False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis

被引:158
作者
Li, Yuzhe [1 ]
Shi, Dawei [2 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
[2] Harvard Univ, Harvard John A Paulson Sch Engn & Appl Sci, Cambridge, MA 02138 USA
基金
加拿大自然科学与工程研究理事会;
关键词
False data injection attacks; networked control systems (NCS) security; Stackelberg games; WIRELESS SENSOR NETWORKS; INTELLIGENT JAMMER; SECURITY; CHANNEL;
D O I
10.1109/TAC.2018.2798817
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a security problem in networked control systems (NCS) is studied. In a standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data injection attack could be launched by a malicious attacker to deteriorate the system performance without being detected. To defend against such attacks, a defender on the NCS side needs to allocate defense resources among the sensors to secure the data, and the defense investment determines the costs of compromising certain sensors. After observing the defender' action, the attacker decides the target sensors to compromise. While both sides are subject to the resource constraints, the interactive decision-making between the defender and the attacker is investigated in a Stackelberg game (leader-follower game) framework. The optimal solutions for both sides under different types of budget constraints are analyzed. Simulation examples are provided to illustrate the main results.
引用
收藏
页码:3503 / 3509
页数:7
相关论文
共 38 条
[1]  
Agah A, 2004, IEEE IPCCC, P259
[2]  
ANDERSON B. D., 2012, Optimal Filtering
[3]  
[Anonymous], 2013, ACM Comput. Surv., DOI [10.1145/2480741.2480742, DOI 10.1145/2480741.2480742]
[4]  
[Anonymous], 1950, STAT DECISION FUNCTI
[5]  
[Anonymous], PROC 45 ANN CONF
[6]  
[Anonymous], 1992, PRIMER GAME THEORY
[7]  
[Anonymous], 2014, P 48 ANN C INF SCI S
[8]   THE GAUSSIAN TEST CHANNEL WITH AN INTELLIGENT JAMMER [J].
BASAR, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) :152-157
[9]  
Basar T., 2010, NETWORK SECURITY ADE
[10]  
Basar T., 1995, DYNAMIC NONCOOPERATI, V23