Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning

被引:10
作者
Bozkurt, Alper Kamil [1 ]
Wang, Yu [1 ]
Pajic, Miroslav [1 ]
机构
[1] Duke Univ, Durham, NC 27708 USA
来源
2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021) | 2021年
关键词
SYSTEMS; FEEDBACK; DESIGN;
D O I
10.1109/ICRA48506.2021.9560940
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of security-aware planning in an unknown stochastic environment, in the presence of attacks on control signals (i.e., actuators) of the robot. We model the attacker as an agent who has the full knowledge of the controller as well as the employed intrusion-detection system and who wants to prevent the controller from performing tasks while staying stealthy. We formulate the problem as a stochastic game between the attacker and the controller and present an approach to express the objective of such an agent and the controller as a combined linear temporal logic (LTL) formula. We then show that the planning problem, described formally as the problem of satisfying an LTL formula in a stochastic game, can be solved via model-free reinforcement learning when the environment is completely unknown. Finally, we illustrate and evaluate our methods on two robotic planning case studies.
引用
收藏
页码:10656 / 10662
页数:7
相关论文
共 41 条
[1]  
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[2]   Facets of Software Doping [J].
Barthe, Gilles ;
D'Argenio, Pedro R. ;
Finkbeiner, Bernd ;
Hermanns, Holger .
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 :601-608
[3]  
Bezzo N, 2014, IEEE INT C INT ROBOT, P3692, DOI 10.1109/IROS.2014.6943080
[4]  
Bonakdarpour B, 2018, LECT NOTES COMPUT SC, V11247, P9, DOI 10.1007/978-3-030-03427-6_2
[5]  
Bozkurt A. K., 2020, 2020 IEEE INT C ROB, P10349, DOI DOI 10.1109/ICRA40945.2020.9196796
[6]  
Bozkurt Alper Kamil, 2020, ARXIV201001050CSRO
[7]   Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks [J].
Chang, Young Hwan ;
Hu, Qie ;
Tomlin, Claire J. .
AUTOMATICA, 2018, 95 :399-412
[8]   A survey of stochastic ω-regular games [J].
Chatterjee, Krishnendu ;
Henzinger, Thomas A. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (02) :394-413
[9]  
Chowdhury Abdullahi, 2019, Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, P1426
[10]  
CPSL@Duke, 2020, CPSL DUK