-
Timely Offloading in Mobile Edge Cloud Systems
Authors:
Nitya Sathyavageeswaran,
Roy D. Yates,
Anand D. Sarwate,
Narayan Mandayam
Abstract:
Future real-time applications like smart cities will use complex Machine Learning (ML) models for a variety of tasks. Timely status information is required for these applications to be reliable. Offloading computation to a mobile edge cloud (MEC) can reduce the completion time of these tasks. However, using the MEC may come at a cost such as related to use of a cloud service or privacy. In this pa…
▽ More
Future real-time applications like smart cities will use complex Machine Learning (ML) models for a variety of tasks. Timely status information is required for these applications to be reliable. Offloading computation to a mobile edge cloud (MEC) can reduce the completion time of these tasks. However, using the MEC may come at a cost such as related to use of a cloud service or privacy. In this paper, we consider a source that generates time-stamped status updates for delivery to a monitor after processing by the mobile device or MEC. We study how a scheduler must forward these updates to achieve timely updates at the monitor but also limit MEC usage. We measure timeliness at the monitor using the age of information (AoI) metric. We formulate this problem as an infinite horizon Markov decision process (MDP) with an average cost criterion. We prove that an optimal scheduling policy has an age-threshold structure that depends on how long an update has been in service.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Programming Wireless Security through Learning-Aided Spatiotemporal Digital Coding Metamaterial Antenna
Authors:
Alireza Nooraiepour,
Shaghayegh Vosoughitabar,
Chung-Tse Michael Wu,
Waheed U. Bajwa,
Narayan B. Mandayam
Abstract:
The advancement of future large-scale wireless networks necessitates the development of cost-effective and scalable security solutions. Conventional cryptographic methods, due to their computational and key management complexity, are unable to fulfill the low-latency and scalability requirements of these networks. Physical layer (PHY) security has been put forth as a cost-effective alternative to…
▽ More
The advancement of future large-scale wireless networks necessitates the development of cost-effective and scalable security solutions. Conventional cryptographic methods, due to their computational and key management complexity, are unable to fulfill the low-latency and scalability requirements of these networks. Physical layer (PHY) security has been put forth as a cost-effective alternative to cryptographic mechanisms that can circumvent the need for explicit key exchange between communication devices, owing to the fact that PHY security relies on the physics of the signal transmission for providing security. In this work, a space-time-modulated digitally-coded metamaterial (MTM) leaky wave antenna (LWA) is proposed that can enable PHY security by achieving the functionalities of directional modulation (DM) using a machine learning-aided branch and bound (B&B) optimized coding sequence. From the theoretical perspective, it is first shown that the proposed space-time MTM antenna architecture can achieve DM through both the spatial and spectral manipulation of the orthogonal frequency division multiplexing (OFDM) signal received by a user equipment. Simulation results are then provided as proof-of-principle, demonstrating the applicability of our approach for achieving DM in various communication settings. To further validate our simulation results, a prototype of the proposed architecture controlled by a field-programmable gate array (FPGA) is realized, which achieves DM via an optimized coding sequence carried out by the learning-aided branch-and-bound algorithm corresponding to the states of the MTM LWA's unit cells. Experimental results confirm the theory behind the space-time-modulated MTM LWA in achieving DM, which is observed via both the spectral harmonic patterns and bit error rate (BER) measurements.
△ Less
Submitted 12 August, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Privacy Leakage in Discrete Time Updating Systems
Authors:
Nitya Sathyavageeswaran,
Roy D. Yates,
Anand D. Sarwate,
Narayan Mandayam
Abstract:
A source generates time-stamped update packets that are sent to a server and then forwarded to a monitor. This occurs in the presence of an adversary that can infer information about the source by observing the output process of the server. The server wishes to release updates in a timely way to the monitor but also wishes to minimize the information leaked to the adversary. We analyze the trade-o…
▽ More
A source generates time-stamped update packets that are sent to a server and then forwarded to a monitor. This occurs in the presence of an adversary that can infer information about the source by observing the output process of the server. The server wishes to release updates in a timely way to the monitor but also wishes to minimize the information leaked to the adversary. We analyze the trade-off between the age of information (AoI) and the maximal leakage for systems in which the source generates updates as a Bernoulli process. For a time slotted system in which sending an update requires one slot, we consider three server policies: (1) Memoryless with Bernoulli Thinning (MBT): arriving updates are queued with some probability and head-of-line update is released after a geometric holding time; (2) Deterministic Accumulate-and-Dump (DAD): the most recently generated update (if any) is released after a fixed time; (3) Random Accumulate-and-Dump (RAD): the most recently generated update (if any) is released after a geometric waiting time. We show that for the same maximal leakage rate, the DAD policy achieves lower age compared to the other two policies but is restricted to discrete age-leakage operating points.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
Network Traffic Shaping for Enhancing Privacy in IoT Systems
Authors:
Sijie Xiong,
Anand D. Sarwate,
Narayan B. Mandayam
Abstract:
Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t…
▽ More
Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic shaping mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on the input using a DP mechanism. We show that in special cases the proposed mechanism recovers existing shapers which standardize the output independently from the input. To find the optimal shapers for given levels of privacy and transmission efficiency, we formulate the constrained problem of minimizing the expected delay per packet and propose using the expected queue size across time as a proxy. We further show that the constrained minimization is a convex program. We demonstrate the effect of shapers on both synthetic data and packet traces from actual IoT devices. The experimental results reveal inherent privacy-overhead tradeoffs: more shaping overhead provides better privacy protection. Under the same privacy level, there naturally exists a tradeoff between dummy traffic and delay. When dealing with heavier or less bursty input traffic, all shapers become more overhead-efficient. We also show that increased traffic from a larger number of IoT devices makes guaranteeing event-level privacy easier. The DP shaper offers tunable privacy that is invariant with the change in the input traffic distribution and has an advantage in handling burstiness over traffic-independent shapers. This approach well accommodates heterogeneous network conditions and enables users to adapt to their privacy/overhead demands.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
A hybrid model-based and learning-based approach for classification using limited number of training samples
Authors:
Alireza Nooraiepour,
Waheed U. Bajwa,
Narayan B. Mandayam
Abstract:
The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based s…
▽ More
The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based statistical models usually suffer from their inability to properly tune the underlying unobservable parameters, which leads to a mismatched representation of the system's behaviors. Learning-based classifiers, on the other hand, typically rely on a large number of training data from the underlying physical process, which might not be feasible in most practical scenarios. In this paper, a hybrid classification method -- termed HyPhyLearn -- is proposed that exploits both the physics-based statistical models and the learning-based classifiers. The proposed solution is based on the conjecture that HyPhyLearn would alleviate the challenges associated with the individual approaches of learning-based and statistical model-based classifiers by fusing their respective strengths. The proposed hybrid approach first estimates the unobservable model parameters using the available (suboptimal) statistical estimation procedures, and subsequently use the physics-based statistical models to generate synthetic data. Then, the training data samples are incorporated with the synthetic data in a learning-based classifier that is based on domain-adversarial training of neural networks. Specifically, in order to address the mismatch problem, the classifier learns a mapping from the training data and the synthetic data to a common feature space. Simultaneously, the classifier is trained to find discriminative features within this space in order to fulfill the classification task.
△ Less
Submitted 1 December, 2021; v1 submitted 25 June, 2021;
originally announced June 2021.
-
Prosumer Behavior: Decision Making with Bounded Horizon
Authors:
Mohsen Rajabpour,
Arnold Glass,
Robert Mulligan,
Narayan B. Mandayam
Abstract:
Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generat…
▽ More
Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generated by the solar panels on her roof or hold (store) the energy units in anticipation of a future sale at a better price. Within this context, we propose a new behavioral model that extends EUT to take into account the notion of a bounded temporal horizon over which various decision parameters are considered. Specifically, we introduce the notion of a bounded time window (the number of upcoming days over which a prosumer evaluates the probability that each possible price will be the highest) that prosumers implicitly impose on their decision making in arriving at hold or sell decisions. The new behavioral model assumes that humans make decisions that will affect their lives within a bounded time window regardless of how far into the future their units may be sold. Modeling the utility of the prosumer using parameters such as the offered price on a day, the number of energy units the prosumer has available for sale on a day, and the probabilities of the forecast prices, we fit both traditional EUT and the proposed behavioral model with bounded time windows to data collected from 57 homeowners over 68 days in a simulated energy market. Each prosumer generated surplus units of solar power and had the opportunity to sell those units to the local utility at the price set that day by the utility or hold the units for sale in the future. For most participants, a bounded horizon in the range of 4-5 days provided a much better fit to their responses than was found for the traditional (unbounded) EUT model
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Modeling the Impact of 5G Leakage on Weather Prediction
Authors:
Mohammad Yousefvand,
Chung-Tse Michael Wu,
Ruo-Qian Wang,
Joseph Brodie,
Narayan Mandayam
Abstract:
The 5G band allocated in the 26 GHz spectrum referred to as 3GPP band n258, has generated a lot of anxiety and concern in the meteorological data forecasting community including the National Oceanic and Atmospheric Administration (NOAA). Unlike traditional spectrum coexistence problems, the issue here stems from the leakage of n258 band transmissions impacting the observations of passive sensors (…
▽ More
The 5G band allocated in the 26 GHz spectrum referred to as 3GPP band n258, has generated a lot of anxiety and concern in the meteorological data forecasting community including the National Oceanic and Atmospheric Administration (NOAA). Unlike traditional spectrum coexistence problems, the issue here stems from the leakage of n258 band transmissions impacting the observations of passive sensors (e.g. AMSU-A) operating at 23.8 GHz on weather satellites used to detect the amount of water vapor in the atmosphere, which in turn affects weather forecasting and predictions. In this paper, we study the impact of 5G leakage on the accuracy of data assimilation based weather prediction algorithms by using a first order propagation model to characterize the effect of the leakage signal on the brightness temperature (atmospheric radiance) and the induced noise temperature at the receiving antenna of the passive sensor (radiometer) on the weather observation satellite. We then characterize the resulting inaccuracies when using the Weather Research and Forecasting Data Assimilation model (WRFDA) to predict temperature and rainfall. For example, the impact of 5G leakage of -20dBW to -15dBW on the well-known Super Tuesday Tornado Outbreak data set, affects the meteorological forecasting up to 0.9 mm in precipitation and 1.3 °C in 2m-temperature. We outline future directions for both improved modeling of 5G leakage effects as well as mitigation using cross-layer antenna techniques coupled with resource allocation.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
Learning End-User Behavior for Optimized Bidding in HetNets: Impact on User/Network Association
Authors:
Mohammad Yousefvand,
Narayan Mandayam
Abstract:
We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game…
▽ More
We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game where each SP offers a bid to each user that includes a data rate with a certain probabilistic service guarantee and at a given price, while the user chooses the best offer among multiple such bids. We show that when users underweight the advertised service guarantees of the SPs (a behavior observed under uncertainty), the rejection rate of the bids increases dramatically which in turn decreases the SPs utilities and service rates. To overcome this, we propose a two-stage learning-based optimized bidding framework for SPs. In the first stage, we use a support vector machine (SVM) learning algorithm to predict users' binary decisions (accept/reject bids), and then in the second stage we cast the utility-optimized bidding problem as a Markov Decision Problem (MDP) and propose a reinforcement learning-based dynamic programming algorithm to efficiently solve it. Simulation results and computational complexity analysis validate the efficiency of our proposed model.
△ Less
Submitted 11 September, 2019;
originally announced September 2019.
-
Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT
Authors:
Alireza Nooraiepour,
Waheed U. Bajwa,
Narayan B. Mandayam
Abstract:
Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable t…
▽ More
Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable to PHY spoofing attacks. These attacks which aim at injecting bogus/spurious data into the receiver, involve inferring transmission parameters and finding PHY characteristics of the transmitted signals so as to spoof the received signal. Non-contiguous (NC) OFDM systems have been argued to have low probability of exploitation (LPE) characteristics against classic attacks based on cyclostationary analysis, and the corresponding PHY has been deemed to be secure. However, with the advent of machine learning (ML) algorithms, adversaries can devise data-driven attacks to compromise such systems. It is in this vein that PHY spoofing performance of adversaries equipped with supervised and unsupervised ML tools are investigated in this paper. The supervised ML approach is based on deep neural networks (DNN) while the unsupervised one employs variational autoencoders (VAEs). In particular, VAEs are shown to be capable of learning representations from NC-OFDM signals related to their PHY characteristics such as frequency pattern and modulation scheme, which are useful for PHY spoofing. In addition, a new metric based on the disentanglement principle is proposed to measure the quality of such learned representations. Simulation results demonstrate that the performance of the spoofing adversaries highly depends on the subcarriers' allocation patterns. Particularly, it is shown that utilizing a random subcarrier occupancy pattern secures NC-OFDM systems against ML-based attacks.
△ Less
Submitted 4 July, 2020; v1 submitted 31 July, 2019;
originally announced August 2019.
-
Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets
Authors:
Mohammad Yousefvand,
Kenza Hamidouche,
Narayan B. Mandayam
Abstract:
In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the…
▽ More
In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the latency and reliability constraints of users with probabilistic guarantees, the joint problem of user offloading and resource allocation (JUR) in a URLLC setting is formulated as an optimization problem to minimize the cost of serving users for the MBS. In the considered scheme, SBSs bid to serve URLLC users under their coverage at a given price, and the MBS decides whether to serve each user locally or to offload it to one of the overlaid SBSs. Since the JUR optimization is NP-hard, we propose a low complexity learning-based heuristic method (LHM) which includes a support vector machine-based user association model and a convex resource optimization (CRO) algorithm. To further reduce the delay, we propose an alternating direction method of multipliers (ADMM)-based solution to the CRO problem. Simulation results show that using LHM, the MBS significantly decreases the spectrum access delay for users (by $\sim$ 93\%) as compared to JUR, while also reducing its bandwidth and power costs in serving users (by $\sim$ 33\%) as compared to directly serving users without offloading.
△ Less
Submitted 12 May, 2019;
originally announced May 2019.
-
Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning
Authors:
Aidin Ferdowsi,
Samad Ali,
Walid Saad,
Narayan B. Mandayam
Abstract:
Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and phy…
▽ More
Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and physical attacks on ACV networks. First, an optimal safe controller for ACVs is derived to maximize the street traffic flow while minimizing the risk of accidents by optimizing ACV speed and inter-ACV spacing. It is proven that the proposed controller is robust to physical attacks which aim at making ACV systems instable. To improve the cyber-physical security of ACV systems, next, data injection attack (DIA) detection approaches are proposed to address cyber attacks on sensors and their physical impact on the ACV system. To comprehensively design the DIA detection approaches, ACV sensors are characterized in two subsets based on the availability of a-priori information about their data. For sensors having a prior information, a DIA detection approach is proposed and an optimal threshold level is derived for the difference between the actual and estimated values of sensors data which enables ACV to stay robust against cyber attacks. For sensors having no prior information, a novel multi-armed bandit (MAB) algorithm is proposed to enable ACV to securely control its motion. Simulation results show that the proposed optimal safe controller outperforms current state of the art controllers by maximizing the robustness of ACVs to physical attacks. The results also show that the proposed DIA detection approaches, compared to Kalman filtering, can improve the security of ACV sensors against cyber attacks and ultimately improve the physical robustness of an ACV system.
△ Less
Submitted 13 December, 2018;
originally announced December 2018.
-
How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?
Authors:
Alireza Nooraiepour,
Kenza Hamidouche,
Waheed U. Bajwa,
Narayan Mandayam
Abstract:
In this paper, robustness of non-contiguous orthogonal frequency division multiplexing (NC-OFDM) transmissions is investigated and contrasted to OFDM transmissions for fending off signal exploitation attacks. In contrast to ODFM transmissions, NC-OFDM transmissions take place over a subset of active subcarriers to either avoid incumbent transmissions or for strategic considerations. A point-to-poi…
▽ More
In this paper, robustness of non-contiguous orthogonal frequency division multiplexing (NC-OFDM) transmissions is investigated and contrasted to OFDM transmissions for fending off signal exploitation attacks. In contrast to ODFM transmissions, NC-OFDM transmissions take place over a subset of active subcarriers to either avoid incumbent transmissions or for strategic considerations. A point-to-point communication system is considered in this paper in the presence of an adversary (exploiter) that aims to infer transmission parameters (e.g., the subset of active subcarriers and duration of the signal) using a deep neural network (DNN). This method has been proposed since the existing methods for exploitation, which are based on cyclostationary analysis, have been shown to have limited success in NC-OFDM systems. A good estimation of the transmission parameters allows the adversary to transmit spurious data and attack the legitimate receiver. Simulation results show that the DNN can infer the transmit parameters of OFDM signals with very good accuracy. However, NC-OFDM with fully random selection of active subcarriers makes it difficult for the adversary to exploit the waveform and thus for the receiver to be affected by the spurious data. Moreover, the more structured the set of active subcarriers selected by the transmitter is, the easier it is for the adversary to infer the transmission parameters and attack the receiver using a DNN.
△ Less
Submitted 1 October, 2018;
originally announced October 2018.
-
Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems
Authors:
Aidin Ferdowsi,
Ursula Challita,
Walid Saad,
Narayan B. Mandayam
Abstract:
To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics cont…
▽ More
To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics control, the data processing functions at AVs must be robust to such CP attacks. To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks. The attacker's action and the AV's reaction to CP attacks are studied in a game-theoretic framework. In the formulated game, the attacker seeks to inject faulty data to AV sensor readings so as to manipulate the inter-vehicle optimal safe spacing and potentially increase the risk of AV accidents or reduce the vehicle flow on the roads. Meanwhile, the AV, acting as a defender, seeks to minimize the deviations of spacing so as to ensure robustness to the attacker's actions. Since the AV has no information about the attacker's action and due to the infinite possibilities for data value manipulations, the outcome of the players' past interactions are fed to long-short term memory (LSTM) blocks. Each player's LSTM block learns the expected spacing deviation resulting from its own action and feeds it to its RL algorithm. Then, the the attacker's RL algorithm chooses the action which maximizes the spacing deviation, while the AV's RL algorithm tries to find the optimal action that minimizes such deviation.
△ Less
Submitted 8 May, 2018; v1 submitted 2 May, 2018;
originally announced May 2018.
-
Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation
Authors:
Ryoichi Shinkuma,
Narayan B. Mandayam
Abstract:
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have re…
▽ More
Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have resulted in separable APs and replaceable batteries that can be carried by UAVs and placed at arbitrary locations in the field. These advanced mechanized UAV mesh networks pose interesting questions in terms of the design of the network architecture and the optimal UAV scheduling algorithms. This paper studies a range of network architectures that depend on the mechanized automation (AP separation and battery replacement) capabilities of UAVs and proposes heuristic UAV scheduling algorithms for each network architecture, which are benchmarked against optimal designs.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure
Authors:
Aidin Ferdowsi,
Walid Saad,
Narayan B. Mandayam
Abstract:
Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compro…
▽ More
Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compromises the ICI's sensors by decoding their messages, and, subsequently, it alters the compromised sensors' data to cause state estimation errors. To thwart such attacks, the administrator of each critical infrastructure (CI) must assign protection levels to the sensors based on their importance in the state estimation process. To capture the interdependence between the attacker and the ICI administrator's actions and analyze their interactions, a Colonel Blotto game framework is proposed. The mixed-strategy Nash equilibrium of this game is derived analytically. At this equilibrium, it is shown that the administrator can strategically randomize between the protection levels of the sensors to deceive the attacker. Simulation results coupled with theoretical analysis show that, using the proposed game, the administrator can reduce the state estimation error by at least $ 50\% $ compared to a non-strategic approach that assigns protection levels proportional to sensor values.
△ Less
Submitted 5 November, 2019; v1 submitted 27 September, 2017;
originally announced September 2017.
-
Managing Price Uncertainty in Prosumer-Centric Energy Trading: A Prospect-Theoretic Stackelberg Game Approach
Authors:
Georges El Rahi,
S. Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. Vincent Poor
Abstract:
In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its pr…
▽ More
In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its profits, while the prosumers act as followers who react by choosing the amount of energy to buy or sell so as to optimize their current and future profits. The proposed game accounts for each prosumer's subjective decision when faced with the uncertainty of profits, induced by the random future price. In particular, the framing effect, from the framework of prospect theory (PT), is used to account for each prosumer's valuation of its gains and losses with respect to an individual utility reference point. The reference point changes between prosumers and stems from their past experience and future aspirations of profits. The followers' noncooperative game is shown to admit a unique pure-strategy Nash equilibrium (NE) under classical game theory (CGT) which is obtained using a fully distributed algorithm. The results are extended to account for the case of PT using algorithmic solutions that can achieve an NE under certain conditions. Simulation results show that the total grid load varies significantly with the prosumers' reference point and their loss-aversion level. In addition, it is shown that the power company's profits considerably decrease when it fails to account for the prosumers' subjective perceptions under PT.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.
-
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure
Authors:
Aidin Ferdowsi,
Anibal Sanjab,
Walid Saad,
Narayan B. Mandayam
Abstract:
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel…
▽ More
A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel game-theoretic framework. In particular, a zero-sum noncooperative game is formulated between a malicious attacker who seeks to simultaneously alter the states of the gas-power-water critical infrastructure to increase the power generation cost and a defender who allocates communication resources over its attack detection filters in local areas to monitor the infrastructure. At the mixed strategy Nash equilibrium of this game, numerical results show that the expected power generation cost deviation is 35\% lower than the one resulting from an equal allocation of resources over the local filters. The results also show that, at equilibrium, the interdependence of the power system on the natural gas and water systems can motivate the attacker to target the states of the water and natural gas systems to change the operational states of the power grid. Conversely, the defender allocates a portion of its resources to the water and natural gas states of the interdependent system to protect the grid from state deviations.
△ Less
Submitted 14 July, 2017;
originally announced July 2017.
-
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
Authors:
Aidin Ferdowsi,
Walid Saad,
Behrouz Maham,
Narayan B. Mandayam
Abstract:
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which c…
▽ More
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which can have a significant detrimental effect on a city. In this paper, a novel approach is proposed for analyzing the problem of allocating security resources, such as firewalls and anti-malware, over the various cyber components of an interdependent CPS to protect the system against imminent attacks. The problem is formulated as a Colonel Blotto game in which the attacker seeks to allocate its resources to compromise the CPS, while the defender chooses how to distribute its resources to defend against potential attacks. To evaluate the effects of defense and attack, various CPS factors are considered including human-CPS interactions as well as physical and topological characteristics of a CPS such as flow and capacity of interconnections and minimum path algorithms. Results show that, for the case in which the attacker is not aware of the CPS interdependencies, the defender can have a higher payoff, compared to the case in which the attacker has complete information. The results also show that, in the case of more symmetric nodes, due to interdependencies, the defender achieves its highest payoff at the equilibrium compared to the case with independent, asymmetric nodes.
△ Less
Submitted 23 May, 2017;
originally announced May 2017.
-
Smart Routing of Electric Vehicles for Load Balancing in Smart Grids
Authors:
S. Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. V. Poor
Abstract:
Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart g…
▽ More
Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart grid is proposed. The goal of this framework is to balance the electricity load across the grid while taking into account the traffic congestion and the waiting time at charging stations. The EV routing problem is formulated as a noncooperative game. For this game, it is shown that selfish behavior of EVs will result in a pure-strategy Nash equilibrium with the price of anarchy upper bounded by the variance of the ground load induced by the residential, industrial, or commercial users. Moreover, the results are extended to capture the stochastic nature of induced ground load as well as the subjective behavior of the owners of EVs as captured by using notions from the behavioral framework of prospect theory. Simulation results provide new insights on more efficient energy pricing at charging stations and under more realistic grid conditions.
△ Less
Submitted 27 December, 2019; v1 submitted 10 May, 2017;
originally announced May 2017.
-
Stochastic Games for Smart Grid Energy Management with Prospect Prosumers
Authors:
Seyed Rasoul Etesami,
Walid Saad,
Narayan Mandayam,
H. Vincent Poor
Abstract:
In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosume…
▽ More
In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosumers is formulated as a stochastic game, in which each prosumer seeks to maximize its payoff, in terms of revenues, by controlling its energy consumption and demand. In particular, the subjective behavior of prosumers is explicitly reflected into their payoff functions using prospect theory, a powerful framework that allows modeling real-life human choices. For this prospect-based stochastic game, it is shown that there always exists a stationary Nash equilibrium where the prosumers' trading policies in the equilibrium are independent of the time and their histories of the play. Moreover, a novel distributed algorithm with no information sharing among prosumers is proposed and shown to converge to an $ε$-Nash equilibrium. On the other hand, at the supply side, the interaction between the utility company and the prosumers is formulated as an online optimization problem in which the utility company's goal is to learn its optimal energy allocation rules. For this case, it is shown that such an optimization problem admits a no-regret algorithm meaning that regardless of the actual outcome of the game among the prosumers, the utility company can follow a strategy that mitigates its allocation costs as if it knew the entire demand market a priori. Simulation results show the convergence of the proposed algorithms to their predicted outcomes and present new insights resulting from prospect theory that contribute toward more efficient energy management in the smart grids.
△ Less
Submitted 7 August, 2017; v1 submitted 6 October, 2016;
originally announced October 2016.
-
Towards a Consumer-Centric Grid: A Behavioral Perspective
Authors:
Walid Saad,
Arnold Glass,
Narayan Mandayam,
H. Vincent Poor
Abstract:
Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed…
▽ More
Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed light on this challenge, this paper explores the potential of prospect theory, a Nobel-prize winning theory, as a decision-making framework that can help understand how risk and uncertainty can impact the decisions of smart grid consumers. After introducing the basic notions of prospect theory, several examples drawn from a number of smart grid applications are developed. These results show that a better understanding of the role of human decision-making within the smart grid is paramount for optimizing its operation and expediting the deployment of its various technologies.
△ Less
Submitted 1 November, 2015;
originally announced November 2015.