×

Defensive deception against reactive jamming attacks in remote state estimation. (English) Zbl 1440.93249

Summary: This paper considers a synthetic counter-measure, combining transmission scheduling and defensive deception, to defend against jamming attacks in remote state estimation. In the setup studied, an attacker sabotages packet transmissions from a sensor to a remote estimator by congesting the communication channel between them. In order to efficiently degrade the estimation accuracy, the intelligent attacker tailors its jamming strategy by reacting to the real-time information it collects. In response to the jamming attacks, the sensor with a long-term goal will select the transmission power level at each stage. In addition, by modifying the real-time information intentionally, the sensor creates asymmetric uncertainty to mislead the attacker and thus mitigate attacks. Considering the dynamic nature of the process, we model the strategic interaction between the sensor and the attacker by a general stochastic game with asymmetric information structure. To obtain stationary optimal strategies for each player, we convert this game into a belief-based dynamic game and analyze the existence of its optimal solution. For a tractable implementation, we present an algorithm that finds equilibrium strategies based on multi-agent reinforcement learning for symmetric-information stochastic games. Numerical examples illustrate properties of the proposed algorithm.

MSC:

93E11 Filtering in stochastic control theory
93C83 Control/observation systems involving computers (process control, etc.)
68M25 Computer security
91A15 Stochastic games, stochastic differential games
91A80 Applications of game theory

References:

[1] Anderson, B. D.; Moore, J. B., Optimal filtering (2012), Courier Corporation
[2] Befekadu, G. K.; Gupta, V.; Antsaklis, P. J., Risk-sensitive control under markov modulated denial-of-service (dos) attack strategies, IEEE Transactions on Automatic Control, 60, 12, 3299-3304 (2015) · Zbl 1360.93766
[3] Billingsley, P., Convergence of probability measures (2013), John Wiley & Sons: John Wiley & Sons New York · Zbl 0172.21201
[4] Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In Proc. IEEE 28th int. conf. distributed computing system workshops (pp. 495-500).
[5] Carroll, T. E.; Grosu, D., A game theoretic investigation of deception in network security, Security and Communication Networks, 4, 10, 1162-1172 (2011)
[6] De Persis, C.; Tesi, P., Input-to-state stabilizing control under denial-of-service, IEEE Transactions on Automatic Control, 60, 11, 2930-2944 (2015) · Zbl 1360.93629
[7] Ding, K.; Li, Y.; Quevedo, D. E.; Dey, S.; Shi, L., A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, 194-201 (2017) · Zbl 1357.93097
[8] Ding, K.; Ren, X.; Shi, L., Deception-based sensor scheduling for remote estimation under DoS attacks, IFAC-PapersOnLine, 49, 22, 169-174 (2016)
[9] Feng, S.; Tesi, P., Resilient control under denial-of-service: Robust design, Automatica, 79, 42-51 (2017) · Zbl 1371.93124
[10] Feng, X.; Zheng, Z.; Mohapatra, P.; Cansever, D., A stackelberg game and markov modeling of moving target defense, (International conf. on decision and game theory for security (2017), Springer), 315-335 · Zbl 1453.91037
[11] Fudenberg, D.; Tirole, J., Game theory (1991), MIT Press · Zbl 1339.91001
[12] Greenwald, A.; Hall, K.; Serrano, R., Correlated Q-learning, ICML, 3, 242-249 (2003)
[13] Grover, K.; Lim, A.; Yang, Q., Jamming and anti-jamming techniques in wireless networks: a survey, International Journal of Ad Hoc and Ubiquitous Computing, 17, 4, 197-215 (2014)
[14] Gupta, V.; Hassibi, B.; Murray, R. M., Optimal lqg control across packet-dropping links, Systems & Control Letters, 56, 6, 439-446 (2007) · Zbl 1137.90379
[15] Haurie, A.; Krawczyk, J. B.; Zaccour, G., Games and dynamic games (2012), World Scientific Publishing Co. Pte. Ltd · Zbl 1396.91003
[16] Horák, K.; Zhu, Q.; Bošanskỳ, B., Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security, (International conf. on decision and game theory for security (2017), Springer), 273-294
[17] Hovareshti, P., Gupta, V., & Baras, J. S. (2007). Sensor scheduling using smart sensors. In Proc. IEEE 46th annu. conf. decision and control (pp. 494-499).
[18] Hu, J.; Wellman, M. P., Nash q-learning for general-sum stochastic games, Journal of Machine Learning Research, 4, Nov, 1039-1069 (2003) · Zbl 1094.68076
[19] Iskhakov, F.; Rust, J.; Schjerning, B., Recursive lexicographical search: Finding all markov perfect equilibria of finite state directional dynamic games, The Review of Economic Studies, 83, 2, 658-703 (2016) · Zbl 1405.91023
[20] Khattab, S., Mosse, D., & Melhem, R. (2008). Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks. In Proc. of the 5th annual international conf. on mobile and ubiquitous systems: computing, networking, and services (p. 25).
[21] Kim, K.-D.; Kumar, P., Cyber-physical systems: A perspective at the centennial, Proceedings of the IEEE (2012)
[22] Kurose, J. F.; Ross, K. W., Computer networking: A top-down approach (2012), Pearson
[23] Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proc. of the second ACM conf. on wireless network security (pp. 169-180).
[24] Li, Y.; Shi, L.; Cheng, P.; Chen, J.; Quevedo, D., Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach, IEEE Transactions on Automatic Control, 60, 10, 2831-2836 (2015) · Zbl 1360.93674
[25] Madani, O., Hanks, S., & Condon, A. (1999). On the undecidability of probabilistic planning and infinite-horizon partially observable markov decision problems. In AAAI/IAAI (pp. 541-548).
[26] Mo, Y.; Kim, T. H.-J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B., Cyber-physical security of a smart grid infrastructure, Proceedings of the IEEE, 100, 1, 195-209 (2012)
[27] Navda, V., Bohra, A., Ganguly, S., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In The 26th IEEE international conf. on computer communications (pp. 2526-2530).
[28] Noubir, G., On connectivity in ad hoc networks under jamming using directional antennas and mobility, (International conf. on wired/wireless internet communications (2004), Springer), 186-200 · Zbl 1128.68308
[29] Pajic, M., & Mangharam, R. (2009). Anti-jamming for embedded wireless networks. In IEEE international conf. on information processing in sensor networks (pp. 301-312).
[30] Pawlick, J.; Colbert, E.; Zhu, Q., A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy (2017), arXiv preprint arXiv:1712.05441
[31] Pawlick, J.; Zhu, Q., Deception by design: evidence-based signaling games for network defense (2015), arXiv preprint arXiv:1503.05458
[32] Pearce, D. (1982). Ex ante equilibrium: Strategic behaviour and the problem of perfection, Econometric Research Program Research Memorandum 301.
[33] Pickholtz, R.; Schilling, D.; Milstein, L., Theory of spread-spectrum communications-a tutorial, IEEE Transactions on Communications, 30, 5, 855-884 (1982)
[34] Qin, J.; Li, M.; Shi, L.; Yu, X., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Transactions on Automatic Control, 63, 6, 1648-1663 (2018) · Zbl 1395.68076
[35] Ren, Z.; Cheng, P.; Chen, J.; Shi, L.; Zhang, H., Dynamic sensor transmission power scheduling for remote state estimation, Automatica, 50, 4, 1235-1242 (2014) · Zbl 1298.93319
[36] Rifa-Pous, H.; Herrera-Joancomartí, J., Computational and energy costs of cryptographic algorithms on handheld devices, Future Internet, 3, 1, 31-48 (2011)
[37] Confirmation of a coordinated attack on the ukrainian power grid (2016)
[38] Sobel, M. J., Continuous stochastic games, Journal of Applied Probability, 597-604 (1973) · Zbl 0285.90088
[39] Taylor, J., Markov decision processes: Lecture notes for stp 425, Stochastic Processes (2012)
[40] Tse, D.; Viswanath, P., Fundamentals of wireless communication (2005), Cambridge University Press · Zbl 1099.94006
[41] Wang, C.; Lu, Z., Cyber deception: overview and the road ahead, IEEE Security & Privacy, 16, 2, 80-85 (2018)
[42] Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop on Wireless security (pp. 80-89).
[43] Zhang, H.; Cheng, P.; Shi, L.; Chen, J., Optimal denial-of-service attack scheduling with energy constraint, IEEE Transactions on Automatic Control, 60, 11, 3023-3028 (2015) · Zbl 1360.68302
[44] Zhu, Q.; Başar, T., Game-theoretic approach to feedback-driven multi-stage moving target defense, (International conf. on decision and game theory for security (2013), Springer), 246-263 · Zbl 1423.68059
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.