A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems

被引:2
|
作者
Jahan, Farha [1 ]
Sun, Weiqing [1 ]
Niyaz, Quamar [2 ]
机构
[1] Univ Toledo, Coll Engn, Toledo, OH 43606 USA
[2] Purdue Univ Northwest, Coll Engn & Sci, Hammond, LA 46323 USA
关键词
autonomous systems; cybersecurity; game theory; Nash Equilibrium;
D O I
10.1109/SPW50608.2020.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Autonomous systems (AS) would soon revolutionize the way we live and work. The days are not so far when these systems, from delivery drones to driverless cars, would be seen around us. These systems are connected and rely heavily on the communication network for the information exchange, hence prone to several attacks. Human lives will be at risk if these systems are compromised. Cybersecurity modeling and attack analysis of AS needs the utmost attention of the research community. Primarily, a typical AS has three modules - perception, cognition, and control - and each one of them comes with their own vulnerabilities. In this work, we propose a new AS architecture that may prove useful in AS cybersecurity modeling. We also model the attacks on them, and defense mechanisms applied to these modules using a non-cooperative non-zero sum game. Finally, we solve this game to obtain optimal strategies to maintain a secure system
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [21] Tolerance allocation optimization based on non-cooperative game analysis
    Zheng, Cheng
    Jin, Sun
    Lai, Xinmin
    Li, Yubing
    [J]. Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, 2009, 45 (10): : 159 - 165
  • [22] Application of a non-cooperative game theory based traffic assignment
    Li, Caixia
    Anavatti, Sreenatha Gopalarao
    Ray, Tapabrata
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1124 - 1128
  • [23] Security mechanism in access control based on non-cooperative game
    [J]. 1600, Editorial Board of Journal on Communications (35):
  • [24] Does cooperation in auditing matter? A comparison of a non-cooperative and a cooperative game model of auditing
    Cook, J
    Hatherly, D
    Nadeau, L
    Thomas, LC
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1997, 103 (03) : 470 - 482
  • [25] Non-Cooperative Game of Multi-Agent Countermeasure Systems Based on Cognitive Hierarchy Theory
    Dong, Xiaonan
    Li, Xuehuan
    Liu, Zongcheng
    Li, Qiuni
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [26] Optimal decentralized linear precoding for wideband non-cooperative interference systems based on game theory
    Scutari, Gesualdo
    Palomar, Daniel P.
    Barbarossa, Sergio
    [J]. 2007 2ND IEEE INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING, 2007, : 197 - +
  • [27] A non-cooperative game model for overlapping community detection in social networks
    Yang, Huan
    Bu, Zhan
    Wang, Yuyao
    Xiong, Xi
    Zhang, Chengcui
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 299 - 306
  • [28] A non-cooperative game theory model for bandwidth allocation in Network Virtualization
    Seddiki, M. Said
    Frikha, Mounir
    [J]. 2012 15TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2012,
  • [29] Strategic Scheduling of PEV Charging Load: A Non-Cooperative Game Model
    Liu, Hongda
    Wang, Yuting
    Wang, Yusen
    Li, ZhiPeng
    [J]. PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 11284 - 11288
  • [30] Multi-cell Non-cooperative Power Allocation Game in Relay Based OFDMA Systems
    Xiao, Lin
    Cuthbert, Laurie
    [J]. 2009 IEEE VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2009, : 2655 - 2659