Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief

This study investigates the relationship between resilience of control systems to attacks and the information available to malicious attackers. Specifically, it is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert. The behaviors of the attacker and the defender are analyzed through a repeated signaling game with an undisclosed belief under covert reactions. In the typical setting of signaling games, reactions conducted by the defender are supposed to be public information and the measurability enables the attacker to accurately trace transitions of the defender’s belief on existence of a malicious attacker. In contrast, the belief in the game considered in this paper is undisclosed and hence common equilibrium concepts can no longer be employed for the analysis. To surmount this difficulty, a novel framework for decision of reasonable strategies of the players in the game is introduced. Based on the presented framework, it is revealed that any reasonable strategy chosen by a rational malicious attacker converges to the benign behavior as long as the reactions performed by the defender are unobservable to the attacker. The result provides an explicit relationship between resilience and information, which indicates the importance of covertness of reactions for designing secure control systems.

[1]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[2]  Tilman Börgers,et al.  An introduction to the theory of mechanism design , 2015 .

[3]  Henrik Sandberg,et al.  Security analysis of control system anomaly detectors , 2017, 2017 American Control Conference (ACC).

[4]  Todd E. Humphreys,et al.  Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .

[5]  Jaspreet Kaur,et al.  Covert channel-internal control protocols: attacks and defense , 2016, Secur. Commun. Networks.

[6]  Achilleas Anastasopoulos,et al.  Linear Equilibria for Dynamic LQG Games with Asymmetric Information and Dependent Types , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[7]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[8]  Karl Henrik Johansson,et al.  Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter , 2017 .

[9]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[10]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[12]  Tamer Basar,et al.  Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information , 2014, SIAM J. Control. Optim..

[13]  Tamer Basar,et al.  Common Information Based Markov Perfect Equilibria for Stochastic Games With Asymmetric Information: Finite Games , 2014, IEEE Transactions on Automatic Control.

[14]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[15]  Ayça Kaya,et al.  Repeated signaling games , 2009, Games Econ. Behav..

[16]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[17]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[18]  Ron J. Patton,et al.  Input Observability and Input Reconstruction , 1998, Autom..

[19]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[20]  Harold L. Cole,et al.  Dynamic Games with Hidden Actions and Hidden States , 2001, J. Econ. Theory.

[21]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[22]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[23]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[24]  Achilleas Anastasopoulos,et al.  A systematic process for evaluating structured perfect Bayesian equilibria in dynamic games with asymmetric information , 2015, 2016 American Control Conference (ACC).

[25]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[26]  Akira Okada Perfect Bayesian Equilibrium and Sequential Equilibrium , 2011 .

[27]  David M. Kreps,et al.  S I G N a L L I N G , 2022 .

[28]  S. Zamir,et al.  Formulation of Bayesian analysis for games with incomplete information , 1985 .

[29]  Karl Henrik Johansson,et al.  Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems , 2018, IEEE Transactions on Control of Network Systems.