{"title":"基于双层Stackelberg博弈的欺骗和DoS攻击下交换系统的主动安全控制","authors":"Lili Li;Yecheng Li;Jie Lian;Mengjie Li","doi":"10.1109/TCYB.2025.3561686","DOIUrl":null,"url":null,"abstract":"This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 7","pages":"3251-3261"},"PeriodicalIF":10.5000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Active Security Control for Switched Systems Under Deception and DoS Attacks Based on Two-Tier Stackelberg Game\",\"authors\":\"Lili Li;Yecheng Li;Jie Lian;Mengjie Li\",\"doi\":\"10.1109/TCYB.2025.3561686\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"55 7\",\"pages\":\"3251-3261\"},\"PeriodicalIF\":10.5000,\"publicationDate\":\"2025-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10985814/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10985814/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Active Security Control for Switched Systems Under Deception and DoS Attacks Based on Two-Tier Stackelberg Game
This article delves into the security control challenges posed by networked switched systems (NSSs) in the face of deception attacks and denial-of-service (DoS) attacks. It takes an active perspective and proposes an enhanced two-tier Stackelberg game approach to influence the actions of the deception attacker, controller, and DoS attacker. By formulating the cost functions for these three participants, it seeks to derive the optimal solution and the interplay between their respective optimal strategies. Meanwhile, two complicated situations are taken into account: The asynchronous behavior between the system and controller is caused by deception attacks tampering with switching signals; The open-loop operation of the system is caused by DoS attacks blocking the output of the controller. In the joint design of the two-tier multiattacker Stackelberg game approach and average dwell time technique, the system’s mean square exponential stability is guaranteed while revealing the quantitative relationship between the deception attack, DoS attack, and asynchronous switching behaviors. Finally, a simulation result of a switched RLC circuit confirms the validity of the obtained active security control methodology.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.