A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems

被引:14
|
作者
Pirani, Mohammad [1 ]
Nekouei, Ehsan [2 ]
Sandberg, Henrik [3 ,4 ]
Johansson, Karl Henrik [3 ,4 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G8, Canada
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[3] KTH Royal Inst Technol, Sch Elect Engn & Comp Sci, Div Decis & Control Syst, S-11428 Stockholm, Sweden
[4] Digital Futures, London N1 9UZ, England
关键词
Graph topology; networked control systems; security game; system L-2 gain; ATTACKS;
D O I
10.1109/TAC.2021.3106866
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the sensor placement problem in a leader-follower networked control system for improving its security against cyber-physical attacks. In a zero-sum game, the attacker selects f nodes of the network to attack, and the detector places f sensors to detect the presence of the attack signals. In our formulation, the attacker's objective is to have a large impact on a target node in the network while being as little visible as possible to the detector. The detector, however, seeks to maximize the visibility of the attack signals. The effects of the attack signals on both the target node and the detector node are captured via the system L-2 gain from the attack signals to the target node and deployed sensors' outputs, respectively. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the single-attack single-sensor case is studied when the underlying connectivity graph is a directed or an undirected tree. We show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared to its corresponding directed topology. For the multiple-attack multiple-sensor case, we show that the game does not necessarily admit a Nash equilibrium and introduce a Stackelberg game approach, where the detector acts as the leader. Finally, these results are used to study the sensor placement problem in a vehicle platooning application in the presence of bias injection attacks.
引用
收藏
页码:3699 / 3706
页数:8
相关论文
共 50 条
  • [31] The Price of Malice: A Game-Theoretic Framework for Malicious Behavior in Distributed Systems
    Moscibroda, Thomas
    Schmid, Stefan
    Wattenhofer, Roger
    INTERNET MATHEMATICS, 2009, 6 (02) : 125 - 155
  • [32] A survey of game-theoretic on power control issues in wireless sensor networks
    Liu Zhouzhou
    Wang Fubao
    Wang Bingxiang
    Lei Wenli
    MANUFACTURE ENGINEERING AND ENVIRONMENT ENGINEERING, VOLS 1 AND 2, 2014, 84 : 173 - 180
  • [33] A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
    Moosavi, Hussein
    Bui, Francis Minhthang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1367 - 1379
  • [34] Discrete Strategy Game-theoretic Topology Control in Wireless Sensor Networks
    Spyrou, Evangelos D.
    Yang, Shusen
    Mitrakos, Dimitrios K.
    SENSORNETS: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2017, : 27 - 38
  • [35] Game-theoretic medium access control protocol for wireless sensor networks
    Zhao, L.
    Guo, L.
    Zhang, J.
    Zhang, H.
    IET COMMUNICATIONS, 2009, 3 (08) : 1274 - 1283
  • [36] Game-Theoretic Control for Actuator Coordination in Wireless Sensor and Actuator Networks
    Hu, Zichen
    Seet, Boon-Chong
    2019 AUSTRALIAN & NEW ZEALAND CONTROL CONFERENCE (ANZCC), 2019, : 57 - 62
  • [37] Privacy-Aware Stochastic Control with a "Snoopy" Adversary: A Game-Theoretic Approach
    Gupta, Abhishek
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [38] Recent advances in optimization and game theoretic control for networked systems
    Wu, Yuhu
    Cheng, Daizhan
    Ghosh, Bijoy K.
    Shen, Tielong
    ASIAN JOURNAL OF CONTROL, 2019, 21 (06) : 2493 - 2512
  • [39] A game-theoretic approach to model and quantify the security of cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    COMPUTERS IN INDUSTRY, 2017, 88 : 44 - 57
  • [40] Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
    Abdallah, Mustafa
    Naghizadeh, Parinaz
    Hota, Ashish R.
    Cason, Timothy
    Bagchi, Saurabh
    Sundaram, Shreyas
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1585 - 1596