A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion

This paper studies rational and persistent deception among intelligent robots to enhance security and operational efficiency. We present an N-player K-stage game with an asymmetric information structure where each robot’s private information is modeled as a random variable or its type. The deception is persistent as each robot’s private type remains unknown to other robots for all stages. The deception is rational as robots aim to achieve their deception goals at minimum cost. Each robot forms a dynamic belief of others’ types based on intrinsic or extrinsic information. Perfect Bayesian Nash Equilibrium (PBNE) is a natural solution concept for dynamic games of incomplete information. Due to its requirements of sequential rationality and belief consistency, PBNE provides a reliable prediction of players’ actions, beliefs, and expected cumulative costs over the entire K stages. The contribution of this work is fourfold. First, we identify the PBNE computation as a nonlinear stochastic control problem and characterize the structures of players’ actions and costs under PBNE. We further derive a set of extended Riccati equations with cognitive coupling under the linear-quadratic setting and extrinsic belief dynamics. Second, we develop a receding-horizon algorithm with low temporal and spatial complexity to compute PBNE under intrinsic belief dynamics. Third, we investigate a deceptive pursuit-evasion game as a case study and use numerical experiments to corroborate the results. Finally, we propose metrics, such as deceivability, reachability, and the price of deception, to evaluate the strategy design and the system performance under deception. Note to Practitioners—Recent advances in automation and adaptive control in multi-agent systems enable robots to use deception to accomplish their objectives. Deception involves intentional information hiding to compromise the security and operational efficiency of the robotic systems. This work proposes a dynamic game framework to quantify the impact of deception, understand the robots’ behaviors and intentions, and design cost-efficient strategies under the deception that persists over stages. Existing researches on robot deception have relied on experiments while this work aims to lay a theoretical foundation of deception with quantitative metrics, such as deceivability and the price of deception. The proposed model has wide applications, including cooperative robots, pursuit and evasion, and humanrobot teaming. The pursuit-evasion games are used as case studies to show how the deceiver can amplify the deception by belief manipulation and how the deceived robots can reduce the negative impact of deception by enhanced maneuverability and Bayesian learning. The future work would focus on designing This paper has been accepted for publication in IEEE Transactions on Automation Science and Engineering This research is partially supported by awards ECCS-1847056, CNS1544782, CNS-2027884, and SES-1541164 from National Science of Foundation (NSF), and grant W911NF-19-1-0041 from Army Research Office (ARO). L. Huang and Q. Zhu are with the Department of Electrical and Computer Engineering, New York University, 370 Jay Street, Brooklyn, NY 11201, USA; E-mail: {lh2328,qz494}@nyu.edu Digital Object Identifier 10.1109/TASE.2021.3097286 cooperative deception among swarm robotics and robotic systems that are robust to or further benefit from deception.

[1]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[2]  Quanyan Zhu,et al.  Duplicity Games for Deception Design With an Application to Insider Threat Mitigation , 2021, IEEE Transactions on Information Forensics and Security.

[3]  Quanyan Zhu,et al.  Dynamic games for secure and resilient control system design , 2019, National science review.

[4]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[5]  M. Athans,et al.  Solution of some nonclassical LQG stochastic decision problems , 1974 .

[6]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[7]  Nagi Gebraeel,et al.  Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems , 2021, IEEE Transactions on Automation Science and Engineering.

[8]  Benjamin J. Raphael,et al.  Network propagation: a universal amplifier of genetic associations , 2017, Nature Reviews Genetics.

[9]  Kai Xu,et al.  Single Real Goal, Magnitude-Based Deceptive Path-Planning , 2020, Entropy.

[10]  Ronald C. Arkin,et al.  A Taxonomy of Robot Deception and Its Benefits in HRI , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[11]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[12]  John Lygeros,et al.  A Noncooperative Game Approach to Autonomous Racing , 2017, IEEE Transactions on Control Systems Technology.

[13]  Jose B. Cruz,et al.  Defending an Asset: A Linear Quadratic Game Approach , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[14]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[15]  R. Nickerson Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .

[16]  Quanyan Zhu,et al.  Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.

[17]  J. B. Cruz,et al.  Moving horizon Nash strategies for a military air operation , 2002 .

[18]  Ufuk Topcu,et al.  Optimal Deceptive and Reference Policies for Supervisory Control , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[19]  Peter G. Bennett,et al.  Hypergames: Developing a model of conflict☆ , 1980 .

[20]  Quanyan Zhu,et al.  Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..

[21]  Aldo Morales,et al.  An Adaptive Markov Process for Robot Deception , 2019, ArXiv.

[22]  Siddhartha S. Srinivasa,et al.  An Analysis of Deceptive Robot Motion , 2014, Robotics: Science and Systems.

[23]  Yuanqing Xia,et al.  Optimal Stealthy Deception Attack Against Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[24]  Ufuk Topcu,et al.  Deception in Optimal Control , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[25]  Rajdeep Singh,et al.  Deception in Autonomous Vehicle Decision Making in an Adversarial Environment , 2005 .

[26]  Vijay Kumar,et al.  Dynamics, Control and Planning for Cooperative Manipulation of Payloads Suspended by Cables from Multiple Quadrotor Robots , 2013, Robotics: Science and Systems.

[27]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[28]  D. Smith,et al.  Why We Lie: The Evolutionary Roots of Deception and the Unconscious Mind , 2004 .

[29]  Peta Masters Goal recognition and deception in path-planning , 2019 .

[30]  Ronald C. Arkin,et al.  Other-oriented robot deception: A computational approach for deceptive action generation to benefit the mark , 2014, 2014 IEEE International Conference on Robotics and Biomimetics (ROBIO 2014).

[31]  David Fridovich-Keil,et al.  An Iterative Quadratic Method for General-Sum Differential Games with Feedback Linearizable Dynamics , 2020, 2020 IEEE International Conference on Robotics and Automation (ICRA).

[32]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[33]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[34]  Branislav Bosanský,et al.  Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.

[35]  M. Ani Hsieh,et al.  Cooperative transport of a buoyant load: A differential geometric approach , 2017, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[36]  Roberta L. Klatzky,et al.  Visual-Feedback Distortion in a Robotic Rehabilitation Environment , 2006, Proceedings of the IEEE.

[37]  Ahmed Ouammi,et al.  Supervisory Model Predictive Control for Optimal Energy Management of Networked Smart Greenhouses Integrated Microgrid , 2020, IEEE Transactions on Automation Science and Engineering.

[38]  Quanyan Zhu,et al.  Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.

[39]  Ronald C. Arkin,et al.  Acting Deceptively: Providing Robots with the Capacity for Deception , 2011, Int. J. Soc. Robotics.

[40]  Xiaofan He,et al.  Dynamic Security Games with Deception , 2018 .