13 research outputs found

    Reasoning Under Uncertainty in Cyber-Physical Systems: Toward Efficient and Secure Operation

    Full text link
    The increased sensing, processing, communication, and control capabilities introduced by cyber-physical systems bring many potential improvements to the operation of society's systems, but also introduce questions as to how one can ensure their efficient and secure operation. This dissertation investigates three questions related to decision-making under uncertainty in cyber-physical systems settings. First, in the context of power systems and electricity markets, how can one design algorithms that guide self-interested agents to a socially optimal and physically feasible outcome, subject to the fact that agents only possess localized information of the system and can only react to local signals? The proposed algorithms, investigated in the context of two distinct models, are iterative in nature and involve the exchange of messages between agents. The first model consists of a network of interconnected power systems controlled by a collection of system operators. Each system operator possesses knowledge of its own localized region and aims to prescribe the cost minimizing set of net injections for its buses. By using relative voltage angles as messages, system operators iteratively communicate to reach a social-cost minimizing and physically feasible set of injections for the whole network. The second model consists of a market operator and market participants (distribution, generation, and transmission companies). Using locational marginal pricing, the market operator is able to guide the market participants to a competitive equilibrium, which, under an assumption on the positivity of prices, is shown to be a globally optimal solution to the non-convex social-welfare maximization problem. Common to both algorithms is the use of a quadratic power flow approximation that preserves important non-linearities (power losses) while maintaining desirable mathematical properties that permit convergence under natural conditions. Second, when a system is under attack from a malicious agent, what models are appropriate for performing real-time and scalable threat assessment and response selection when we only have partial information about the attacker's intent and capabilities? The proposed model, termed the dynamic security model, is based on a type of attack graph, termed a condition dependency graph, and describes how an attacker can infiltrate a cyber network. By embedding a state space on the graph, the model is able to quantify the attacker's progression. Consideration of multiple attacker types, corresponding to attack strategies, allows one to model the defender's uncertainty of the attacker's true strategy/intent. Using noisy security alerts, the defender maintains a belief over both the capabilities/progression of the attacker (via a security state) and its strategy (attacker type). An online, tree-based search method, termed the online defense algorithm, is developed that takes advantage of the model's structure, permitting scalable computation of defense policies. Finally, in partially observable sequential decision-making environments, specifically partially observable Markov decision processes (POMDPs), under what conditions do optimal policies possess desirable structure? Motivated by the dynamic security model, we investigate settings where the underlying state space is partially ordered (i.e. settings where one cannot always say whether one state is better or worse than another state). The contribution lies in the derivation of natural conditions on the problem's parameters such that optimal policies are monotone in the belief for a class of two-action POMDPs. The extension to the partially ordered setting requires defining a new stochastic order, termed the generalized monotone likelihood ratio, and a corresponding class of order-preserving matrices, termed generalized totally positive of order 2.PHDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/144026/1/miehling_1.pd

    Sequential Detection with Mutual Information Stopping Cost

    Full text link
    This paper formulates and solves a sequential detection problem that involves the mutual information (stochastic observability) of a Gaussian process observed in noise with missing measurements. The main result is that the optimal decision is characterized by a monotone policy on the partially ordered set of positive definite covariance matrices. This monotone structure implies that numerically efficient algorithms can be designed to estimate and implement monotone parametrized decision policies.The sequential detection problem is motivated by applications in radar scheduling where the aim is to maintain the mutual information of all targets within a specified bound. We illustrate the problem formulation and performance of monotone parametrized policies via numerical examples in fly-by and persistent-surveillance applications involving a GMTI (Ground Moving Target Indicator) radar

    Stochastic target scheduling for radar resource management : threat assessment and optimal threshold policies

    No full text
    This thesis formulates a stochastic scheduler for use in adaptive resource management of a single Ground Moving Target Indicator (GMTI) radar when faced with tracking multiple, weakly maneuvering targets. The general problem involves first determining a priority allocation of the L targets, then determining the optimal time to spend using the specified allocation. We present a framework for computing the threat estimate and associated priority of each target in a surveillance environment, termed the radar macro-manager. The threat level of each target is computed based on its heading and proximity relative to a set of user-specified static assets. We present a weight assignment algorithm based on the geography of the surveillance region and use eigenvector centrality to assign vulnerability weights to each asset. The error in the threat level is computed based on the error-covariance matrix of each target, provided by a Kalman filter. Both the threat level and threat error are used to compute the respective priority rank distributions. From the priority distributions of each target we specify a queue of tasks to maximize a reward function associated with processing the queue. The queue is determined with the aid of structural results from the field of optimal issuing which involves ordering the priority rank distributions with respect to the monotone likelihood ratio. In particular, we compute an optimal queue which specifies the order in which we observe individual targets. The length of each target observation is controlled by an external stochastic process, termed the radar micro-manager. The problem of determining this optimal stopping time is formulated as a sequential decision process, a type of Markov decision process. We provide conditions such that the optimal policy is characterized by a monotone threshold policy on the partially ordered set of positive definite error covariance matrices of each target. Given that the optimal policy is monotone, we can efficiently approximate its form with an affine hyperplane using a hybrid random search - Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm. Detailed numerical simulations evaluate the performance of both the radar macro-manager and radar micro-manager.Applied Science, Faculty ofElectrical and Computer Engineering, Department ofGraduat
    corecore