Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief
Download
index.pdf
Date
2020-12-14
Author
Sasahara, Hampei
Sarıtaş, Serkan
Sandberg, Henrik
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
127
views
60
downloads
Cite This
This study investigates the relationship between resilience of control systems to attacks and the information available to malicious attackers. Specifically, it is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert. The behaviors of the attacker and the defender are analyzed through a repeated signaling game with an undisclosed belief under covert reactions. In the typical setting of signaling games, reactions conducted by the defender are supposed to be public information and the measurability enables the attacker to accurately trace transitions of the defender's belief on existence of a malicious attacker. In contrast, the belief in the game considered in this paper is undisclosed and hence common equilibrium concepts can no longer be employed for the analysis. To surmount this difficulty, a novel framework for decision of reasonable strategies of the players in the game is introduced. Based on the presented framework, it is revealed that any reasonable strategy chosen by a rational malicious attacker converges to the benign behavior as long as the reactions performed by the defender are unobservable to the attacker. The result provides an explicit relationship between resilience and information, which indicates the importance of covertness of reactions for designing secure control systems.
URI
https://hdl.handle.net/11511/94469
DOI
https://doi.org/10.1109/cdc42340.2020.9304351
Conference Name
59th IEEE Conference on Decision and Control, CDC 2020
Collections
Department of Electrical and Electronics Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
A systematic study of probabilistic aggregation strategies in swarm robotic systems
Soysal, Onur; Şahin, Erol; Department of Computer Engineering (2005)
In this study, a systematic analysis of probabilistic aggregation strategies in swarm robotic systems is presented. A generic aggregation behavior is proposed as a combination of four basic behaviors: obstacle avoidance, approach, repel, and wait. The latter three basic behaviors are combined using a three-state finite state machine with two probabilistic transitions among them. Two different metrics were used to compare performance of strategies. Through systematic experiments, how the aggregation performa...
Continuous improvement on maturity and capability of Security Operation Centres
Acartürk, Cengiz; Erdur, Efe (2020-12-01)
This study addresses maturity and capability assessment of Security Operation Centres (SOC). It aims to contribute to continuous improvement for SOCs by proposing a complementary methodology that provides SOCs a self-assessment capability. The method basically involves an assessment of the gaps between the current and the desired states of the organization and facilitates determining critical aspects that have priority. The proposed methodology is based on the define, measure, analyze, improve, and control ...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Investigation of personal qualities contributing to psyhological resilience among earthquake survivors : a model testing study
Karaırmak, Özlem; Owen, Dean; Department of Educational Sciences (2007)
This study is designed to investigate the relationships among affective and cognitive personal qualities leading to psychological resilience among natural disaster survivors. The main assumption of this study is that positive personal qualities might be associated with better psychological adjustment. The study aimed at testing a hypothesized theoretical model accounting for resilience with regard to personal qualities. The sample for this study was composed of individuals who were exposed to earthquakes th...
Human presence detection in emergency situations using deep learning based audio-visual systems
Geneci, İzlen; Günel Kılıç, Banu; Bozşahin, Hüseyin Cem; Department of Cognitive Sciences (2022-8-24)
The significance of emergency event detection in surveillance systems has drawn the attention of researchers in recent years. Existing methods mostly depend on visual data to identify any abnormal events since only visual sensors are frequently put in public settings. On the other hand, in an emergency, sound information may be exploited. When eyesight is occluded, audio waves can penetrate to some extent. Applications for visual analysis may be helpful when there is noise in the audio and the scene is cong...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
H. Sasahara, S. Sarıtaş, and H. Sandberg, “Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief,” Virtual, Jeju Island, Güney Kore, 2020, vol. 2020-December, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/94469.