370 research outputs found

    Dynamic Resilient Network Games with Applications to Multi-Agent Consensus

    Full text link
    A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, which is played repeatedly over time, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multi-agent consensus problem. We study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results.Comment: 12 pages, 13 figure

    Switched Stackelberg game analysis of false data injection attacks on networked control systems

    Get PDF
    summary:This paper is concerned with a security problem for a discrete-time linear networked control system of switched dynamics. The control sequence generated by a remotely located controller is transmitted over a vulnerable communication network, where the control input may be corrupted by false data injection attacks launched by a malicious adversary. Two partially conflicted cost functions are constructed as the quantitative guidelines for both the controller and the attacker, after which a switched Stackelberg game framework is proposed to analyze the interdependent decision-making processes. A receding-horizon switched Stackelberg strategy for the controller is derived subsequently, which, together with the corresponding best response of the attacker, constitutes the switched Stackelberg equilibrium. Furthermore, the asymptotic stability of the closed-loop system under the switched Stackelberg equilibrium is guaranteed if the switching signal exhibits a certain average dwell time. Finally, a numerical example is provided to illustrate the effectiveness of the proposed method in this paper

    Resilient Control under Denial-of-Service Attacks

    Get PDF
    Cyber-physical systems (CPSs) have attracted much attention due to the advances in automation. By integrating communication and computation technologies, CPSs have a broad spectrum of applications ranging from the control of small local systems to the control of large-scale systems, some of which are safety-critical. This raises the issue of reliability of CPSs to a considerably important level. Among a variety of aspects in reliability problems, the security of CPSs becomes a challenge from both practical and theoretical points of view. This thesis investigates the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. Intuitively, implementing predictor-based controllers can compensate for the data loss due to DoS attacks by estimating the lost signals, and hence the resilience of control systems can be improved. Following this idea, we have developed the resilient controllers by exploiting the recent results in finite-time observers. It is interesting to see that the resilience of the networked control systems depends on the prediction accuracy and horizon. Besides this, the thesis also investigates the stabilization problem of distributed systems under DoS attacks

    UAV Command and Control, Navigation and Surveillance: A Review of Potential 5G and Satellite Systems

    Full text link
    Drones, unmanned aerial vehicles (UAVs), or unmanned aerial systems (UAS) are expected to be an important component of 5G/beyond 5G (B5G) communications. This includes their use within cellular architectures (5G UAVs), in which they can facilitate both wireless broadcast and point-to-point transmissions, usually using small UAS (sUAS). Allowing UAS to operate within airspace along with commercial, cargo, and other piloted aircraft will likely require dedicated and protected aviation spectrum at least in the near term, while regulatory authorities adapt to their use. The command and control (C2), or control and non-payload communications (CNPC) link provides safety critical information for the control of the UAV both in terrestrial-based line of sight (LOS) conditions and in satellite communication links for so-called beyond LOS (BLOS) conditions. In this paper, we provide an overview of these CNPC links as they may be used in 5G and satellite systems by describing basic concepts and challenges. We review new entrant technologies that might be used for UAV C2 as well as for payload communication, such as millimeter wave (mmWave) systems, and also review navigation and surveillance challenges. A brief discussion of UAV-to-UAV communication and hardware issues are also provided.Comment: 10 pages, 5 figures, IEEE aerospace conferenc
    • …
    corecore