We use Bayesian game theory to investigate the interaction between a system controller and an additional unknown agent in a cyber-physical system. The system controller performs some monitoring for real-time operation management, with the aim of minimizing the age of incorrect information (AoII). The additional agent reports some extra information, which ideally can serve to aid the controller and meet the same objective of decreasing AoII, but it is uncertain whether these actions are useful or correspond to (possibly international) false data injection in the system. The controller only has information in terms of probability of the legitimacy of this extra agent through a common prior, and also knows that, in case it is malicious, it will try to increase AoII instead. Our analysis reveals that, under rational behavior, an adversary can effectively masquerading as a sensor injecting legitimate data, as the controller can hardly distinguish the behavior of a true helper from that of an attacker. However, under variable data drift, the strategic behavior of the external agent can give away their type.

Ambiguous Data Injection Impacting Age of Incorrect Information: A Bayesian Game Analysis

Badia L.;
2025

Abstract

We use Bayesian game theory to investigate the interaction between a system controller and an additional unknown agent in a cyber-physical system. The system controller performs some monitoring for real-time operation management, with the aim of minimizing the age of incorrect information (AoII). The additional agent reports some extra information, which ideally can serve to aid the controller and meet the same objective of decreasing AoII, but it is uncertain whether these actions are useful or correspond to (possibly international) false data injection in the system. The controller only has information in terms of probability of the legitimacy of this extra agent through a common prior, and also knows that, in case it is malicious, it will try to increase AoII instead. Our analysis reveals that, under rational behavior, an adversary can effectively masquerading as a sensor injecting legitimate data, as the controller can hardly distinguish the behavior of a true helper from that of an attacker. However, under variable data drift, the strategic behavior of the external agent can give away their type.
2025
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
36th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3583983
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex 0
social impact