Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

by   Abhishek N. Kulkarni, et al.

With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating information or providing misleading information. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The agent intentionally introduces asymmetric information to create payoff misperception. This is done by masking information about the logical formula satisfied given the outcome of the game. We introduce hypergames on graphs as a model to capture the asymmetrical information with one-sided payoff misperception. We present the solution of such a hypergame for synthesizing stealthy deceptive strategies that exploit adversary's misperception. Specifically, deceptive sure winning and deceptive almost-sure winning strategies are developed by reducing the hypergame to a two-player game and one-player stochastic game with reachability objectives. Finally, an illustrative example is introduced to demonstrate the correctness of theory and proposed algorithms.



There are no comments yet.


page 1

page 2

page 3

page 4


Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives

In this paper, we study the use of deception for strategic planning in a...

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks

Cyber-physical systems are conducting increasingly complex tasks, which ...

Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

This paper studies the satisfaction of a class of temporal properties fo...

Constructive Hybrid Games

Hybrid games are models which combine discrete, continuous, and adversar...

Decoy Allocation Games on Graphs with Temporal Logic Objectives

We study a class of games, in which the adversary (attacker) is to satis...

Non-Cooperative Inverse Reinforcement Learning

Making decisions in the presence of a strategic opponent requires one to...

Secure-by-synthesis network with active deception and temporal logic specifications

This paper is concerned with the synthesis of strategies in network syst...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.