A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems

被引:14
|
作者
Pirani, Mohammad [1 ]
Nekouei, Ehsan [2 ]
Sandberg, Henrik [3 ,4 ]
Johansson, Karl Henrik [3 ,4 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G8, Canada
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Decis & Control Syst, S-11428 Stockholm, Sweden
[4] Digital Futures, London N1 9UZ, England
关键词
Graph topology; networked control systems; security game; system L-2 gain; ATTACKS;
D O I
10.1109/TAC.2021.3106866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the sensor placement problem in a leader-follower networked control system for improving its security against cyber-physical attacks. In a zero-sum game, the attacker selects f nodes of the network to attack, and the detector places f sensors to detect the presence of the attack signals. In our formulation, the attacker's objective is to have a large impact on a target node in the network while being as little visible as possible to the detector. The detector, however, seeks to maximize the visibility of the attack signals. The effects of the attack signals on both the target node and the detector node are captured via the system L-2 gain from the attack signals to the target node and deployed sensors' outputs, respectively. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the single-attack single-sensor case is studied when the underlying connectivity graph is a directed or an undirected tree. We show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared to its corresponding directed topology. For the multiple-attack multiple-sensor case, we show that the game does not necessarily admit a Nash equilibrium and introduce a Stackelberg game approach, where the detector acts as the leader. Finally, these results are used to study the sensor placement problem in a vehicle platooning application in the presence of bias injection attacks.
引用
收藏
页码:3699 / 3706
页数:8
相关论文
共 50 条
  • [1] A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
    Pirani, Mohammad
    Nekouei, Ehsan
    Sandberg, Henrik
    Johansson, Karl Henrik
    2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, : 114 - 119
  • [2] Security-Aware Distributed Job Scheduling in Cloud Computing Systems: A Game-Theoretic Cellular Automata-Based Approach
    Gasior, Jakub
    Seredynski, Franciszek
    COMPUTATIONAL SCIENCE - ICCS 2019, PT II, 2019, 11537 : 449 - 462
  • [3] Game-Theoretic Strategies for Asymmetric Networked Systems
    Rao, Nageswara S. V.
    Ma, Chris Y. T.
    Hausken, Kjell
    He, Fei
    Yau, David K. Y.
    Zhuang, Jun
    2017 20TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2017, : 1809 - 1816
  • [4] Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems
    Ferdowsi, Aidin
    Eldosouky, Abdelrahman
    Saad, Walid
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16395 - 16405
  • [5] Automated Game-Theoretic Verification of Security Systems
    Mu, Chunyan
    QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 : 239 - 256
  • [6] Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
    Kwiat, Luke
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Tang, Jian
    Martin, Andrew
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 556 - 563
  • [7] A game-theoretic framework for the security system of visible watermarking
    Tsai, Min-Jen
    Liu, Jung
    Wang, Chen-Sheng
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5748 - 5754
  • [8] A game-theoretic framework for medium access control
    Cui, Tao
    Chen, Lijun
    Low, Steven H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (07) : 1116 - 1127
  • [9] Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains
    Tsai, Jason
    Yin, Zhengyu
    Kwak, Jun-young
    Kempe, David
    Kiekintveld, Christopher
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-10), 2010, : 881 - 886
  • [10] Fast distributed optimization and game-theoretic methods in networked systems
    Tatarenko, Tatiana
    AT-AUTOMATISIERUNGSTECHNIK, 2020, 68 (03) : 166 - 175