Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 9017039, 19 pages
https://doi.org/10.1155/2017/9017039
Research Article

Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems

1State Key Laboratory of Industrial Control Technology, Department of Control Science and Engineering, Zhejiang University, Hangzhou, Zhejiang 310000, China
2Institute of Cyber-Systems and Control, Zhejiang, China

Correspondence should be addressed to Dongqin Feng; nc.ude.ujz@gnefniqgnod

Received 2 March 2017; Revised 22 May 2017; Accepted 12 June 2017; Published 22 August 2017

Academic Editor: Angelos Antonopoulos

Copyright © 2017 Jiajun Shen and Dongqin Feng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. A. Lee, “Cyber physical systems: design challenges,” in Proceedings of the 11th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC '08), pp. 363–369, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” in Proceedings of the IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, vol. 60, pp. 4490–4494, IEEE, Melbourne, VIC, Australia, 2011. View at Publisher · View at Google Scholar
  3. T. Sakamoto and A. Chiba, “Experimental security analysis of a modern automobile,” IEEE Journal of Selected Topics in Quantum Electronics, vol. 41, no. 3, pp. 447–462, 2010. View at Google Scholar
  4. S. Checkoway, D. Mccoy, B. Kantor et al., “Comprehensive experimental analyses of automotive attack surfaces,” Usenix Security Symposium, vol. 1, article 43.
  5. J. Slay and M. Miller, “Lessons learned from the maroochy water breach,” in Critical Infrastructure Protection, Springer, 2007. View at Google Scholar
  6. U.S Department of Energy, 21 Steps to Improve Cyber Security of SCADA Networks. [2015-06-07]. http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/21_Steps-SCADA.pdf.
  7. Consultiong Group and CPNI, Good Practice Guide Process Control and SCADA Security PA. [2015-06-07] http://www.cpni.gov.uk/documents/publications/2008/2008031-gpg_scada_security_good_practice.pdf.
  8. Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information System Security, vol. 14, no. 1, pp. 21–32, 2009. View at Google Scholar
  9. H. Sandberg, A. Teixeira, and K. H. Johansson, “On security indices for state estimators in power networks,” in Proceedings of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden.
  10. R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, “Detecting false data injection attacks on dc state estimation,” in Proceedings of the First Workshop on Secure Control Systems Cpsweek.
  11. G. Dán and H. Sandberg, “Stealth attacks and protection schemes for state estimators in power systems,” in Proceedings of the IEEE International Conference on Smart Grid Communications, vol. 54, pp. 214–219, IEEE, 2010.
  12. M. N. Elbsat and E. E. Yaz, “Robust and resilient finite-time bounded control of discrete-time uncertain nonlinear systems,” Automatica, vol. 49, no. 7, pp. 2292–2296, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Huang, C. Wang, M. Stojmenovic, and A. Nayak, “Characterization of cascading failures in interdependent cyber-physical systems,” IEEE Transactions on Computers, vol. 64, no. 8, pp. 2158–2168, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Musso, U. V. Gizycki, U. I. Zhorszky, and D. Bormann, “Small cluster in cyber physical systems: network topology, interdependence and cascading failures,” IEEE Transactions on Parallel Distributed Systems, vol. 26, no. 8, 2015. View at Publisher · View at Google Scholar
  15. Y. Yuan, H. Yuan, L. Guo, and H. Yang, “Resilient control of networked control system under dos attacks: a unified game approach,” IEEE Transactions on Industrial Informatics, 2016. View at Google Scholar
  16. A. D'Innocenzo, F. Smarra, and M. D. Di Benedetto, “Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks,” Automatica, vol. 71, pp. 1–9, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Amin, G. A. Schwartz, and S. S. Sastry, “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186–192, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. M. Lelarge and J. Bolot, “Network externalities and the deployment of security features and protocols in the internet,” ACM Sigmetrics Performance Evaluation Review, vol. 36, no. 1, pp. 37–48, 2008. View at Google Scholar
  19. F. Hare and J. Goldstein, “The interdependent security problem in the defense industrial base: an agent-based model on a social network,” International Journal of Critical Infrastructure Protection, vol. 3, no. 3-4, pp. 128–139, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Jin, A. Green, and N. Gans, “A stable switched-system approach to obstacle avoidance for mobile robots in SE(2),” in Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2014, pp. 1533–1539, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Yuan, F. Sun, and Q. Zhu, “Resilient control in the presence of DoS attack: Switched system approach,” International Journal of Control, Automation and Systems, vol. 13, no. 6, pp. 1423–1435, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Hamid, S. Gürgens, C. Jouvray, and N. Desnos, “Enforcing S&D pattern design in RCES with modeling and formal approaches,” in Model Driven Engineering Languages and Systems, Springer, Berlin, Germany, 2011. View at Google Scholar
  23. W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05), pp. 46–57, Chicago, Ill, USA, May 2005. View at Scopus
  24. H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal denial-of-service attack scheduling with energy constraint,” IEEE Transactions on Automatic Control, vol. 60, no. 11, pp. 3023–3028, 2015. View at Publisher · View at Google Scholar
  25. A. Abate, S. Amin, M. Prandini, J. Lygeros, and S. Sastry, “Computational approaches to reachability analysis of stochastic hybrid systems,” in Proceedings of the International Conference on Hybrid Systems: Computation and Control, vol. 4416, pp. 4–17, Springer, 2007.
  26. Q. Zhu and T. Başar, “Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems,” IEEE Control Systems, vol. 35, no. 1, pp. 46–65, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. T. Alpcan and T. Básar, Network Security: A Decision and Game-Theoretic Approach, Cambridge University Press, 2010.
  28. F. Yang, Z. Wang, Y. S. Hung, and M. Gani, “H∞ control for networked systems with random communication delays,” IEEE Transactions on Automatic Control, vol. 51, no. 3, pp. 511–518, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  29. X.-Y. Li and S.-L. Sun, “H∞ control for networked systems with random delays and packet dropouts,” International Journal of Control, Automation and Systems, vol. 10, no. 5, pp. 1023–1031, 2012. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Shen and D. Feng, “Vulnerability analysis of clock synchronization protocol using stochastic petri net,” in Proceedings of the IEEE International Conference on High PERFORMANCE Computing and Communications, pp. 615–620, IEEE, 2014.
  31. S. F. Chew, S. Wang, and M. A. Lawley, “Robust supervisory control for product routings with multiple unreliable resources,” IEEE Transactions on Automation Science and Engineering, vol. 6, no. 1, pp. 195–200, 2009. View at Publisher · View at Google Scholar · View at Scopus
  32. B. Riera, R. Benlorhfar, D. Annebicque, F. Gellot, and B. Vigario, “Robust control filter for manufacturing systems: application to PLC training,” in Proceedings of the 18th IFAC World Congress, pp. 14265–14270, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. M. Knotek, F. Zezulka, Z. Simeu-Abazi, and Z. Bouredji, “Robust control and its implementation in PLC for Multi-hoist surface treatment lines,” in Proceedings of the IEEE International Conference on Industrial Technology, vol. 2, pp. 887–890, IEEE Xplore, December 2003. View at Scopus