Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links

The paper introduces a class of zero-sum games between the adversary and controller as a scenario for a `denial of service' in a networked control system. The communication link is modeled as a set of transmission regimes controlled by a strategic jammer whose intention is to wage an attack on the plant by choosing a most damaging regime-switching strategy. We demonstrate that even in the one-step case, the introduced games admit a saddle-point equilibrium, at which the jammer's optimal policy is to randomize in a region of the plant's state space, thus requiring the controller to undertake a nontrivial response which is different from what one would expect in a standard stochastic control problem over a packet dropping link. The paper derives conditions for the introduced games to have such a saddle-point equilibrium. Furthermore, we show that in more general multi-stage games, these conditions provide `greedy' jamming strategies for the adversary.

[1]  W. Rudin Principles of mathematical analysis , 1964 .

[2]  Valery A. Ugrinovskii,et al.  Control over adversarial packet-dropping communication networks revisited , 2014, 2014 American Control Conference.

[3]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[4]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[5]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[6]  A. Peressini,et al.  The Mathematics Of Nonlinear Programming , 1988 .

[7]  Tamer Basar,et al.  Optimal control of LTI systems over unreliable communication links , 2006, Autom..

[8]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[9]  Imre Csiszár,et al.  Arbitrarily varying channels with constrained inputs and states , 1988, IEEE Trans. Inf. Theory.

[10]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[11]  Valery A. Ugrinovskii,et al.  One-shot control over an AVC-like adversarial channel , 2012, 2012 American Control Conference (ACC).

[12]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[13]  Sekhar Tatikonda,et al.  Control under communication constraints , 2004, IEEE Transactions on Automatic Control.

[14]  Robin J. Evans,et al.  Feedback Control Under Data Rate Constraints: An Overview , 2007, Proceedings of the IEEE.