Optimal Secure Control With Linear Temporal Logic Constraints

被引:9
作者
Niu, Luyao [1 ]
Clark, Andrew [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Games; Stochastic processes; Probabilistic logic; Uncertainty; Security; Safety; Computational modeling; Adversary; linear temporal logic (LTL); stochastic game (SG); MARKOV DECISION-PROCESSES; CYBER-PHYSICAL SYSTEMS; GAMES; FRAMEWORK; ROBUST;
D O I
10.1109/TAC.2019.2930039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Prior work on automatic control synthesis for cyber-physical systems under logical constraints has primarily focused on environmental disturbances or modeling uncertainties, however, the impact of deliberate and malicious attacks has been less studied. In this paper, we consider a discrete-time dynamical system with a linear temporal logic (LTL) constraint in the presence of an adversary, which is modeled as a stochastic game. We assume that the adversary observes the control policy before choosing an attack strategy. We investigate two problems. In the first problem, we synthesize a robust control policy for the stochastic game that maximizes the probability of satisfying the LTL constraint. A value iteration based algorithm is proposed to compute the optimal control policy. In the second problem, we focus on a subclass of LTL constraints, which consist of an arbitrary LTL formula and an invariant constraint. We then investigate the problem of computing a control policy that minimizes the expected number of invariant constraint violations while maximizing the probability of satisfying the arbitrary LTL constraint. We characterize the optimality condition for the desired control policy. A policy iteration based algorithm is proposed to compute the control policy. We illustrate the proposed approaches using two numerical case studies.
引用
收藏
页码:2434 / 2449
页数:16
相关论文
共 47 条
[1]  
[Anonymous], ACM Computing Surveys (CSUR), DOI DOI 10.1145/2480741.2480742
[2]  
[Anonymous], 2017, Dynamic Programming and Optimal Control
[3]  
[Anonymous], 2013, HDB LINEAR ALGEBRA
[4]  
[Anonymous], 2022, SECURITY GAME THEORY
[5]  
[Anonymous], 2016, P ROB SCI SYST
[6]  
[Anonymous], 1991, Game Theory
[7]  
[Anonymous], 2008, P 7 INT JOINT C AUT
[8]  
[Anonymous], 2008, CIA REPORT CYBER EXT
[9]  
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[10]   Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder [J].
Basilico, Nicola ;
Gatti, Nicola ;
Amigoni, Francesco .
ARTIFICIAL INTELLIGENCE, 2012, 184 :78-123