kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 11) Show all publications
Saritas, S., Forssell, K., Thobaben, R., Sandberg, H. & Dán, G. (2021). Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study. In: ICC 2021 - IEEE International Conference on Communications: . Paper presented at IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study
Show others...
2021 (English)In: ICC 2021 - IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE) , 2021Conference paper, Published paper (Refereed)
Abstract [en]

5G and beyond 5G low power wireless networks make Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications capable of serving massive amounts of devices and machines. Due to the broadcast nature of wireless networks, it is crucial to secure the communication between these devices and machines from spoofing and interception attacks. This paper is concerned with the security of carrier frequency offset (CFO) based continuous physical layer authentication. The interaction between an attacker and a defender is modeled as a dynamic discrete leader-follower game with imperfect information. In the considered model, a legitimate user (Alice) communicates with the defender/operator (Bob) and is authorized by her CFO continuously. The attacker (Eve), by listening/eavesdropping the communication between Alice and Bob, tries to learn the CFO characteristics of Alice and aims to inject malicious packets to Bob by impersonating Alice. First, by showing that the optimal attacker strategy is a threshold policy, an optimization problem of the attacker with exponentially growing action space is reduced to a tractable integer optimization problem with a single parameter, then the corresponding defender cost is derived. Extensive simulations illustrate the characteristics of optimal strategies/utilities of the players depending on the actions, and show that the defender's optimal false positive rate causes attack success probabilities to be in the order of 0.99. The results show the importance of the parameters while finding the balance between system security and efficiency.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE International Conference on Communications, ISSN 1550-3607
Keywords
physical layer authentication, carrier frequency offset, continuous authentication, adversarial learning, threshold policy, binary hypothesis testing
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-306518 (URN)10.1109/ICC42927.2021.9500824 (DOI)000719386003084 ()2-s2.0-85115698633 (Scopus ID)
Conference
IEEE International Conference on Communications (ICC), JUN 14-23, 2021, Montreal, QC, Canada
Note

QC 20211221

Part of proceeding: ISBN 978-172817122-7

Available from: 2021-12-21 Created: 2021-12-21 Last updated: 2022-06-25Bibliographically approved
Santas, S., Shereen, E., Sandberg, H. & Dán, G. (2021). Continuous authentication security games. In: Game Theory and Machine Learning for Cyber Security: (pp. 180-203). Wiley
Open this publication in new window or tab >>Continuous authentication security games
2021 (English)In: Game Theory and Machine Learning for Cyber Security, Wiley , 2021, p. 180-203Chapter in book (Other academic)
Place, publisher, year, edition, pages
Wiley, 2021
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-329151 (URN)2-s2.0-85136766068 (Scopus ID)
Note

Part of ISBN 9781119723950 9781119723943

QC 20230614

Available from: 2023-06-15 Created: 2023-06-15 Last updated: 2024-03-18Bibliographically approved
Saritas, S., Stavrou, F., Thobaben, R. & Skoglund, M. (2021). Quadratic Signaling Games with Channel Combining Ratio. In: 2021 IEEE International Symposium on Information Theory (ISIT): . Paper presented at IEEE International Symposium on Information Theory (ISIT), JUL 12-20, 2021, ELECTR NETWORK (pp. 2690-2695). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Quadratic Signaling Games with Channel Combining Ratio
2021 (English)In: 2021 IEEE International Symposium on Information Theory (ISIT), Institute of Electrical and Electronics Engineers (IEEE) , 2021, p. 2690-2695Conference paper, Published paper (Refereed)
Abstract [en]

In this study, Nash and Stackelberg equilibria of single-stage and multi-stage quadratic signaling games between an encoder and a decoder are investigated. In the considered setup, the objective functions of the encoder and the decoder are misaligned, there is a noisy channel between the encoder and the decoder, the encoder has a soft power constraint, and the decoder has also noisy observation of the source to be estimated. We show that there exist only linear encoding and decoding strategies at the Stackelberg equilibrium, and derive the equilibrium strategies and costs. Regarding the Nash equilibrium, we explicitly characterize affine equilibria for the single-stage setup and show that the optimal encoder (resp. decoder) is affine for an affine decoder (resp. encoder) for the multi-stage setup. On the decoder side, between the information coming from the encoder and noisy observation of the source, our results describe what should be the combining ratio of these two channels. Regarding the encoder, we derive the conditions under which it is meaningful to transmit a message.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Series
IEEE International Symposium on Information Theory
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-304187 (URN)10.1109/ISIT45174.2021.9518039 (DOI)000701502202132 ()2-s2.0-85115069600 (Scopus ID)
Conference
IEEE International Symposium on Information Theory (ISIT), JUL 12-20, 2021, ELECTR NETWORK
Note

Part of proceedings: ISBN 978-1-5386-8209-8, QC 20230117

Available from: 2021-11-05 Created: 2021-11-05 Last updated: 2023-01-17Bibliographically approved
Umsonst, D., Saritas, S. & Sandberg, H. (2020). A Nash equilibrium-based moving target defense against stealthy sensor attacks. In: Proceedings of the IEEE Conference on Decision and Control: . Paper presented at 59th IEEE Conference on Decision and Control, CDC 2020, 14 December 2020 through 18 December 2020 (pp. 3772-3778). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Nash equilibrium-based moving target defense against stealthy sensor attacks
2020 (English)In: Proceedings of the IEEE Conference on Decision and Control, Institute of Electrical and Electronics Engineers (IEEE) , 2020, p. 3772-3778Conference paper, Published paper (Refereed)
Abstract [en]

This paper investigates a moving target defense strategy based on detector threshold switching against stealthy sensor attacks. We model the interactions between the attacker and the defender as a game. While the attacker wants to remain stealthy and maximize its impact, the defender wants to minimize both the cost for investigating false alarms and the attack impact. We define the moving target defense as a mixed strategy Nash equilibrium and are able to formulate an equivalent finite matrix game of the original game. We provide a necessary and sufficient condition for the existence of a moving target defense strategy. A globally optimal moving target defense strategy is obtained via a linear optimization problem by exploiting the structure of the matrix game. Simulations with a four tank system verify that by applying an optimal moving target defense strategy, the defender reduces its cost compared to the optimally chosen fixed detector threshold. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Keywords
Game theory, Linear programming, False alarms, Finite matrices, Linear optimization problems, Mixed strategy, Moving target defense, Nash equilibria, Tank system, Threshold switching, Network security
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-301193 (URN)10.1109/CDC42340.2020.9304197 (DOI)000717663403007 ()2-s2.0-85099879819 (Scopus ID)
Conference
59th IEEE Conference on Decision and Control, CDC 2020, 14 December 2020 through 18 December 2020
Funder
Swedish Research CouncilSwedish Energy Agency
Note

QC 20210908

Available from: 2021-09-08 Created: 2021-09-08 Last updated: 2023-04-05Bibliographically approved
Sasahara, H., Saritas, S. & Sandberg, H. (2020). Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief. In: Proceedings of the IEEE Conference on Decision and Control: . Paper presented at 59th IEEE Conference on Decision and Control, CDC 2020, 14 December 2020 through 18 December 2020 (pp. 3243-3248). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief
2020 (English)In: Proceedings of the IEEE Conference on Decision and Control, Institute of Electrical and Electronics Engineers Inc. , 2020, p. 3243-3248Conference paper, Published paper (Refereed)
Abstract [en]

This study investigates the relationship between resilience of control systems to attacks and the information available to malicious attackers. Specifically, it is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert. The behaviors of the attacker and the defender are analyzed through a repeated signaling game with an undisclosed belief under covert reactions. In the typical setting of signaling games, reactions conducted by the defender are supposed to be public information and the measurability enables the attacker to accurately trace transitions of the defender's belief on existence of a malicious attacker. In contrast, the belief in the game considered in this paper is undisclosed and hence common equilibrium concepts can no longer be employed for the analysis. To surmount this difficulty, a novel framework for decision of reasonable strategies of the players in the game is introduced. Based on the presented framework, it is revealed that any reasonable strategy chosen by a rational malicious attacker converges to the benign behavior as long as the reactions performed by the defender are unobservable to the attacker. The result provides an explicit relationship between resilience and information, which indicates the importance of covertness of reactions for designing secure control systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2020
Keywords
Control engineering, Public information, Secure control systems, Signaling game, Unobservable, Control systems
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-301190 (URN)10.1109/CDC42340.2020.9304351 (DOI)000717663402089 ()2-s2.0-85099885425 (Scopus ID)
Conference
59th IEEE Conference on Decision and Control, CDC 2020, 14 December 2020 through 18 December 2020
Funder
Swedish Research Council
Note

QC 20210908

Available from: 2021-09-08 Created: 2021-09-08 Last updated: 2025-01-31Bibliographically approved
Saritas, S., Yuksel, S. & Gezici, S. (2020). Dynamic signaling games with quadratic criteria under Nash and Stackelberg equilibria. Automatica, 115, Article ID 108883.
Open this publication in new window or tab >>Dynamic signaling games with quadratic criteria under Nash and Stackelberg equilibria
2020 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 115, article id 108883Article in journal (Refereed) Published
Abstract [en]

This paper considers dynamic (multi-stage) signaling games involving an encoder and a decoder who have subjective models on the cost functions. We consider both Nash (simultaneous-move) and Stackelberg (leader-follower) equilibria of dynamic signaling games under quadratic criteria. For the multi-stage scalar cheap talk, we show that the final stage equilibrium is always quantized and under further conditions the equilibria for all time stages must be quantized. In contrast, the Stackelberg equilibria are always fully revealing. In the multi-stage signaling game where the transmission of a Gauss-Markov source over a memoryless Gaussian channel is considered, affine policies constitute an invariant subspace under best response maps for Nash equilibria; whereas the Stackelberg equilibria always admit linear policies for scalar sources but such policies may be nonlinear for multi-dimensional sources. We obtain an explicit recursion for optimal linear encoding policies for multi-dimensional sources, and derive conditions under which Stackelberg equilibria are informative.

Place, publisher, year, edition, pages
Elsevier, 2020
Keywords
Signaling games, Stochastic networked control, Game theory, Information theory
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-272876 (URN)10.1016/j.automatica.2020.108883 (DOI)000525865500014 ()2-s2.0-85079793497 (Scopus ID)
Note

QC 20200601

Available from: 2020-06-01 Created: 2020-06-01 Last updated: 2022-06-26Bibliographically approved
Saritas, S., Dán, G. & Sandberg, H. (2020). Passive Fault-tolerant Estimation under Strategic Adversarial Bias. In: 2020 American Control Conference (ACC): . Paper presented at 2020 American Control Conference, ACC 2020; Denver; United States; 1 July 2020 through 3 July 2020 (pp. 4644-4651). Institute of Electrical and Electronics Engineers (IEEE), Article ID 9147994.
Open this publication in new window or tab >>Passive Fault-tolerant Estimation under Strategic Adversarial Bias
2020 (English)In: 2020 American Control Conference (ACC), Institute of Electrical and Electronics Engineers (IEEE), 2020, p. 4644-4651, article id 9147994Conference paper, Published paper (Refereed)
Abstract [en]

This paper is concerned with the problem of fault-tolerant estimation in cyber-physical systems. In cyber-physical systems, such as critical infrastructures, networked embedded sensors are widely used for monitoring and can be exploited by an adversary to deceive the control center by modifying measured values. The deception is modeled as a bias; i.e., there is a misalignment between the objective functions of the control center and the adversarial sensor. Different from previous studies, a Stackelberg equilibrium of a cheap talk setup is adapted to the attacker-defender game setting for the first time. That is, the defender (control center), as a receiver, is the leader, and the attacker (adversarial sensor), as a transmitter, is the follower. The equilibrium strategies and the associated costs are characterized for uniformly distributed variables and quadratic objective functions, and an analysis on the uniqueness of the equilibrium is provided. It is shown that the attacker and defender costs at the equilibrium are increasing with the bias and decreasing with the number of quantization levels. Our results surprisingly show that, under certain conditions, the attacker prefers a public bias rather than a private one.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Series
Proceedings of the American Control Conference, ISSN 0743-1619
Keywords
Cyber-Physical Systems, Communication
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-292375 (URN)10.23919/ACC45564.2020.9147994 (DOI)000618079804091 ()2-s2.0-85089595348 (Scopus ID)
Conference
2020 American Control Conference, ACC 2020; Denver; United States; 1 July 2020 through 3 July 2020
Note

QC 20210409

Available from: 2021-04-09 Created: 2021-04-09 Last updated: 2023-04-05Bibliographically approved
Saritas, S., Shereen, E., Sandberg, H. & Dán, G. (2019). Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach. In: 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings: . Paper presented at 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, (pp. 439-458). , 11836
Open this publication in new window or tab >>Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
2019 (English)In: 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings, 2019, Vol. 11836, p. 439-458Conference paper, Published paper (Refereed)
Abstract [en]

Identity theft through phishing and session hijacking attacks has become a major attack vector in recent years, and is expected to become more frequent due to the pervasive use of mobile devices. Continuous authentication based on the characterization of user behavior, both in terms of user interaction patterns and usage patterns, is emerging as an effective solution for mitigating identity theft, and could become an important component of defense-in-depth strategies in cyber-physical systems as well. In this paper, the interaction between an attacker and an operator using continuous authentication is modeled as a stochastic game. In the model, the attacker observes and learns the behavioral patterns of an authorized user whom it aims at impersonating, whereas the operator designs the security measures to detect suspicious behavior and to prevent unauthorized access while minimizing the monitoring expenses. It is shown that the optimal attacker strategy exhibits a threshold structure, and consists of observing the user behavior to collect information at the beginning, and then attacking (rather than observing) after gathering enough data. From the operator’s side, the optimal design of the security measures is provided. Numerical results are used to illustrate the intrinsic trade-off between monitoring cost and security risk, and show that continuous authentication can be effective in minimizing security risk.

Series
Lecture Notes in Computer Science ; 11836
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-263971 (URN)10.1007/978-3-030-32430-8_26 (DOI)000614377900026 ()2-s2.0-85076429620 (Scopus ID)
Conference
10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019,
Projects
CERCES
Note

QC 20191125

Available from: 2019-11-19 Created: 2019-11-19 Last updated: 2024-03-15Bibliographically approved
Saritas, S., Gezici, S. & Yuksel, S. (2019). Hypothesis Testing Under Subjective Priors and Costs as a Signaling Game. IEEE Transactions on Signal Processing, 67(19), 5169-5183
Open this publication in new window or tab >>Hypothesis Testing Under Subjective Priors and Costs as a Signaling Game
2019 (English)In: IEEE Transactions on Signal Processing, ISSN 1053-587X, E-ISSN 1941-0476, Vol. 67, no 19, p. 5169-5183Article in journal (Refereed) Published
Abstract [en]

Many communication, sensor network, and networked control problems involve agents (decision makers) which have either misaligned objective functions or subjective probabilistic models. In the context of such setups, we consider binary signaling problems in which the decision makers (the transmitter and the receiver) have subjective priors and/or misaligned objective functions. Depending on the commitment nature of the transmitter to his policies, we formulate the binary signaling problem as a Bayesian game under either Nash or Stackelberg equilibrium concepts and establish equilibrium solutions and their properties. We show that there can be informative or non-informative equilibria in the binary signaling game under the Stackelberg and Nash assumptions, and derive the conditions under which an informative equilibrium exists for the Stackelberg and Nash setups. For the corresponding team setup, however, an equilibrium typically always exists and is always informative. Furthermore, we investigate the effects of small perturbations in priors and costs on equilibrium values around the team setup (with identical costs and priors), and show that the Stackelberg equilibrium behavior is not robust to small perturbations whereas the Nash equilibrium is.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019
Keywords
Signal detection, hypothesis testing, signaling games, Nash equilibrium, Stackelberg equilibrium, subjective priors
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-261294 (URN)10.1109/TSP.2019.2935908 (DOI)000485740600007 ()2-s2.0-85084505690 (Scopus ID)
Note

QC 20191008

Available from: 2019-10-08 Created: 2019-10-08 Last updated: 2022-06-26Bibliographically approved
Saritas, S., Furrer, P., Gezici, S., Linder, T. & Yuksel, S. (2019). On the Number of Bins in Equilibria for Signaling Games. In: 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT): . Paper presented at 2019 IEEE International Symposium on Information Theory (ISIT), 7-12 July 2019, Paris, France (pp. 972-976). IEEE
Open this publication in new window or tab >>On the Number of Bins in Equilibria for Signaling Games
Show others...
2019 (English)In: 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), IEEE , 2019, p. 972-976Conference paper, Published paper (Refereed)
Abstract [en]

We investigate the equilibrium behavior for the decentralized quadratic cheap talk problem in which an encoder and a decoder, viewed as two decision makers, have misaligned objective functions. In prior work, we have shown that the number of bins under any equilibrium has to be at most countable, generalizing a classical result due to Crawford and Sobel who considered sources with density supported on [0, 1]. In this paper, we refine this result in the context of exponential and Gaussian sources. For exponential sources, a relation between the upper bound on the number of bins and the misalignment in the objective functions is derived, the equilibrium costs are compared, and it is shown that there also exist equilibria with infinitely many bins under certain parametric assumptions. For Gaussian sources, it is shown that there exist equilibria with infinitely many bins.

Place, publisher, year, edition, pages
IEEE, 2019
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-263400 (URN)10.1109/ISIT.2019.8849498 (DOI)000489100301013 ()2-s2.0-85073148260 (Scopus ID)
Conference
2019 IEEE International Symposium on Information Theory (ISIT), 7-12 July 2019, Paris, France
Note

QC 20191111

Available from: 2019-11-11 Created: 2019-11-11 Last updated: 2022-06-26Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5638-3213

Search in DiVA

Show all publications