Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game

The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly becoming a global norm, as corroborated by Amazon's “Prime Air” and Google's “Project Wing” projects. However, the real-world deployment of such drone delivery systems faces many cyber-physical security challenges. In this paper, a novel mathematical framework for analyzing and enhancing the security of drone delivery systems is introduced. In this regard, a zero-sum network interdiction game is formulated between a vendor, operating a drone delivery system, and a malicious attacker. In this game, the vendor seeks to find the optimal path that its UAV should follow, to deliver a purchase from the vendor's warehouse to a customer location, to minimize the delivery time. Meanwhile, an attacker seeks to choose an optimal location to interdict the potential paths of the UAVs, so as to inflict cyber or physical damage to it, thus, maximizing its delivery time. First, the Nash equilibrium point of this game is characterized. Then, to capture the subjective behavior of both the vendor and attacker, new notions from prospect theory are incorporated into the game. These notions allow capturing the vendor's and attacker's i) subjective perception of attack success probabilities, and ii) their disparate subjective valuations of the achieved delivery times relative to a certain target delivery time. Simulation results have shown that the subjective decision making of the vendor and attacker leads to adopting risky path selection strategies which inflict delays to the delivery, thus, yielding unexpected delivery times which surpass the target delivery time set by the vendor.

[1]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[2]  Walid Saad,et al.  Prospect theory for enhanced smart grid resilience using distributed energy storage , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[4]  D. Prelec The Probability Weighting Function , 1998 .

[5]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[6]  Miguel A. Olivares-Méndez,et al.  A real-time model predictive position control with collision avoidance for commercial low-cost quadrotors , 2016, 2016 IEEE Conference on Control Applications (CCA).

[7]  Shahryar Sarkani,et al.  Unmanned aerial vehicle smart device ground control station cyber security threat model , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[8]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[9]  Aiko Pras,et al.  Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[10]  Walid Saad,et al.  Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.

[11]  Walid Saad,et al.  Toward a Consumer-Centric Grid: A Behavioral Perspective , 2015, Proceedings of the IEEE.

[12]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[13]  Emmanuel Lemoine,et al.  Amazon Prime Air , 2019 .

[14]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[15]  Gang Xiang,et al.  Design of the life-ring drone delivery system for rip current rescue , 2016, 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS).

[16]  Andrea Sanna,et al.  New Frontiers of Delivery Services Using Drones: A Prototype System Exploiting a Quadcopter for Autonomous Drug Shipments , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.