kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems
Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G8, Canada..
City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). Digital Futures, London N1 9UZ, England..ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). Digital Futures, London N1 9UZ, England..ORCID iD: 0000-0001-9940-5929
2022 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 67, no 7, p. 3699-3706Article in journal (Refereed) Published
Abstract [en]

This article studies the sensor placement problem in a leader-follower networked control system for improving its security against cyber-physical attacks. In a zero-sum game, the attacker selects f nodes of the network to attack, and the detector places f sensors to detect the presence of the attack signals. In our formulation, the attacker's objective is to have a large impact on a target node in the network while being as little visible as possible to the detector. The detector, however, seeks to maximize the visibility of the attack signals. The effects of the attack signals on both the target node and the detector node are captured via the system L-2 gain from the attack signals to the target node and deployed sensors' outputs, respectively. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the single-attack single-sensor case is studied when the underlying connectivity graph is a directed or an undirected tree. We show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared to its corresponding directed topology. For the multiple-attack multiple-sensor case, we show that the game does not necessarily admit a Nash equilibrium and introduce a Stackelberg game approach, where the detector acts as the leader. Finally, these results are used to study the sensor placement problem in a vehicle platooning application in the presence of bias injection attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 67, no 7, p. 3699-3706
Keywords [en]
Graph topology, networked control systems, security game, system L-2 gain
National Category
Control Engineering Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-315525DOI: 10.1109/TAC.2021.3106866ISI: 000818858700048Scopus ID: 2-s2.0-85113903697OAI: oai:DiVA.org:kth-315525DiVA, id: diva2:1681844
Note

QC 20220707

Available from: 2022-07-07 Created: 2022-07-07 Last updated: 2022-07-07Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Sandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Sandberg, HenrikJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)
In the same journal
IEEE Transactions on Automatic Control
Control EngineeringComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 125 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf