skip to main content
10.1145/2185505.2185512acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

A dynamic game-theoretic approach to resilient control system design for cascading failures

Authors Info & Claims
Published:17 April 2012Publication History

ABSTRACT

The migration of many current critical infrastructures, such as power grids and transportations systems, into open public networks has posed many challenges in control systems. Modern control systems face uncertainties not only from the physical world but also from the cyber space. In this paper, we propose a hybrid game-theoretic approach to investigate the coupling between cyber security policy and robust control design. We study in detail the case of cascading failures in industrial control systems and provide a set of coupled optimality criteria in the linear-quadratic case. This approach can be further extended to more general cases of parallel cascading failures.

References

  1. S. Gorman, "Electricity Grid in U.S. Penetrated By Spies," Wall Street Journal, April 8, 2009, http://online.wsj.com/article/SB123914805204099085.html, Retrieved Aug. 16, 2011.Google ScholarGoogle Scholar
  2. B. Krebs, "Cyber Incident Blamed for Nuclear Power Plant Shutdown", Washington Post, June 5, 2008, http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501958.html, Retrieved Aug. 16, 2011.Google ScholarGoogle Scholar
  3. S. Greengard, "The New Face of War", Communications of the ACM, Dec. 2010, vol. 53, no. 12, pp. 20--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. McMillan, "Siemens: Stuxnet worm hit industrial systems," Computerworld, Sept. 16, 2010, http://www.computerworld.com/s/article/print/9185419, Retrieved Aug. 16, 2011.Google ScholarGoogle Scholar
  5. D. P. Nedic, I. Dobson, D. S. Kirschen, B. A. Carreras, V. E. Lynch, "Criticality in a cascading failure blackout model," Intl. J. of Electrical Power and Energy Systems, vol. 28, 2006, pp. 627--633.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Chen, J. S. Thorp, I. Dobson, "Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model," Intl. J. of Electrical Power and Energy Systems, vol. 27, no. 4, May 2005, pp. 318--326.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Asha and D. Newth, "Optimizing complex networks for resilience against cascading failure," Physica A, vol. 380, pp. 673--683, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Crucitti, V. Latora and M. Marchiori, "Model for cascading failures in complex networks," Phys. Rev. E, vol. 69, 045104(R), 2004.Google ScholarGoogle Scholar
  9. R. Hollnagel, D. D. Woods, N. Leveson (eds.), "Resilience engineering: concepts and precepts," Ashgate Publishing Company, 2006.Google ScholarGoogle Scholar
  10. E. Hollnagel, J. Pariès, D. D. Woods and J. Wreathall, "Resilience Engineering in Practice," Ashgate Publishing Company, 2011.Google ScholarGoogle Scholar
  11. Y. Y. Haimes, "On the definition of resilience in systems," Risk Analysis, vol. 29, no. 4, 2009.Google ScholarGoogle Scholar
  12. L. Mili, "Taxonomy of the characteristics of power system operating states," 2nd NSF-VT Resilient and Sustainable Critical Infrastructures (RESIN) Workshop, Tuscon, Arizona, January 13-15, 2011.Google ScholarGoogle Scholar
  13. D. Zhu, C. Rieger and T. Başar, "A hierarchical security architecture for cyber-physical systems," in Proc. of Intl. Symposium on Resilient Control Systems (ISRCS), Boise, ID, Aug. 9 - 11, 2011.Google ScholarGoogle Scholar
  14. D. Wei and K. Ji, "Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights," in Proc. of 3rd Intl. Symp. on Resilient Control Systems (ISRCS), 2010.Google ScholarGoogle Scholar
  15. Q. Zhu and T. Başar, "A hierarchical security architecture for smart grid," In Z. Han, E. Hossain and V. Poor (Eds.), Smart Grid Communications and Networking, Cambridge University Press, 2012.Google ScholarGoogle Scholar
  16. C. G. Rieger, D. I. Gertman, and M. A. McQueen, "Resilient control systems: next generation design research," In Proc. of the 2nd Conf. on Human System interactions, Catania, Italy, May 21-23, 2009, pp. 629--633. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Başar and P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach, Birkhäuser, 1995.Google ScholarGoogle Scholar
  18. Q. Zhu and T. Başar, "Robust and resilient control design for cyber-physical systems with an application to power systems," in Proc. of 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, Florida, Dec. 12-15, 2011.Google ScholarGoogle Scholar
  19. Q. Zhu and T. Başar, "Towards a unifying security framework for cyber-physical systems," in Proc. of Workshop on the Foundations of Dependable and Secure Cyber-Physical Systems (FDSCPS-11), CPSWeek 2011, Chicago.Google ScholarGoogle Scholar
  20. Q. Zhu and T. Başar, "Indices of power in optimal IDS default configuration: theory and examples," in Proc. of 2nd Conference on Decision and Game Theory (GameSec 2011), College Park, MD, USA. Nov. 14 - 15, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Q. Zhu, H. Tembine and T. Başar, "Network security configuration: a nonzero-sum stochastic game approach," in Proc. of 2010 American Control Conference (ACC), June 30 - July 2, 2010, pp. 1059--1064.Google ScholarGoogle Scholar
  22. Q. Zhu and T. Başar, "Dynamic policy-based IDS configuration," in Proc. of 48th IEEE Conference on Decision and Control, Shanghai, China, Dec. 2009, Dec. 15-18, 2009, pp. 8600--8605.Google ScholarGoogle Scholar
  23. C.-W.Ten, C.-C. Liu and M. Govindarasu, "Vulnerability assessment of cybersecurity for SCADA systems using attack trees," Power Engineering Society General Meeting, 24-28 June 2007, pp. 1--8.Google ScholarGoogle Scholar
  24. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. Wing, "Automated generation and analysis of attack graphs," IEEE Symposium on Security and Privacy, 2002, pp. 273--284. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. F. Nash, "Equilibrium points in n-person games PNAS," January 1, 1950 vol. 36 no. 1 pp. 48--49.Google ScholarGoogle Scholar
  26. T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, SIAM Series in Classics in Applied Mathematics, Philadelphia, January 1999.Google ScholarGoogle Scholar
  27. Digital Bond, http://www.digitalbond.com/tools/quickdraw/, last accessed on Feb. 20, 2012.Google ScholarGoogle Scholar

Index Terms

  1. A dynamic game-theoretic approach to resilient control system design for cascading failures

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              HiCoNS '12: Proceedings of the 1st international conference on High Confidence Networked Systems
              April 2012
              96 pages
              ISBN:9781450312639
              DOI:10.1145/2185505

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 17 April 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate30of55submissions,55%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader