Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Sasahara, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.12684  [pdf, other

    math.OC cs.CR eess.SY

    Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: This note addresses the problem of evaluating the impact of an attack on discrete-time nonlinear stochastic control systems. The problem is formulated as an optimal control problem with a joint chance constraint that forces the adversary to avoid detection throughout a given time period. Due to the joint constraint, the optimal control policy depends not only on the current state, but also on the… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:2203.16803

  2. arXiv:2204.00209  [pdf, other

    eess.SY cs.GT

    Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs

    Authors: Hampei Sasahara, György Dán, Saurabh Amin, Henrik Sandberg

    Abstract: This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages

  3. arXiv:2203.16803  [pdf, other

    eess.SY cs.CR

    Attack Impact Evaluation by Exact Convexification through State Space Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: We address the attack impact evaluation problem for control system security. We formulate the problem as a Markov decision process with a temporally joint chance constraint that forces the adversary to avoid being detected throughout the considered time period. Owing to the joint constraint, the optimal control policy depends not only on the current state but also on the entire history, which lead… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: 8 pages

  4. arXiv:2201.02351  [pdf, other

    cs.CR cs.GT eess.SY

    Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be… ▽ More

    Submitted 6 December, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 16 pages, accepted at IEEE Transactions on Automatic Control

  5. arXiv:2103.13121  [pdf, other

    eess.SY cs.CR cs.GT

    Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study investigates general model-based incident handler's asymptotic behaviors in time against cyber attacks to control systems. The attacker's and the defender's dynamic decision making is modeled as an equilibrium of a dynamic signaling game. It is shown that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynami… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: 8 pages

  6. arXiv:2103.03287  [pdf, other

    cs.CR cs.GT eess.SY

    Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study provides a model of cyber deception with asymmetric recognition represented by private beliefs. Signaling games, which are often used in existing works, are built on the implicit premise that the receiver's belief is public information. However, this assumption, which leads to symmetric recognition, is unrealistic in adversarial decision making. For a precise evaluation of risks arising… ▽ More

    Submitted 11 May, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

  7. arXiv:1510.07273  [pdf, ps, other

    cs.IT

    Multiuser Detection by MAP Estimation with Sum-of-Absolute-Values Relaxation

    Authors: Hampei Sasahara, Kazunori Hayashi, Masaaki Nagahara

    Abstract: In this article, we consider multiuser detection that copes with multiple access interference caused in star-topology machine-to-machine (M2M) communications. We assume that the transmitted signals are discrete-valued (e.g. binary signals taking values of $\pm 1$), which is taken into account as prior information in detection. We formulate the detection problem as the maximum a posteriori (MAP) es… ▽ More

    Submitted 25 October, 2015; originally announced October 2015.

    Comments: submitted; 6 pages, 7 figures

  8. Symbol Detection for Frame-Based Faster-than-Nyquist Signaling via Sum-of-Absolute-Values Optimization

    Authors: Hampei Sasahara, Kazunori Hayashi, Masaaki Nagahara

    Abstract: In this letter, we propose a new symbol detection method for faster-than-Nyquist signaling (FTNS) systems. Based on frame theory, we formulate a symbol detection problem as a under-determined linear equation on a finite set. The problem is reformulated as a sum-of-absolute-values (SOAV) optimization that can be efficiently solved by the fast iterative shrinkage thresholding algorithm (FISTA). The… ▽ More

    Submitted 24 August, 2015; originally announced August 2015.

  9. arXiv:1503.02379  [pdf, ps, other

    eess.SY cs.IT

    Digital Cancelation of Self-Interference for Single-Frequency Full-Duplex Relay Stations via Sampled-Data Control

    Authors: Hampei Sasahara, Masaaki Nagahara, Kazunori Hayashi, Yutaka Yamamoto

    Abstract: In this article, we propose sampled-data design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuoustime system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedback canceler based on the sampled-data H-… ▽ More

    Submitted 3 April, 2015; v1 submitted 9 March, 2015; originally announced March 2015.

    Comments: SICE Journal of Control, Measurement, and System Integration (to appear); 7 pages, 14 figures. arXiv admin note: substantial text overlap with arXiv:1412.3238, arXiv:1407.7083

  10. arXiv:1412.7645  [pdf, ps, other

    cs.IT eess.SY

    Communication Performance Analysis of Sampled-Data H-infinity Optimal Coupling Wave Canceler

    Authors: Hampei Sasahara, Masaaki Nagahara, Kazunori Hayashi, Yutaka yamamoto

    Abstract: In this manuscript, we propose a design method of digital filters which cancel coupling waves generated in single-frequency full-duplex wireless relay stations by using the sampled-data H-infinity control theory. Simulation results show effectiveness of the proposed method to communication performance from a base station to a terminal.

    Submitted 24 December, 2014; originally announced December 2014.

    Comments: submitted to the SICE International Symposium on Control Systems 2015, Dec. 2014; 2 pages, 4 figures

  11. arXiv:1412.3238  [pdf, ps, other

    eess.SY cs.IT math.OC

    Loop-Back Interference Suppression for OFDM Signals via Sampled-Data Control

    Authors: Hampei Sasahara, Masaaki Nagahara, Kazunori Hayashi, Yutaka Yamamoto

    Abstract: In this article, we consider the problem of loop-back interference suppression for orthogonal frequency division multiplexing (OFDM) signals in amplify-and-forward single-frequency full-duplex relay stations. The loop-back interference makes the system a closed-loop system, and hence it is important not only to suppress the interference but also to stabilize the system. For this purpose, we propos… ▽ More

    Submitted 3 April, 2015; v1 submitted 10 December, 2014; originally announced December 2014.

    Comments: 10th Asian Control Conference 2015 (ASCC 2015), 2015; 4 pages, 10 figures

  12. arXiv:1407.7083  [pdf, ps, other

    eess.SY cs.IT math.OC

    Sampled-Data H-infinity Design of Coupling Wave Cancelers in Single-Frequency Full-Duplex Relay Stations

    Authors: Masaaki Nagahara, Hampei Sasahara, Kazunori Hayashi, Yutaka Yamamoto

    Abstract: In this article, we propose sampled-data H-infinity design of digital filters that cancel the continuous-time effect of coupling waves in a single-frequency full-duplex relay station. In this study, we model a relay station as a continuous-time system while conventional researches treat it as a discrete-time system. For a continuous-time model, we propose digital feedforward and feedback cancelers… ▽ More

    Submitted 25 July, 2014; originally announced July 2014.

    Comments: SICE Annual Conference 2014 (6 pages, 12 figures)