Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A game-theoretic framework for security-aware sensor placement problem in networked control systems
KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.
KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering and Computer Science (EECS), Automatic Control.ORCID iD: 0000-0001-9940-5929
2019 (English)In: Proceedings of the American Control Conference, Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 114-119, article id 8814443Conference paper, Published paper (Refereed)
Abstract [en]

This paper studies the sensor placement problem in a networked control system for improving its security against cyber-physical attacks. The problem is formulated as a zero-sum game between an attacker and a detector. The attacker's decision is to select f nodes of the network to attack whereas the detector's decision is to place f sensors to detect the presence of the attack signals. In our formulation, the attacker minimizes its visibility, defined as the system L2 gain from the attack signals to the deployed sensors' outputs, and the detector maximizes the visibility of the attack signals. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the attacker-detector game is studied when the underlying connectivity graph is a directed or an undirected tree. When the game does not admit a Nash equilibrium, it is shown that the Stackelberg equilibrium of the game, with the detector as the game leader, can be computed efficiently. Our results show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared with its corresponding directed topology.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2019. p. 114-119, article id 8814443
Series
Proceedings of the American Control Conference, ISSN 07431619
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-262596Scopus ID: 2-s2.0-85072277874ISBN: 9781538679265 (print)OAI: oai:DiVA.org:kth-262596DiVA, id: diva2:1361517
Conference
2019 American Control Conference, ACC 2019; Philadelphia; United States; 10 July 2019 through 12 July 2019
Note

QC 20191016

Available from: 2019-10-16 Created: 2019-10-16 Last updated: 2019-10-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Scopus

Authority records BETA

Pirani, MohammadNekouei, EhsanSandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Pirani, MohammadNekouei, EhsanSandberg, HenrikJohansson, Karl H.
By organisation
Automatic Control
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 2 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf