Secure Route Planning Using Dynamic Games with Stopping States

被引:2
作者
Banik, Sandeep [1 ]
Bopardikar, Shaunak D. [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
来源
2020 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS) | 2020年
关键词
D O I
10.1109/IROS45743.2020.9340884
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies a motion planning problem over a roadmap in which a vehicle aims to travel from a start to a destination in presence of an attacker who can launch a cyber-attack on the vehicle over any one edge of the roadmap. The vehicle (defender) has the capability to switch on/off a countermeasure that can detect and permanently disable the attack if it occurs concurrently. We first model the problem of traversing an edge as a zero-sum dynamic game with a stopping state, termed as an edge-game played between an attacker and defender. We characterize Nash equilibria of the edge-game and provide closed form expressions for the case of two actions per player. We further provide an analytic and approximate expression on the value of an edge-game and characterize conditions under which it grows sub-linearly with the length of the edge. We study the sensitivity of Nash equilibrium to the (i) cost of using the countermeasure, (ii) cost of motion and (iii) benefit of disabling the attack. The solution of the edge-game is used to formulate and solve the secure route planning problem. We design an efficient heuristic by converting the problem to a shortest path problem using the edge cost as the solution of corresponding edge-games. We illustrate our findings through several insightful simulations.
引用
收藏
页码:2404 / 2409
页数:6
相关论文
共 16 条
[1]  
Agarwal GK, 2018, IEEE DECIS CONTR P, P1476, DOI 10.1109/CDC.2018.8619457
[2]  
Alpcan T., 2010, NETWORK SECURITY, DOI DOI 10.1017/CBO97805117607782-S2.0-84924666047
[3]  
Banik S., 2020, SECURE ROUTE PLANNIN
[4]  
Hespanha J. P., 2017, Noncooperative game theory: An introduction for engineers and computer scientists
[5]   Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks [J].
Hespanha, Joao P. ;
Bopardikar, Shaunak D. .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :489-496
[6]  
Javaid AY, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P585, DOI 10.1109/THS.2012.6459914
[7]  
Krause A., 2011, Proceedings ofthe 22nd International Joint Conference on Artificial Intelligence (IJCAI), P2133
[8]  
Lee C, 2015, 2015 EUROPEAN CONTROL CONFERENCE (ECC), P1872, DOI 10.1109/ECC.2015.7330811
[9]   Secure trajectory planning against undetectable spoofing attacks [J].
Liu, Yin-Chen ;
Bianchin, Gianluca ;
Pasqualetti, Fabio .
AUTOMATICA, 2020, 112
[10]  
Mansfield K, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), P722, DOI 10.1109/THS.2013.6699093