Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3055378.3055381acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks

Published: 18 April 2017 Publication History

Abstract

To meet the growing railway-transportation demand, a new train control system, communication-based train control (CBTC) system, aims to maximize the ability of train lines by reducing the headway of each train. However, the wireless communications expose the CBTC system to new security threats. Due to the cyber-physical nature of the CBTC system, a jamming attack can damage the physical part of the train system by disrupting the communications. To address this issue, we develop a secure framework to mitigate the impact of the jamming attack based on a security criterion. At the cyber layer, we apply a multi-channel model to enhance the reliability of the communications and develop a zero-sum stochastic game to capture the interactions between the transmitter and jammer. We present analytical results and apply dynamic programming to find the equilibrium of the stochastic game. Finally, the experimental results are provided to evaluate the performance of the proposed secure mechanism.

References

[1]
Mohamed A Abdelrazik and John F Hodapp. 1989. The E-SAT 300A: a multi-channel satellite communication system for aircraft. In Global Telecommunications Conference and Exhibition'Communications Technology for the 1990s and Beyond'(GLOBECOM), 1989. IEEE. IEEE, 1423--1427.
[2]
Tamer Basar and Geert Jan Olsder. 1999. Dynamic noncooperative game theory. Vol. 23. Siam.
[3]
Dimitri P Bertsekas, Dimitri P Bertsekas, Dimitri P Bertsekas, and Dimitri P Bertsekas. 1995. Dynamic programming and optimal control. Vol. 1. Athena Scientific Belmont, MA.
[4]
Sourabh Bhattacharya and Tamer Basar. 2010. Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In American Control Conference (ACC), 2010. IEEE, 818--823.
[5]
Lin Chen. 2008. On selfish and malicious behaviors in wireless networks-a non-cooperative game theoretic approach. Ph.D. Dissertation. Télécom ParisTech.
[6]
Paul Vincent Craven. 2004. A brief look at railroad communication vulnerabilities. In Intelligent Transportation Systems, 2004. Proceedings. The 7th International IEEE Conference on. IEEE, 245--249.
[7]
Oded Gonda. 2014. Understanding the threat to SCADA networks. Network Security 2014, 9 (2014), 17--18.
[8]
Huibert Kwakernaak and Raphael Sivan. 1972. Linear optimal control systems. Vol. 1. Wiley-interscience New York.
[9]
Husheng Li, Lifeng Lai, and Robert C Qiu. 2011. A denial-of-service jamming game for remote state monitoring in smart grid. In Information Sciences and Systems (CISS), 2011 45th Annual Conference on. IEEE, 1--6.
[10]
Yuzhe Li, Daniel E Quevedo, Vincent Lau, and Ling Shi. 2014. Multi-sensor transmission power scheduling for remote state estimation under SINR model. In Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on. IEEE, 1055--1060.
[11]
Igor Lopez and Marina Aguado. 2015. Cyber security analysis of the European train control system. Communications Magazine, IEEE 53, 10 (2015), 110--116.
[12]
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux. 2013. Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45, 3 (2013), 25.
[13]
Juan Moreno, Jose Manuel Riera, Leandro De Haro, and Carlos Rodriguez. 2015. A survey on future railway radio communications services: challenges and opportunities. Communications Magazine, IEEE 53, 10 (2015), 62--68.
[14]
Henrik Sandberg, Saurabh Amin, and K Johansson. 2015. Cyberphysical security in networked control systems: an introduction to the issue. Control Systems, IEEE 35, 1 (2015), 20--23.
[15]
C Schifers and G Hans. 2000. IEEE standard for communications-based train control (CBTC) performance and functional requirements. In Vehicular Technology Conference Proceedings, VTC. 1581--1585.
[16]
André Teixeira, Daniel Pérez, Henrik Sandberg, and Karl Henrik Johansson. 2012. Attack models and scenarios for networked control systems. In Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, 55--64.
[17]
Hongwei Wang, F Richard Yu, Li Zhu, Tao Tang, and Bin Ning. 2015. A Cognitive Control Approach to Communication-Based Train Control Systems. Intelligent Transportation Systems, IEEE Transactions on 16, 4 (2015), 1676--1689.
[18]
Wenyuan Xu, Timothy Wood, Wade Trappe, and Yanyong Zhang. 2004. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop on Wireless security. ACM, 80--89.
[19]
Zhiheng Xu and Quanyan Zhu. 2015. A cyber-physical game framework for secure and resilient multi-agent autonomous systems. In 2015 54th IEEE Conference on Decision and Control (CDC). IEEE, 5156--5161.
[20]
Li Zhu, F Richard Yu, Bin Ning, and Tao Tang. 2012. Cross-layer handoff design in MIMO-enabled WLANs for communication-based train control (CBTC) systems. Selected Areas in Communications, IEEE Journal on 30, 4 (2012), 719--728.
[21]
Quanyan Zhu and Tamer Basar. 2015. Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Systems, IEEE 35, 1 (2015), 46--65.

Cited By

View all
  • (2024)Resilient Virtual Coupling Control of Automatic Train Convoys With Intermittent CommunicationsIEEE Transactions on Vehicular Technology10.1109/TVT.2023.333985473:5(6183-6195)Online publication date: May-2024
  • (2024)Secure virtual coupling control of connected train platoons under cyber attacksVehicle System Dynamics10.1080/00423114.2024.241090963:1(93-120)Online publication date: 3-Oct-2024
  • (2023)Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study2023 62nd IEEE Conference on Decision and Control (CDC)10.1109/CDC49753.2023.10384003(8328-8333)Online publication date: 13-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SCAV'17: Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles
April 2017
45 pages
ISBN:9781450349765
DOI:10.1145/3055378
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Communication-Based Train Control
  2. Cyber-Physical System
  3. Jamming Attack
  4. Secure Control
  5. Stochastic Game

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CPS Week '17
Sponsor:
CPS Week '17: Cyber Physical Systems Week 2017
April 18 - 21, 2017
PA, Pittsburgh, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Resilient Virtual Coupling Control of Automatic Train Convoys With Intermittent CommunicationsIEEE Transactions on Vehicular Technology10.1109/TVT.2023.333985473:5(6183-6195)Online publication date: May-2024
  • (2024)Secure virtual coupling control of connected train platoons under cyber attacksVehicle System Dynamics10.1080/00423114.2024.241090963:1(93-120)Online publication date: 3-Oct-2024
  • (2023)Is Stochastic Mirror Descent Vulnerable to Adversarial Delay Attacks? A Traffic Assignment Resilience Study2023 62nd IEEE Conference on Decision and Control (CDC)10.1109/CDC49753.2023.10384003(8328-8333)Online publication date: 13-Dec-2023
  • (2022)The Confluence of Networks, Games, and Learning a Game-Theoretic Framework for Multiagent Decision Making Over NetworksIEEE Control Systems10.1109/MCS.2022.317147842:4(35-67)Online publication date: Aug-2022
  • (2022)Cyber security of railway cyber-physical system (CPS) – A risk management methodologyCommunications in Transportation Research10.1016/j.commtr.2022.1000782(100078)Online publication date: Dec-2022
  • (2022)Reinforcement Learning for feedback-enabled cyber resilienceAnnual Reviews in Control10.1016/j.arcontrol.2022.01.00153(273-295)Online publication date: 2022
  • (2021)Cross-Layer Defense Methods for Jamming-Resistant CBTC SystemsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2020.300593122:11(7266-7278)Online publication date: Nov-2021
  • (2021)Control ChallengesResilient Control Architectures and Power Systems10.1002/9781119660446.ch14(215-229)Online publication date: 3-Dec-2021
  • (2020)A Non-Cooperative Game based Model for the Cybersecurity of Autonomous Systems2020 IEEE Security and Privacy Workshops (SPW)10.1109/SPW50608.2020.00049(202-207)Online publication date: May-2020
  • (2020)Dynamic games for secure and resilient control system designNational Science Review10.1093/nsr/nwz218Online publication date: 16-Jan-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media