Skip to main content

2020 | OriginalPaper | Buchkapitel

7. A Game-Theoretic Approach to Secure Control of 3D Printers

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the high costs of 3D-printing infrastructure, outsourcing the production to third parties specializing in the 3D-printing process becomes necessary. The integration of a 3D-printing system with networked communications constitutes a cyber-physical system, bringing new security challenges. Adversaries can explore the vulnerabilities of networks to damage the physical parts of the system. In this chapter, we explore the vulnerabilities of 3D-printing systems and design a cross-layer approach for the system. At the physical layer, we use a Markov jump system to model the system and develop a robust control policy to deal with uncertainties. At the cyber-layer, we apply FlipIt game to model the contention between the defender and attacker for the control of the 3D-printing system. To connect these two layers, we develop a Stackelberg framework to capture the interactions between the cyber-layer attacker and defender game and the physical-layer controller and disturbance game, and define a new equilibrium concept that captures interdependence of the zero-sum and FlipIt games.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat H. Abou-Kandil, G. Freiling, G. Jank, On the solution of discrete-time markovian jump linear quadratic control problems. Automatica 31(5), 765–768 (1995)MathSciNetMATH H. Abou-Kandil, G. Freiling, G. Jank, On the solution of discrete-time markovian jump linear quadratic control problems. Automatica 31(5), 765–768 (1995)MathSciNetMATH
11.
Zurück zum Zitat T. Başar, P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach (Springer Science & Business Media, Berlin/Heidelberg, 2008), pp. 3084–3089 T. Başar, P. Bernhard, H-infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach (Springer Science & Business Media, Berlin/Heidelberg, 2008), pp. 3084–3089
12.
Zurück zum Zitat T. Başar, G.J. Olsder, Dynamic Noncooperative Game Theory, vol. 200 (SIAM, Philadelphia, PA, 1995)MATH T. Başar, G.J. Olsder, Dynamic Noncooperative Game Theory, vol. 200 (SIAM, Philadelphia, PA, 1995)MATH
32.
Zurück zum Zitat J. Chen, Q. Zhu, Control of multi-layer mobile autonomous systems in adversarial environments: a games-in-games approach. IEEE Trans. Control Netw. Syst. (2019). arXiv:1912.04082v J. Chen, Q. Zhu, Control of multi-layer mobile autonomous systems in adversarial environments: a games-in-games approach. IEEE Trans. Control Netw. Syst. (2019). arXiv:1912.04082v
35.
Zurück zum Zitat L.G. Cima, M.J. Cima, Computer aided design; stereolithography, selective laser sintering, three-dimensional printing, Feb. 13 (1996). US Patent 5,490,962 L.G. Cima, M.J. Cima, Computer aided design; stereolithography, selective laser sintering, three-dimensional printing, Feb. 13 (1996). US Patent 5,490,962
37.
Zurück zum Zitat O.L.V. Costa, M.D. Fragoso, R.P. Marques, Discrete-Time Markov Jump Linear Systems (Springer Science & Business Media, Berlin/Heidelberg, 2006) O.L.V. Costa, M.D. Fragoso, R.P. Marques, Discrete-Time Markov Jump Linear Systems (Springer Science & Business Media, Berlin/Heidelberg, 2006)
52.
Zurück zum Zitat A. Granas, J. Dugundji, Fixed Point Theory (Springer Science & Business Media, Berlin/Heidelberg, 2013) A. Granas, J. Dugundji, Fixed Point Theory (Springer Science & Business Media, Berlin/Heidelberg, 2013)
65.
Zurück zum Zitat L. Huang, Q. Zhu, Dynamic bayesian games for adversarial and defensive cyber deception, in Autonomous Cyber Deception (Springer, New York, 2019), pp. 75–97 L. Huang, Q. Zhu, Dynamic bayesian games for adversarial and defensive cyber deception, in Autonomous Cyber Deception (Springer, New York, 2019), pp. 75–97
67.
Zurück zum Zitat L. Huang, Q. Zhu, A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Comput. Secur. 89, 101660 (2020) L. Huang, Q. Zhu, A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Comput. Secur. 89, 101660 (2020)
89.
Zurück zum Zitat F. Li, A. Lai, D. Ddl, Evidence of advanced persistent threat: a case study of malware for political espionage, in 2011 6th International Conference on Malicious and Unwanted Software (MALWARE) (IEEE, New York, 2011), pp. 102–109 F. Li, A. Lai, D. Ddl, Evidence of advanced persistent threat: a case study of malware for political espionage, in 2011 6th International Conference on Malicious and Unwanted Software (MALWARE) (IEEE, New York, 2011), pp. 102–109
109.
Zurück zum Zitat B. Miller, D. Rowe, A survey scada of and critical infrastructure incidents, in Proceedings of the 1st Annual Conference on Research in Information Technology (ACM, New York, 2012), pp. 51–56 B. Miller, D. Rowe, A survey scada of and critical infrastructure incidents, in Proceedings of the 1st Annual Conference on Research in Information Technology (ACM, New York, 2012), pp. 51–56
117.
Zurück zum Zitat C. Neuman, Challenges in security for cyber-physical systems, in DHS: S&T Workshop on Future Directions in Cyber-Physical Systems Security, vol. 7. Citeseer (2009) C. Neuman, Challenges in security for cyber-physical systems, in DHS: S&T Workshop on Future Directions in Cyber-Physical Systems Security, vol. 7. Citeseer (2009)
135.
Zurück zum Zitat S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. De Meer, Physical intrusion games–optimizing surveillance by simulation and game theory. IEEE Access 5, 8394–8407 (2017) S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. De Meer, Physical intrusion games–optimizing surveillance by simulation and game theory. IEEE Access 5, 8394–8407 (2017)
143.
Zurück zum Zitat Y.E. Sagduyu, A. Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access. Wirel. Netw. 15(5), 651–666 (2009) Y.E. Sagduyu, A. Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access. Wirel. Netw. 15(5), 651–666 (2009)
158.
Zurück zum Zitat A. Sternstein, Things can go kaboom when a defense contractor’s 3D printer get hacked (2014) A. Sternstein, Things can go kaboom when a defense contractor’s 3D printer get hacked (2014)
159.
Zurück zum Zitat L. Sturm, C. Williams, J. Camelio, J. White, R. Parker, Cyber-physical vunerabilities in additive manufacturing systems. Context 7, 8 (2014) L. Sturm, C. Williams, J. Camelio, J. White, R. Parker, Cyber-physical vunerabilities in additive manufacturing systems. Context 7, 8 (2014)
167.
Zurück zum Zitat M. Van Dijk, A. Juels, A. Oprea, R.L. Rivest, Flipit: The game of stealthy takeover. J. Cryptol. 26(4), 655–713 (2013)MathSciNetMATH M. Van Dijk, A. Juels, A. Oprea, R.L. Rivest, Flipit: The game of stealthy takeover. J. Cryptol. 26(4), 655–713 (2013)MathSciNetMATH
172.
Zurück zum Zitat B.M. Weiss, Closed-loop control of a 3D printer gantry. PhD thesis, University of Washington, 2014 B.M. Weiss, Closed-loop control of a 3D printer gantry. PhD thesis, University of Washington, 2014
179.
Zurück zum Zitat M. Yampolskiy, T.R. Andel, J.T. McDonald, W.B. Glisson, A. Yasinsac, Intellectual property protection in additive layer manufacturing: requirements for secure outsourcing, in Proceedings of the 4th Program Protection and Reverse Engineering Workshop (ACM, New York, 2014), p. 7 M. Yampolskiy, T.R. Andel, J.T. McDonald, W.B. Glisson, A. Yasinsac, Intellectual property protection in additive layer manufacturing: requirements for secure outsourcing, in Proceedings of the 4th Program Protection and Reverse Engineering Workshop (ACM, New York, 2014), p. 7
201.
Zurück zum Zitat Q. Zhu, T. Başar, Robust and resilient control design for cyber-physical systems with an application to power systems, in 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC) (IEEE, New York, 2011), pp. 4066–4071 Q. Zhu, T. Başar, Robust and resilient control design for cyber-physical systems with an application to power systems, in 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC) (IEEE, New York, 2011), pp. 4066–4071
202.
Zurück zum Zitat Q. Zhu, T. Başar, A dynamic game-theoretic approach to resilient control system design for cascading failures, in Proceedings of the 1st International Conference on High Confidence Networked Systems (ACM, New York, 2012), pp. 41–46 Q. Zhu, T. Başar, A dynamic game-theoretic approach to resilient control system design for cascading failures, in Proceedings of the 1st International Conference on High Confidence Networked Systems (ACM, New York, 2012), pp. 41–46
204.
Zurück zum Zitat Q. Zhu, T. Basar, Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Syst. IEEE 35(1), 46–65 (2015)MathSciNet Q. Zhu, T. Basar, Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Syst. IEEE 35(1), 46–65 (2015)MathSciNet
206.
Zurück zum Zitat Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018) Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018)
211.
Zurück zum Zitat Q. Zhu, A. Clark, R. Poovendran, T. Başar, Deceptive routing games, in 2012 IEEE 51st IEEE Conference on Decision and Control (CDC) (IEEE, New York, 2012), pp. 2704–2711 Q. Zhu, A. Clark, R. Poovendran, T. Başar, Deceptive routing games, in 2012 IEEE 51st IEEE Conference on Decision and Control (CDC) (IEEE, New York, 2012), pp. 2704–2711
Metadaten
Titel
A Game-Theoretic Approach to Secure Control of 3D Printers
verfasst von
Quanyan Zhu
Zhiheng Xu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-60251-2_7