A Risk-Security Tradeoff in Graphical Coordination Games

A system relying on the collective behavior of decision-makers can be vulnerable to a variety of adversarial attacks. How well can a system operator protect performance in the face of these risks? We frame this question in the context of graphical coordination games, where the agents in a network choose among two conventions and derive benefits from coordinating neighbors, and system performance is measured in terms of the agents' welfare. In this paper, we assess an operator's ability to mitigate two types of adversarial attacks - 1) broad attacks, where the adversary incentivizes all agents in the network and 2) focused attacks, where the adversary can force a selected subset of the agents to commit to a prescribed convention. As a mitigation strategy, the system operator can implement a class of distributed algorithms that govern the agents' decision-making process. Our main contribution characterizes the operator's fundamental trade-off between security against worst-case broad attacks and vulnerability from focused attacks. We show that this tradeoff significantly improves when the operator selects a decision-making process at random. Our work highlights the design challenges a system operator faces in maintaining resilience of networked distributed systems.

[1]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[3]  Jason R. Marden,et al.  Risk and security tradeoffs in graphical coordination games , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Andrea Montanari,et al.  The spread of innovations in social networks , 2010, Proceedings of the National Academy of Sciences.

[6]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[7]  G. Caldarelli,et al.  The spreading of misinformation online , 2016, Proceedings of the National Academy of Sciences.

[8]  Giuseppe Persiano,et al.  Metastability of Logit Dynamics for Coordination Games , 2011, Algorithmica.

[9]  Tatiana Tatarenko,et al.  Proving convergence of log-linear learning in potential games , 2014, 2014 American Control Conference.

[10]  Philip N. Brown,et al.  Security Against Impersonation Attacks in Distributed Systems , 2017, IEEE Transactions on Control of Network Systems.

[11]  H. Peyton Young,et al.  Individual Strategy and Social Structure , 2020 .

[12]  H. Young,et al.  The Evolution of Conventions , 1993 .

[13]  L. Shapley,et al.  Potential Games , 1994 .

[14]  Jason R. Marden,et al.  Understanding the influence of adversaries in distributed systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[15]  H. Young,et al.  Individual Strategy and Social Structure: An Evolutionary Theory of Institutions , 1999 .

[16]  Philip N. Brown,et al.  The Impact of Informed Adversarial Behavior in Graphical Coordination Games , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[17]  Sadegh Bolouki,et al.  Spread of Information With Confirmation Bias in Cyber-Social Networks , 2018, IEEE Transactions on Network Science and Engineering.

[18]  H. Peyton Young,et al.  Stochastic Evolutionary Game Dynamics , 1990 .

[19]  Sonia Martínez,et al.  Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions , 2006, IEEE Transactions on Automatic Control.

[20]  L. Blume The Statistical Mechanics of Best-Response Strategy Revision , 1995 .

[21]  Magnus Egerstedt,et al.  Graph Theoretic Methods in Multiagent Networks , 2010, Princeton Series in Applied Mathematics.

[22]  R. Srikant,et al.  Opinion dynamics in social networks with stubborn agents: Equilibrium and convergence rate , 2014, Autom..

[23]  A. Griffin,et al.  The Social Lives of Microbes , 2007 .

[24]  B. Gharesifard,et al.  Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.

[25]  Asuman E. Ozdaglar,et al.  Spread of (Mis)Information in Social Networks , 2009, Games Econ. Behav..

[26]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[27]  Eamonn B. Mallon,et al.  Quorum sensing, recruitment, and collective decision-making during colony emigration by the ant Leptothorax albipennis , 2002, Behavioral Ecology and Sociobiology.

[28]  Jason R. Marden,et al.  Revisiting log-linear learning: Asynchrony, completeness and payoff-based implementation , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).