Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

04/10/2020
by   Abhishek N. Kulkarni, et al.
0

With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating information or providing misleading information. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The agent intentionally introduces asymmetric information to create payoff misperception. This is done by masking information about the logical formula satisfied given the outcome of the game. We introduce hypergames on graphs as a model to capture the asymmetrical information with one-sided payoff misperception. We present the solution of such a hypergame for synthesizing stealthy deceptive strategies that exploit adversary's misperception. Specifically, deceptive sure winning and deceptive almost-sure winning strategies are developed by reducing the hypergame to a two-player game and one-player stochastic game with reachability objectives. Finally, an illustrative example is introduced to demonstrate the correctness of theory and proposed algorithms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2020

Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives

In this paper, we study the use of deception for strategic planning in a...
research
08/31/2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks

Cyber-physical systems are conducting increasingly complex tasks, which ...
research
10/27/2019

Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

This paper studies the satisfaction of a class of temporal properties fo...
research
07/01/2023

A game-theoretic approach to indistinguishability of winning objectives as user privacy

Game theory on graphs is a basic tool in computer science. In this paper...
research
11/03/2019

Non-Cooperative Inverse Reinforcement Learning

Making decisions in the presence of a strategic opponent requires one to...
research
02/17/2020

Secure-by-synthesis network with active deception and temporal logic specifications

This paper is concerned with the synthesis of strategies in network syst...
research
10/02/2020

Decoy Allocation Games on Graphs with Temporal Logic Objectives

We study a class of games, in which the adversary (attacker) is to satis...

Please sign up or login with your details

Forgot password? Click here to reset