Optimal Communication Strategies in Networked Cyber-Physical Systems with Adversarial Elements

نویسندگان

  • Emrah Akyol
  • Kenneth Rose
  • Tamer Basar
  • Cédric Langbort
چکیده

This paper studies optimal communication and coordination strategies in cyber-physical systems for both defender and attacker within a game-theoretic framework. We model the communication network of a cyber-physical system as a sensor network which involves one single Gaussian source observed by many sensors, subject to additive independent Gaussian observation noises. The sensors communicate with the estimator over a coherent Gaussian multiple access channel. The aim of the receiver is to reconstruct the underlying source with minimum mean squared error. The scenario of interest here is one where some of the sensors are captured by the attacker and they act as the adversary (jammer): they strive to maximize distortion. The receiver (estimator) knows the captured sensors but still cannot simply ignore them due to the multiple access channel, i.e., the outputs of all sensors are summed to generate the estimator input. We show that the ability of transmitter sensors to secretly agree on a random event, that is “coordination”, plays a key role in the analysis. Depending on the coordination capability of the sensors and the receiver, we consider three different problem settings. The first setting involves transmitters and the receiver with “coordination” capabilities. Here, all transmitters can use identical realization of randomized encoding for each transmission. In this case, the optimal strategy for the adversary sensors also exploits coordination, where they all generate the same realization of independent and identically distributed Gaussian noise. In the second setting, the transmitter sensors are restricted to use deterministic encoders, and this setting, which corresponds to a Stackelberg game, does not admit a saddle-point solution. We show that the optimal strategy for all sensors is uncoded communications where encoding functions of adversaries and transmitters are aligned in opposite directions. In the third, and last, setting where only a subset of the transmitter and/or jammer sensors can coordinate, we show that the solution radically depends on the fraction of the transmitter sensors that can coordinate. In the second half of the paper, we extend our analysis to an asymmetric scenario where we remove the assumption of identical power and noise variances for all sensors. Limiting the optimal strategies to conditionally affine mappings, we derive the optimal power scheduling over the sensors. We show that optimal power scheduling renders coordination superfluous for the attacker, when the transmitter sensors exploit coordination, as the attacker allocates all adversarial power to one sensor. In the setting where coordination is not allowed, both the attacker and the transmitter sensors distribute power among all available sensors to utilize the well-known estimation diversity in distributed settings.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Learning Consensus in Adversarial Environments

Due to the highly uncertain and dynamic nature of military conflict, enabling autonomous agents to gracefully adapt to mission and environmental changes is a very challenging task. These capabilities are necessary in the asymmetric battles waged against insurgencies, where enemy combatants quickly adapt to Army strategies and tactics. The United States Army, Air Force, and Navy have recently sh...

متن کامل

DeepCAS: A Deep Reinforcement Learning Algorithm for Control-Aware Scheduling

We consider networked control systems consisting of multiple independent closed-loop control subsystems, operating over a shared communication network. Such systems are ubiquitous in cyber-physical systems, Internet of Things, and large-scale industrial systems. In many large-scale settings, the size of the communication network is smaller than the size of the system. In consequence, scheduling...

متن کامل

Security of Cyber-Physical Systems - From Theory to Testbeds and Validation

Traditional control environments connected to physical systems are being upgraded with novel information and communication technologies. The resulting systems need to be adequately protected. Experimental testbeds are crucial for the study and analysis of ongoing threats against those resulting cyber-physical systems. The research presented in this paper discusses some actions towards the devel...

متن کامل

Dynamic Watermarking: Active Defense of Networked Cyber-Physical Systems

The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare, and transportation. However, as recent events have shown, such systems are vulnerable to cyber attacks. Being safety critical, their disruption or misbehavior can cause economic losses or injuries and loss of life. It is therefore importan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1701.08058  شماره 

صفحات  -

تاریخ انتشار 2017