On robustness of a class of Cyber-Physical Network Infrastructures

Nageswara S.V. Rao, Chris Y.T. Ma, David K.Y. Yau

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A number of networked infrastructure systems rely on both cyber and physical components for their continued operation. We present graph models for a class of such systems, wherein both cyber and physical parts must be made robust, possibly using different methods at different costs. We present methods for ensuring that the system survives, with specified probability PS, cyber and physical degradations due to natural, incidental, or intentional factors. Based on first and second order statistics of the profiles of passive degradations, we present methods to compute the robustness levels needed to ensure PS. Then, we consider the case of intentional compromises, where cost profiles of the provider and compromiser are known to various extents. We present a game-theoretic formulation based on provider and disrupter cost and benefit functions, and their mutual knowledge. We present strategies and performance boundaries of these formulations in ensuring PS under utility functions that are sums of terms corresponding to infrastructure survival and cyber-physical costs.

Original languageEnglish
Title of host publicationIWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference
Pages808-813
Number of pages6
DOIs
StatePublished - 2011
Event7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011 - Istanbul, Turkey
Duration: Jul 4 2011Jul 8 2011

Publication series

NameIWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference

Conference

Conference7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011
Country/TerritoryTurkey
CityIstanbul
Period07/4/1107/8/11

Keywords

  • Cyber-physical networks
  • game theory
  • graph models
  • robustness

Fingerprint

Dive into the research topics of 'On robustness of a class of Cyber-Physical Network Infrastructures'. Together they form a unique fingerprint.

Cite this