Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems

被引:0
|
作者
Kamdem, Priva Chassem [1 ]
Zemkoho, Alain B. [2 ]
Njilla, Laurent [3 ]
Nkenlifack, Marcellin [1 ]
Kamhoua, Charles A. [4 ]
机构
[1] Univ Dschang, Dept Math & Comp Sci, Dschang, Cameroon
[2] Univ Southampton, Sch Math Sci, Southampton SO17 1BJ, England
[3] Air Force Res Lab, Informat Assurance Branch, Rome, NY 13441 USA
[4] DEVCOM Army Res Lab, Charles Kamhoua Network Secur Branch, Adelphi, MD 20783 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Games; Cyber-physical systems; Bayes methods; Physical layer; Hardware; Cyberattack; Uncertainty; Government; Adaptation models; Vehicle dynamics; cyberattacks; deception-based techniques; defender's action space; signaling games; perfect Bayesian Nash equilibrium;
D O I
10.1109/ACCESS.2024.3478808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPS) are increasingly vulnerable to sophisticated cyber-attacks that can target multiple layers within the system. To strengthen defenses against these complex threats, deception-based techniques have emerged as a promising solution. While previous research has primarily focused on single-layer deception strategies, the authors argue that a multi-layer approach is essential for effectively countering advanced attackers capable of perceiving information across both the application and network layers. In this work, we propose a two-layer deception model based on signaling games to enhance the defense of CPS. Our model captures the dynamic, non-cooperative interactions between the attacker and defender under conditions of incomplete information. Unlike existing approaches, our model expands the defender's action space to incorporate deception at both the application and network layers, while maintaining the attacker's uncertainty about the true system type. Through analytical and simulation results, we identify the Perfect Bayesian Nash Equilibrium (PBNE) strategies for both players. Our findings demonstrate that the two-layer deception model significantly outperforms single-layer deception in deceiving the attacker and improving system resilience, particularly against sophisticated adversaries capable of perceiving information across multiple layers.
引用
收藏
页码:171559 / 171570
页数:12
相关论文
共 50 条
  • [41] Adaptive finite-time control for cyber-physical systems with injection and deception attacks
    Sun, Haibin
    Cui, Yahui
    Hou, Linlin
    Shi, Kaibo
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 430
  • [42] A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks
    Wadhawan, Yatin
    AlMajali, Anas
    Neuman, Clifford
    ELECTRONICS, 2018, 7 (10)
  • [43] Model Based Testing of Cyber-Physical Systems
    Khoo, Teck Ping
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 423 - 426
  • [44] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [45] Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks
    Chang, Young Hwan
    Hu, Qie
    Tomlin, Claire J.
    AUTOMATICA, 2018, 95 : 399 - 412
  • [46] Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems
    Desnitsky, Vasily A.
    Kotenko, Igor V.
    Rudavin, Nikolay N.
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 214 - 219
  • [47] Identification of Sensor Replay Attacks and Physical Faults for Cyber-Physical Systems
    Zhang, Kangkang
    Keliris, Christodoulos
    Parisini, Thomas
    Polycarpou, Marios M.
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1178 - 1183
  • [48] Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems
    Chen, Jingzhao
    Liu, Bin
    Li, Tengfei
    Hu, Yong
    SENSORS, 2023, 23 (04)
  • [49] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [50] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852