Security Investment in Cyber-Physical Systems: Stochastic Games With Asymmetric Information and Resource-Constrained Players

This article considers remote state estimation in cyber-physical systems (CPSs) with multiple sensors. Each plant is modeled by a discrete-time stochastic linear system with measurements of each sensor transmitted to the corresponding remote estimator over a shared communication network when their securities are interdependent due to network-induced risks. A dynamic nonzero-sum game with asymmetric information is formulated in which each sensor subject to a resource budget constraint needs to decide whether to invest in security for sending data packets, taking the behaviors of other sensors into account. To overcome the difficulty in characterizing or computing the Nash equilibria (NE), the game with asymmetric information is transformed into another game with symmetric information such that the equilibrium of the original game can be obtained by solving the equilibrium of the new game. Under certain conditions, we devise a backward induction algorithm to obtain a subclass of NE of the original game, known as common information-based Markov perfect equilibria (CIBMPE). Finally, a numerical example is provided to illustrate the results obtained.

[1]  Ben Niu,et al.  Single‐network ADP for solving optimal event‐triggered tracking control problem of completely unknown nonlinear systems , 2021, Int. J. Intell. Syst..

[2]  H. W. Kuhn EXTENSIVE GAMES AND THE PROBLEM OF INFORMATION , 2020, Classics in Game Theory.

[3]  Tongwen Chen,et al.  Multi-sensor transmission power control for remote estimation through a SINR-based communication channel , 2019, Autom..

[4]  Hao Liu,et al.  SINR-based multi-channel power schedule under DoS attacks: A Stackelberg game approach with incomplete information , 2019, Autom..

[5]  Tamer Basar,et al.  Communication scheduling and remote estimation with adversarial intervention , 2019, IEEE/CAA Journal of Automatica Sinica.

[6]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[7]  Tamer Başar,et al.  Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems , 2017, IEEE Transactions on Control of Network Systems.

[8]  Ling Shi,et al.  A secure cross-layer design for remote estimation under DoS attack: When multi-sensor meets multi-channel , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[9]  Tamer Basar,et al.  Optimal communication scheduling and remote estimation over an additive noise channel , 2016, Autom..

[10]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[11]  Yi Ouyang,et al.  Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition , 2015, IEEE Transactions on Automatic Control.

[12]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[13]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[14]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[15]  Tamer Basar,et al.  Common Information Based Markov Perfect Equilibria for Stochastic Games With Asymmetric Information: Finite Games , 2014, IEEE Transactions on Automatic Control.

[16]  Ling Shi,et al.  How Can Online Schedules Improve Communication and Estimation Tradeoff? , 2013, IEEE Transactions on Signal Processing.

[17]  Tamer Basar,et al.  Optimal Strategies for Communication and Remote Estimation With an Energy Harvesting Sensor , 2012, IEEE Transactions on Automatic Control.

[18]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.

[19]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[20]  Tamer Basar,et al.  Optimal control of LTI systems over unreliable communication links , 2006, Autom..

[21]  T. Başar,et al.  Optimal Estimation with Limited Measurements , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[22]  Bhaskar Krishnamachari,et al.  Experimental study of the effects of transmission power control and blacklisting in wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[23]  J. Hespanha,et al.  Nash equilibria in partial-information games on Markov chains , 2001, Proceedings of the 40th IEEE Conference on Decision and Control (Cat. No.01CH37228).

[24]  E. Altman Constrained Markov Decision Processes , 1999 .

[25]  Petros G. Voulgaris,et al.  On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..

[26]  Tamer Basar,et al.  Stochastic Differential Games and Intricacy of Information Structures , 2014 .

[27]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[28]  Jérôme Renault,et al.  Repeated Games with Incomplete Information , 2009, Encyclopedia of Complexity and Systems Science.

[29]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[30]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .