Security of interdependent and identical networked control systems

被引:184
作者
Amin, Saurabh [1 ]
Schwartz, Galina A. [2 ]
Sastry, S. Shankar [2 ]
机构
[1] MIT, Dept Civil & Environm Engn, Cambridge, MA 02139 USA
[2] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA USA
关键词
Interdependent security; Nash games; Network reliability; Networked control systems; System security; EXTERNALITIES; TECHNOLOGY;
D O I
10.1016/j.automatica.2012.09.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies security decisions of identical plant-controller systems, when their security is interdependent due to network induced risks. Each plant is modeled by a discrete-time stochastic linear system, with the systems controlled over a shared communication network. We formulate the problem of security choices of the individual system operators (also called players) as a non-cooperative game. We consider a two-stage game, in which on the first stage the players decide whether to invest in security or not; and on the second stage, they apply control inputs to minimize the average operational costs. We characterize the equilibria of the game, which includes the determination of the individually optimal security levels. Next, we solve the problem of finding the socially optimal security levels. The presence of interdependent security causes a negative externality, and the individual players tend to under invest in security relative to the social optimum. This leads to a gap between the individual and the socially optimal security levels for a wide range of security costs. From our results, regulatory impositions to incentivize higher security investments are desirable. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:186 / 192
页数:7
相关论文
共 24 条
[1]  
ALPCAN T., 2011, Network Security: A Decision and Game -theoretic Approach
[2]  
Anderson R., 2008, P 7 WORKSH EC INF SE
[3]  
Anderson R., 2009, P 8 WORKSH EC INF SE
[4]  
[Anonymous], 2008, HOTSEC
[5]  
[Anonymous], NBER WORKING PAPERS
[6]  
[Anonymous], 2010, P 9 WORKSH EC INF SE
[7]   Special issue on technology of networked control systems [J].
Antsaklis, Panos ;
Baillieul, John .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :5-8
[8]   Choosing what to protect: Strategic defensive allocation against an unknown attacker [J].
Bier, Vicki ;
Oliveros, Santiago ;
Samuelson, Larry .
JOURNAL OF PUBLIC ECONOMIC THEORY, 2007, 9 (04) :563-587
[9]   The value of intrusion detection systems in information technology security architecture [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) :28-46
[10]   Data Transmission Over Networks for Estimation and Control [J].
Gupta, Vijay ;
Dana, Amir F. ;
Hespanha, Joao P. ;
Murray, Richard M. ;
Hassibi, Babak .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2009, 54 (08) :1807-1819