Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems

The operation of future intelligent transportation systems (ITSs), communications infrastructure (CI), and power grids (PGs) will be highly interdependent. In particular, autonomous connected vehicles require CI resources to operate, and, thus, communication failures can result in nonoptimality in the ITS flow in terms of traffic jams and fuel consumption. Similarly, CI components, e.g., base stations (BSs) can be impacted by failures in the electric grid that is powering them. Thus, malicious attacks on the PG can lead to failures in both the CI and the ITSs. To this end, in this article, the security of an ITS against indirect attacks carried out through the PG is studied in an interdependent PG-CI-ITS scenario. In the considered scenario, an attacker can induce nonoptimality in the ITS or disrupt a particular set of streets by attacking the PG components while remaining stealthy from the ITS administrators. To defend against such attacks, the administrator of the interdependent critical infrastructure can allocate backup power sources (BPSs) at every BS to compensate for the power loss caused by the attacker. However, due to budget limitations, the administrator must consider the importance of each BS in light of the PG risk of failure, while allocating the BPSs. In this regard, a rigorous analytical framework is proposed to model the interdependencies between the ITS, CI, and PG. Next, a one-to-one relationship between the PG components and ITS streets is derived in order to capture the effect of the PG components’ failure on the optimality of the traffic flow in the streets. Moreover, the problem of BPS allocation is formulated using a Stackelberg game framework and the Stackelberg equilibrium (SE) of the game is characterized. Simulation results show that the derived SE outperforms any other BPS allocation strategy and can be scalable in linear time with respect to the size of the interdependent infrastructure.

[1]  R. Plemmons,et al.  Comparison of Some Direct Methods for Computing Stationary Distributions of Markov Chains , 1984 .

[2]  Carlos F. Daganzo,et al.  Fundamentals of Transportation and Traffic Operations , 1997 .

[3]  Dawn M. Cappelli,et al.  Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .

[4]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[5]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.

[6]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[7]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[8]  Peter Palensky,et al.  Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads , 2011, IEEE Transactions on Industrial Informatics.

[9]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[10]  Mahshid Rahnamay-Naeini,et al.  On the role of power-grid and communication-system interdependencies on cascading failures , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[11]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[12]  Bo Hu,et al.  A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.

[13]  Meixia Tao,et al.  Stochastic Throughput Optimization for Two-Hop Systems With Finite Relay Buffers , 2014, IEEE Transactions on Signal Processing.

[14]  Jonathan Loo,et al.  Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.

[15]  Arunabha Sen,et al.  Root Cause Analysis of Failures in Interdependent Power-Communication Networks , 2014, 2014 IEEE Military Communications Conference.

[16]  Min Ouyang,et al.  Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..

[17]  Walid Saad,et al.  Contract-Theoretic Resource Allocation for Critical Infrastructure Protection , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[18]  Eytan Modiano,et al.  Mitigating cascading failures in interdependent power grids and communication networks , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[19]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[20]  Anna Scaglione,et al.  Micro Synchrophasor-Based Intrusion Detection in Automated Distribution Systems: Toward Critical Infrastructure Security , 2016, IEEE Internet Computing.

[21]  Saurabh Amin,et al.  Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[22]  Bowen Zheng,et al.  Timing and security analysis of VANET-based intelligent transportation systems: (Invited paper) , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[23]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[24]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[25]  Walid Saad,et al.  Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure , 2017, ArXiv.

[26]  Walid Saad,et al.  Game theory for secure critical interdependent gas-power-water infrastructure , 2017, 2017 Resilience Week (RWS).

[27]  Walid Saad,et al.  Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[28]  Walid Saad,et al.  Generalized Colonel Blotto Game , 2017, 2018 Annual American Control Conference (ACC).

[29]  Harpreet S. Dhillon,et al.  Coverage Analysis of a Vehicular Network Modeled as Cox Process Driven by Poisson Line Process , 2017, IEEE Transactions on Wireless Communications.

[30]  Jiajing Wu,et al.  Robustness of Interdependent Power Grids and Communication Networks: A Complex Network Perspective , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[31]  Walid Saad,et al.  Joint Communication and Control for Wireless Autonomous Vehicular Platoon Systems , 2018, IEEE Transactions on Communications.

[32]  Walid Saad,et al.  Beyond 5G With UAVs: Foundations of a 3D Wireless Cellular Network , 2018, IEEE Transactions on Wireless Communications.

[33]  Walid Saad,et al.  Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning , 2018, IEEE Transactions on Communications.

[34]  Walid Saad,et al.  Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems: An Overview , 2017, IEEE Vehicular Technology Magazine.

[35]  Feng Wang,et al.  Backup Battery Analysis and Allocation against Power Outage for Cellular Base Stations , 2019, IEEE Transactions on Mobile Computing.

[36]  Walid Saad,et al.  A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems , 2019, IEEE Network.

[37]  Walid Saad,et al.  Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing , 2019, IEEE Internet of Things Journal.

[38]  Walid Saad,et al.  Resilient critical infrastructure: Bayesian network analysis and contract-Based optimization , 2017, Reliab. Eng. Syst. Saf..