TY - JOUR
T1 - False Data Injection Attacks on Networked Control Systems
T2 - A Stackelberg Game Analysis
AU - Li, Yuzhe
AU - Shi, Dawei
AU - Chen, Tongwen
N1 - Publisher Copyright:
© 1963-2012 IEEE.
PY - 2018/10
Y1 - 2018/10
N2 - In this paper, a security problem in networked control systems (NCS) is studied. In a standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data injection attack could be launched by a malicious attacker to deteriorate the system performance without being detected. To defend against such attacks, a defender on the NCS side needs to allocate defense resources among the sensors to secure the data, and the defense investment determines the costs of compromising certain sensors. After observing the defender' action, the attacker decides the target sensors to compromise. While both sides are subject to the resource constraints, the interactive decision-making between the defender and the attacker is investigated in a Stackelberg game (leader-follower game) framework. The optimal solutions for both sides under different types of budget constraints are analyzed. Simulation examples are provided to illustrate the main results.
AB - In this paper, a security problem in networked control systems (NCS) is studied. In a standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data injection attack could be launched by a malicious attacker to deteriorate the system performance without being detected. To defend against such attacks, a defender on the NCS side needs to allocate defense resources among the sensors to secure the data, and the defense investment determines the costs of compromising certain sensors. After observing the defender' action, the attacker decides the target sensors to compromise. While both sides are subject to the resource constraints, the interactive decision-making between the defender and the attacker is investigated in a Stackelberg game (leader-follower game) framework. The optimal solutions for both sides under different types of budget constraints are analyzed. Simulation examples are provided to illustrate the main results.
KW - False data injection attacks
KW - Stackelberg games
KW - networked control systems (NCS) security
UR - http://www.scopus.com/inward/record.url?scp=85041365471&partnerID=8YFLogxK
U2 - 10.1109/TAC.2018.2798817
DO - 10.1109/TAC.2018.2798817
M3 - Article
AN - SCOPUS:85041365471
SN - 0018-9286
VL - 63
SP - 3503
EP - 3509
JO - IEEE Transactions on Automatic Control
JF - IEEE Transactions on Automatic Control
IS - 10
M1 - 8270717
ER -