-
Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation
Authors:
Hampei Sasahara,
Takashi Tanaka,
Henrik Sandberg
Abstract:
This note addresses the problem of evaluating the impact of an attack on discrete-time nonlinear stochastic control systems. The problem is formulated as an optimal control problem with a joint chance constraint that forces the adversary to avoid detection throughout a given time period. Due to the joint constraint, the optimal control policy depends not only on the current state, but also on the…
▽ More
This note addresses the problem of evaluating the impact of an attack on discrete-time nonlinear stochastic control systems. The problem is formulated as an optimal control problem with a joint chance constraint that forces the adversary to avoid detection throughout a given time period. Due to the joint constraint, the optimal control policy depends not only on the current state, but also on the entire history, leading to an explosion of the search space and making the problem generally intractable. However, we discover that the current state and whether an alarm has been triggered, or not, is sufficient for specifying the optimal decision at each time step. This information, which we refer to as the alarm flag, can be added to the state space to create an equivalent optimal control problem that can be solved with existing numerical approaches using a Markov policy. Additionally, we note that the formulation results in a policy that does not avoid detection once an alarm has been triggered. We extend the formulation to handle multi-alarm avoidance policies for more reasonable attack impact evaluations, and show that the idea of augmenting the state space with an alarm flag is valid in this extended formulation as well.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs
Authors:
Hampei Sasahara,
György Dán,
Saurabh Amin,
Henrik Sandberg
Abstract:
This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha…
▽ More
This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their charging requirement; 2) shared nature of charging facilities; 3) pollution cost levied by regulatory agency on the use of ICEVs. We characterize Nash equilibria of this game and derive a condition for its uniqueness. We also use the gradient projection method to compute this equilibrium in a distributed manner. Our equilibrium analysis is useful to analyze the trade-off faced by players in incurring higher delay due to congestion at charging locations when the share of EVs increases versus a higher pollution cost when the share of ICEVs increases. A numerical example suggests that to increase marginal pollution cost can dramatically reduce inefficiency of equilibria.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Attack Impact Evaluation by Exact Convexification through State Space Augmentation
Authors:
Hampei Sasahara,
Takashi Tanaka,
Henrik Sandberg
Abstract:
We address the attack impact evaluation problem for control system security. We formulate the problem as a Markov decision process with a temporally joint chance constraint that forces the adversary to avoid being detected throughout the considered time period. Owing to the joint constraint, the optimal control policy depends not only on the current state but also on the entire history, which lead…
▽ More
We address the attack impact evaluation problem for control system security. We formulate the problem as a Markov decision process with a temporally joint chance constraint that forces the adversary to avoid being detected throughout the considered time period. Owing to the joint constraint, the optimal control policy depends not only on the current state but also on the entire history, which leads to the explosion of the search space and makes the problem generally intractable. It is shown that whether an alarm has been triggered or not, in addition to the current state is sufficient for specifying the optimal decision at each time step. Augmentation of the information to the state space induces an equivalent convex optimization problem, which is tractable using standard solvers.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception
Authors:
Hampei Sasahara,
Henrik Sandberg
Abstract:
This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be…
▽ More
This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be exploited, and the attacker's objective. On the other hand, rational attackers take deceptive strategies for misleading the defender into making inappropriate decisions. In this paper, their dynamic decision making is formulated as a stochastic signaling game. It is shown that the belief of the true scenario has a limit in a stochastic sense at an equilibrium based on martingale analysis. This fact implies that there are only two possible cases: the defender asymptotically detects the attack with a firm belief, or the attacker takes actions such that the system's behavior becomes nominal after a finite time step. Consequently, if different scenarios result in different stochastic behaviors, the Bayesian defense mechanism guarantees the system to be secure in an asymptotic manner provided that effective countermeasures are implemented. As an application of the finding, a defensive deception utilizing asymmetric recognition of vulnerabilities exploited by the attacker is analyzed. It is shown that the attacker possibly stops the attack even if the defender is unaware of the exploited vulnerabilities as long as the defender's unawareness is concealed by the defensive deception.
△ Less
Submitted 6 December, 2023; v1 submitted 7 January, 2022;
originally announced January 2022.
-
Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes
Authors:
Hampei Sasahara,
Henrik Sandberg
Abstract:
This study investigates general model-based incident handler's asymptotic behaviors in time against cyber attacks to control systems. The attacker's and the defender's dynamic decision making is modeled as an equilibrium of a dynamic signaling game. It is shown that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynami…
▽ More
This study investigates general model-based incident handler's asymptotic behaviors in time against cyber attacks to control systems. The attacker's and the defender's dynamic decision making is modeled as an equilibrium of a dynamic signaling game. It is shown that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynamics of the control system is known to the defender. This fact implies that the rational behavior of the attacker converges to a harmless action as long as the defender possesses an effective counteraction. The obtained result supports the powerful protection capability achieved by model-based defense mechanisms.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition
Authors:
Hampei Sasahara,
Henrik Sandberg
Abstract:
This study provides a model of cyber deception with asymmetric recognition represented by private beliefs. Signaling games, which are often used in existing works, are built on the implicit premise that the receiver's belief is public information. However, this assumption, which leads to symmetric recognition, is unrealistic in adversarial decision making. For a precise evaluation of risks arising…
▽ More
This study provides a model of cyber deception with asymmetric recognition represented by private beliefs. Signaling games, which are often used in existing works, are built on the implicit premise that the receiver's belief is public information. However, this assumption, which leads to symmetric recognition, is unrealistic in adversarial decision making. For a precise evaluation of risks arising from cognitive gaps, this paper proposes epistemic signaling games based on the Mertens-Zamir model, which explicitly quantifies players' asymmetric recognition. Equilibria of the games are analytically characterized with an interpretation.
△ Less
Submitted 11 May, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Multiuser Detection by MAP Estimation with Sum-of-Absolute-Values Relaxation
Authors:
Hampei Sasahara,
Kazunori Hayashi,
Masaaki Nagahara
Abstract:
In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g. binary signals taking values of $\pm 1$), which is taken into account as prior information in detection. We formulate the detection problem as the maximum a posteriori (MAP) es…
▽ More
In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g. binary signals taking values of $\pm 1$), which is taken into account as prior information in detection. We formulate the detection problem as the maximum a posteriori (MAP) estimation, which is relaxed to a convex optimization called the sum-of-absolute-values (SOAV) optimization. The SOAV optimization can be efficiently solved by a proximal splitting algorithm, for which we give the proximity operator in a closed form. Numerical simulations are shown to illustrate the effectiveness of the proposed approach compared with the linear minimum mean-square-error (LMMSE) and the least absolute shrinkage and selection operator (LASSO) methods.
△ Less
Submitted 25 October, 2015;
originally announced October 2015.
-
Symbol Detection for Frame-Based Faster-than-Nyquist Signaling via Sum-of-Absolute-Values Optimization
Authors:
Hampei Sasahara,
Kazunori Hayashi,
Masaaki Nagahara
Abstract:
In this letter, we propose a new symbol detection method for faster-than-Nyquist signaling (FTNS) systems. Based on frame theory, we formulate a symbol detection problem as a under-determined linear equation on a finite set. The problem is reformulated as a sum-of-absolute-values (SOAV) optimization that can be efficiently solved by the fast iterative shrinkage thresholding algorithm (FISTA). The…
▽ More
In this letter, we propose a new symbol detection method for faster-than-Nyquist signaling (FTNS) systems. Based on frame theory, we formulate a symbol detection problem as a under-determined linear equation on a finite set. The problem is reformulated as a sum-of-absolute-values (SOAV) optimization that can be efficiently solved by the fast iterative shrinkage thresholding algorithm (FISTA). The proximity operator for the convex optimization is derived analytically. Simulation results are given to show that the proposed method can successfully detect symbols in faster-than-Nyquist signaling systems and has lower complexity in terms of computation time.
△ Less
Submitted 24 August, 2015;
originally announced August 2015.
-
Digital Cancelation of Self-Interference for Single-Frequency Full-Duplex Relay Stations via Sampled-Data Control
Authors:
Hampei Sasahara,
Masaaki Nagahara,
Kazunori Hayashi,
Yutaka Yamamoto
Abstract:
In this article, we propose sampled-data design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuoustime system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedback canceler based on the sampled-data H-…
▽ More
In this article, we propose sampled-data design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuoustime system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedback canceler based on the sampled-data H-infinity control theory to cancel coupling waves taking intersample behavior into account. We also propose robust control against unknown multipath interference. Simulation results are shown to illustrate the effectiveness of the proposed method.
△ Less
Submitted 3 April, 2015; v1 submitted 9 March, 2015;
originally announced March 2015.
-
Communication Performance Analysis of Sampled-Data H-infinity Optimal Coupling Wave Canceler
Authors:
Hampei Sasahara,
Masaaki Nagahara,
Kazunori Hayashi,
Yutaka yamamoto
Abstract:
In this manuscript, we propose a design method of digital filters which cancel coupling waves generated in single-frequency full-duplex wireless relay stations by using the sampled-data H-infinity control theory. Simulation results show effectiveness of the proposed method to communication performance from a base station to a terminal.
In this manuscript, we propose a design method of digital filters which cancel coupling waves generated in single-frequency full-duplex wireless relay stations by using the sampled-data H-infinity control theory. Simulation results show effectiveness of the proposed method to communication performance from a base station to a terminal.
△ Less
Submitted 24 December, 2014;
originally announced December 2014.
-
Loop-Back Interference Suppression for OFDM Signals via Sampled-Data Control
Authors:
Hampei Sasahara,
Masaaki Nagahara,
Kazunori Hayashi,
Yutaka Yamamoto
Abstract:
In this article, we consider the problem of loop-back interference suppression for orthogonal frequency division multiplexing (OFDM) signals in amplify-and-forward single-frequency full-duplex relay stations. The loop-back interference makes the system a closed-loop system, and hence it is important not only to suppress the interference but also to stabilize the system. For this purpose, we propos…
▽ More
In this article, we consider the problem of loop-back interference suppression for orthogonal frequency division multiplexing (OFDM) signals in amplify-and-forward single-frequency full-duplex relay stations. The loop-back interference makes the system a closed-loop system, and hence it is important not only to suppress the interference but also to stabilize the system. For this purpose, we propose sampled-data $H^{\infty}$ design of digital filters that ensure the stability of the system and suppress the continuous-time effect of interference at the same time. Simulation results are shown to illustrate the effectiveness of the proposed method.
△ Less
Submitted 3 April, 2015; v1 submitted 10 December, 2014;
originally announced December 2014.
-
Sampled-Data H-infinity Design of Coupling Wave Cancelers in Single-Frequency Full-Duplex Relay Stations
Authors:
Masaaki Nagahara,
Hampei Sasahara,
Kazunori Hayashi,
Yutaka Yamamoto
Abstract:
In this article, we propose sampled-data H-infinity design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuous-time system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedforward and feedback cancelers…
▽ More
In this article, we propose sampled-data H-infinity design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuous-time system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedforward and feedback cancelers based on the sampled-data control theory to cancel coupling waves taking intersample behavior into account. Simulation results are shown to illustrate the effectiveness of the proposed method.
△ Less
Submitted 25 July, 2014;
originally announced July 2014.