar] [CrossRef]
  36. Sakhnini, J.; Karimipour, H.; Dehghantanha, A. Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach. Phys. Commun. 2021, 47, 101394. [Google Scholar] [CrossRef]
  37. Sharma, H.; Kumar, N. Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey. Phys. Commun. 2023, 57, 102002. [Google Scholar] [CrossRef]
  38. Gibbons, R. A Primer in Game Theory; Pearson Academic: London, UK, 1992. [Google Scholar]
  39. Li, X.; Wang, L.; Jiang, Q.; Li, N. Differential evolution algorithm with multi-population cooperation and multi-strategy integration. Neurocomputing 2021, 421, 285–302. [Google Scholar] [CrossRef]
  40. Islam, G.Z.; Kashem, M.A. Efficient resource allocation in the IEEE 802.11 ax network leveraging OFDMA technology. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 2488–2496. [Google Scholar]
  41. Pirayesh, H.; Zeng, H. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 25 00742 g001
Figure 2. IDS model based on the remote estimator side.
Figure 2. IDS model based on the remote estimator side.
Sensors 25 00742 g002
Figure 3. The optimal values of O d ( θ , δ ) and O a ( θ , δ ) in the absence of IDS.
Figure 3. The optimal values of O d ( θ , δ ) and O a ( θ , δ ) in the absence of IDS.
Sensors 25 00742 g003
Figure 4. The optimal values of O d I D S ( θ , δ ) and O a I D S ( θ , δ ) in the presence of IDS.
Figure 4. The optimal values of O d I D S ( θ , δ ) and O a I D S ( θ , δ ) in the presence of IDS.
Sensors 25 00742 g004
Figure 5. The optimal strategy in the presence of IDS.
Figure 5. The optimal strategy in the presence of IDS.
Sensors 25 00742 g005
Figure 6. Reward functions O d I D S ( θ , δ ) and O a I D S ( θ , δ ) under different P R R 0 and ε 1 .
Figure 6. Reward functions O d I D S ( θ , δ ) and O a I D S ( θ , δ ) under different P R R 0 and ε 1 .
Sensors 25 00742 g006
Figure 7. Strategies of the defender and attacker under 0 θ j k 0.5 .
Figure 7. Strategies of the defender and attacker under 0 θ j k 0.5 .
Sensors 25 00742 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yi, Y.; Peng, L. Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach. Sensors 2025, 25, 742. https://doi.org/10.3390/s25030742

AMA Style

Yi Y, Peng L. Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach. Sensors. 2025; 25(3):742. https://doi.org/10.3390/s25030742

Chicago/Turabian Style

Yi, Youwen, and Lianghong Peng. 2025. "Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach" Sensors 25, no. 3: 742. https://doi.org/10.3390/s25030742

APA Style

Yi, Y., & Peng, L. (2025). Multi-Channel Power Scheduling Based on Intrusion Detection System Under DDoS Attack: A Starkberg Game Approach. Sensors, 25(3), 742. https://doi.org/10.3390/s25030742

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop