Skip to main content

On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11836))

Included in the following conference series:

Abstract

In this paper, we address the problem of obtaining optimal deceptive signaling strategies between two agents, a sender and a receiver, over an ideal channel. Different from classical (cooperative) communication settings, here, the agents select their strategies under two different cost measures. For the case when these costs are quadratic, we analyze the Stackelberg equilibrium, where the sender leads the game by committing his/her strategies beforehand. This is an infinite-dimensional optimization problem, where the sender needs to anticipate the receiver’s reaction while selecting his/her policy within the general class of stochastic kernels. The specific model we adopt for the underlying information of interest is a discrete-time Markov process generated by a vector-valued linear dynamical system, and at each instant, the information is a realization of a square integrable multivariate random vector. Over both finite and infinite horizons, we show the optimality of memoryless, “linear” signaling rules when the receiver uses a Kalman filter to estimate its information of interest. We develop algorithms that deliver the optimal signaling strategies. Numerical analysis shows that the performance of the sender degrades slightly when the receiver uses the best nonlinear estimator even when the information of interest is a Rademacher random variable rather than Gaussian.

M.O. Sayin—This research was supported in part by the U.S. Office of Naval Research (ONR) MURI grant N00014-16-1-2710, and in part by the U.S. Army Research Labs (ARL) under IoBT Grant 479432-239012-191100.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For notational simplicity, we consider time-invariant matrices A and B; however, the results could be extended to the time-variant case rather straight-forwardly.

  2. 2.

    We use the pronouns “he” and “she” while referring to \(\mathcal {P}_{S}\) and \(\mathcal {P}_{R}\), respectively, only for clear referral.

  3. 3.

    We use the terms “strategy”, “signaling/decision rule”, and “policy” interchangeably.

  4. 4.

    Note that \(\mathcal {M}_{m_a}(\pmb {c})\) is a closed subspace of \(\mathcal {H}^{(m_a)}\), and we have \(\mathcal {H}^{(m_a)} = \mathcal {M}_{m_a}(\pmb {c}) \oplus \mathcal {M}_{m_a}(\pmb {c})^{\perp }\).

  5. 5.

    With a slight abuse of notation, we define \(\mathcal {E}(\pmb {a}\,|\,\pmb {b},\pmb {c}) := \mathcal {E}\left( \pmb {a}\,|\,\begin{bmatrix} \pmb {b}'&\pmb {c}'\end{bmatrix}'\right) \).

  6. 6.

    Note that \(\varSigma _{z,k}\) satisfies (22).

  7. 7.

    We say that two random vectors \(\pmb {a},\pmb {b}\) are uncorrelated if \(\mathbb {E}\{\pmb {a}\pmb {b}' \} = \mathbb {E}\{\pmb {a}\}\mathbb {E}\{\pmb {b}\}'\). We also emphasize that uncorrelatedness is sufficient since the signal (28) is linear in \(\pmb {z}_k\) and \(\pmb {n}_k\).

  8. 8.

    We say that a point in a convex set is an extreme point if it cannot be expressed as a convex combination of any other two points in that set.

  9. 9.

    Note that \(\{\bar{S}_k-F_k\} \in \mathcal {S}\), which ensures that its \(\mathcal {S}\)-norm is bounded.

  10. 10.

    Henceforth, we omit the subscript for notational simplicity.

References

  1. Akyol, E., Langbort, C., Başar, T.: Information-theoretic approach to strategic communication as a hierarchical game. Proc. IEEE 105(2), 205–218 (2017)

    Article  Google Scholar 

  2. Anderson, B.D.O., Moore, J.B.: Optimal Filtering. Prentice Hall Inc., Upper Saddle River (1979)

    MATH  Google Scholar 

  3. Başar, T., Olsder, G.: Dynamic Noncooperative Game Theory. Society for Industrial and Applied Mathematics (SIAM) Series in Classics in Applied Mathematics (1999)

    Google Scholar 

  4. Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Nets 4(10), 1162–1172 (2011)

    Article  Google Scholar 

  5. Clark, A., Zhu, Q., Poovendran, R., Başar, T.: Deceptive routing in relay networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 171–185. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34266-0_10

    Chapter  Google Scholar 

  6. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, Hoboken (2006)

    MATH  Google Scholar 

  7. Farokhi, F., Teixeira, A., Langbort, C.: Estimation with strategic sensors. IEEE Trans. Autom. Control 62(2), 724–739 (2017)

    Article  MathSciNet  Google Scholar 

  8. Howe, D.G., Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Kerr, I., Lucock, C., Steeves, V. (eds.) On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society. Oxford University Press, Oxford (2009)

    Google Scholar 

  9. Kroese, D.P., Brereton, T., Taimre, T., Botev, Z.I.: Why the Monte Carlo method is so important today. Wiley Interdisc. Rev. Comput. Stat. 6(6), 386–392 (2014)

    Article  Google Scholar 

  10. Luenberger, D.G.: Optimization by Vector Space Methods. Wiley, Hoboken (1969)

    MATH  Google Scholar 

  11. Mirsky, L.: A trace inequality of John von Neumann. Monatshefte für Mathematik 79(4), 303–306 (1975)

    Article  MathSciNet  Google Scholar 

  12. Pawlick, J., Colbert, E., Zhu, Q.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ArXiv:1712.05441 (2017)

  13. Sarıtaş, S., Yüksel, S., Gezici, S.: Quadratic multi-dimensional signaling games and affine equilibria. IEEE Trans. Autom. Control 62(2), 605–619 (2017)

    Article  MathSciNet  Google Scholar 

  14. Sayin, M.O., Akyol, E., Başar, T.: Hierarchical multi-stage Gaussian signaling games in noncooperative communication and control systems. Automatica 107, 9–20 (2019)

    Article  MathSciNet  Google Scholar 

  15. Sayin, M.O., Başar, T.: Secure sensor design for cyber-physical systems against advanced persistent threats. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauder, S. (eds.) Proceedings of International Conference on Decision and Game Theory for Security. LNCS, vol. 10575, pp. 91–111. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-68711-7_6

    Chapter  MATH  Google Scholar 

  16. Sayin, M.O., Başar, T.: Dynamic information disclosure for deception. In: Proceedings of 57th IEEE Conference on Decision and Control (CDC), pp. 1110–1117 (2018)

    Google Scholar 

  17. Sayin, M.O., Başar, T.: Deception-as-defense framework for cyber-physical systems. arXiv:1902.01364 (2019)

  18. Sayin, M.O., Başar, T.: Robust sensor design against multiple attackers with misaligned control objectives. arXiv:1901.10618 (2019)

  19. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Professional, Boston (2002)

    Google Scholar 

  20. Tamura, W.: A theory of multidimensional information disclosure. Working paper, available at SSRN 1987877 (2014)

    Google Scholar 

  21. Zhu, Q., Clark, A., Poovendran, R., Başar, T.: Deceptive routing games. In: Proceedings of IEEE Conference on Decision and Control, pp. 2704–2711 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammed O. Sayin .

Editor information

Editors and Affiliations

A Proof of Lemma 1

A Proof of Lemma 1

In the following, we show each property one by one: Property (i) follows since \(\mathcal {M}_{m_a}(\pmb {b},\pmb {c}) = \mathcal {M}_{m_a}(\pmb {\tilde{b}}^{\perp },\pmb {c})\). Property (ii) follows since

$$\begin{aligned} \mathbb {E}\{\pmb {a}\mathcal {E}(\pmb {a}\,|\,\pmb {c})'\}&= \mathbb {E}\{\pmb {a} (\mathbb {E}\{\pmb {a}\pmb {c}'\}\mathbb {E}\{\pmb {c}\pmb {c}'\}^{\dagger }\pmb {c})'\}= \mathbb {E}\{\pmb {a}\pmb {c}'\}\mathbb {E}\{\pmb {c}\pmb {c}'\}^{\dagger } \mathbb {E}\{\pmb {a}\pmb {c}'\}'. \end{aligned}$$
(66)

Property (iii) follows since, by Property (i), we have

$$\begin{aligned} \mathbb {E}\{\mathcal {E}(\pmb {a}\,|\,\pmb {b},\pmb {c})\mathcal {E}(\pmb {a}\,|\,\pmb {c})'\} = \mathbb {E}\{\mathcal {E}(\pmb {a}\,|\,\pmb {\tilde{b}}^{\perp },\pmb {c})\mathcal {E}(\pmb {a}\,|\,\pmb {c})'\}. \end{aligned}$$
(67)

By taking a closer look at the right-hand-side, we obtain

$$\begin{aligned} \begin{bmatrix} \mathbb {E}\{\pmb {a}\pmb {c}'\} \\ \mathbb {E}\{\pmb {a}\pmb {\tilde{b}}^{\perp }\}\end{bmatrix}'\begin{bmatrix} \mathrm {cov}\{\pmb {c}\} &{} \\ &{} \mathrm {cov}\{\pmb {\tilde{b}}^{\perp }\}\end{bmatrix}^{\dagger }\begin{bmatrix} \mathbb {E}\{\pmb {c}\pmb {c}'\} \\ \mathbb {E}\{\pmb {\tilde{b}}^{\perp }\pmb {c}'\} \end{bmatrix}\mathrm {cov}\{\pmb {c}\}^{\dagger }\mathbb {E}\{\pmb {a}\pmb {c}'\}'.\nonumber \end{aligned}$$

Since \(\mathbb {E}\{\pmb {\tilde{b}}^{\perp }\pmb {c}' \} = O_{m_a\times m_c}\), it is equivalent to

$$\begin{aligned} \mathbb {E}\{\pmb {a}\pmb {c}'\}\mathrm {cov}\{\pmb {c}\}^{\dagger }\mathrm {cov}\{\pmb {c}\}\mathrm {cov}\{\pmb {c}\}^{\dagger }\mathbb {E}\{\pmb {a}\pmb {c}'\}' = \mathrm {cov}\{\mathcal {E}(\pmb {a}\,|\,\pmb {c})\},\nonumber \end{aligned}$$

which follows since the pseudo inverse of a matrix is a weak inverse for the multiplicative semi-group, i.e., \(M^{\dagger }MM^{\dagger } = M^{\dagger }\). Property (iv) follows since \(\mathrm {cov}\{\mathcal {E}(\pmb {a}\,|\,\pmb {b},\pmb {c})\}\) is equal to \(\mathrm {cov}\{\mathcal {E}(\pmb {a}\,|\,\pmb {\tilde{b}}^{\perp },\pmb {c})\}\). By taking a closer look at the right-hand-side, we obtain

$$\begin{aligned} \begin{bmatrix} \mathbb {E}\{\pmb {a}\pmb {c}'\} \\ \mathbb {E}\{\pmb {a}\pmb {\tilde{b}}^{\perp }\}\end{bmatrix}'\begin{bmatrix} \mathrm {cov}\{\pmb {c}\} &{} \\ &{} \mathrm {cov}\{\pmb {\tilde{b}}^{\perp }\}\end{bmatrix}^{\dagger }\begin{bmatrix} \mathbb {E}\{\pmb {a}\pmb {c}'\} \\ \mathbb {E}\{\pmb {a}\pmb {\tilde{b}}^{\perp }\}\end{bmatrix} = \mathrm {cov}\{\mathcal {E}(\pmb {a}\,|\,\pmb {\tilde{b}}^{\perp })\} + \mathrm {cov}\{\mathcal {E}(\pmb {a}\,|\,\pmb {c})\}. \end{aligned}$$
(68)

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sayin, M.O., Başar, T. (2019). On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons. In: Alpcan, T., Vorobeychik, Y., Baras, J., Dán, G. (eds) Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science(), vol 11836. Springer, Cham. https://doi.org/10.1007/978-3-030-32430-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32430-8_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32429-2

  • Online ISBN: 978-3-030-32430-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics