A Zero-Sum Game Framework for Optimal Sensor Placement in
Uncertain Networked Control Systems under Cyber-Attacks
Anh Tung Nguyen1, Sribalaji C. Anand2, and Andr´
e M. H. Teixeira1
Abstract— This paper proposes a game-theoretic approach
to address the problem of optimal sensor placement against
an adversary in uncertain networked control systems. The
problem is formulated as a zero-sum game with two players,
namely a malicious adversary and a detector. Given a protected
performance vertex, we consider a detector, with uncertain
system knowledge, that selects another vertex on which to place
a sensor and monitors its output with the aim of detecting the
presence of the adversary. On the other hand, the adversary,
also with uncertain system knowledge, chooses a single vertex
and conducts a cyber-attack on its input. The purpose of the
adversary is to drive the attack vertex as to maximally disrupt
the protected performance vertex while remaining undetected
by the detector. As our first contribution, the game payoff of
the above-defined zero-sum game is formulated in terms of the
Value-at-Risk of the adversary’s impact. However, this game
payoff corresponds to an intractable optimization problem.
To tackle the problem, we adopt the scenario approach to
approximately compute the game payoff. Then, the optimal
monitor selection is determined by analyzing the equilibrium
of the zero-sum game. The proposed approach is illustrated via
a numerical example of a 10-vertex networked control system.
I. INTRODUCTION
Networked control systems have been playing a crucial
role in modeling, analysis, and operation of real-world
large-scale interconnected systems such as power systems,
transportation networks, and water distribution networks.
Those systems consist of multiple interconnected subsystems
which generally communicate with each other via insecure
communication channels to share their information. This
insecure protocol may leave the networked control systems
vulnerable to cyber-attacks such as denial-of-service and
false-data injection attacks [1], inflicting serious financial
loss and civil damages. Reports on actual damages such as
Stuxnet [2] and Industroyer [3] have described the catas-
trophic consequences of such cyber-attacks for an Iranian
nuclear program and a Ukrainian power grid, respectively.
Motivated by the above observation, cyber-physical security
has increasingly received much attention from control society
in recent years.
*This work is supported by the Swedish Research Council under the
grants 2018-04396 and 2021-06316 and by the Swedish Foundation for
Strategic Research.
1Anh Tung Nguyen and Andr´
e M. H. Teixeira are with
the Department of Information Technology, Uppsala University, PO
Box 337, SE-75105, Uppsala, Sweden. {anh.tung.nguyen,
andre.teixeira}@it.uu.se
2Sribalaji C. Anand is with the Department of Electrical Engi-
neering, Uppsala University, PO Box 65, SE-75103, Uppsala, Sweden.
sribalaji.anand@angstrom.uu.se
One of the most popular security metrics is the game-
theoretic approach that has been successfully applied to deal
with the problem of robustness, security, and resilience of
networked control systems [4]. This approach affords us to
address the robustness and security of networked control
systems within the common well-defined framework of H∞
robust control design. Further, many other concepts of games
considering networked systems subjected to cyber-attacks
such as dynamic [5], stochastic [6], network monitoring [7],
[8], and zero-sum games [9] have been recently studied.
Although the above games were successful in studying
control systems subjected to cyber-attacks such as denial-
of-service and stealthy data injection attacks, the full system
model knowledge was assumed to be available to both the
malicious adversary and the detector. This assumption might
be restrictive when it comes to large-scale interconnected
systems which can consist of a huge number of subsystems.
This can be explained by a variety of facts such as (i)limited
availability of computational resources for modeling, (ii)
limited availability of modeling data, and (iii)modeling er-
rors. Thus, the adversary and the detector might have limited
system knowledge instead of accurate system parameters,
which will be addressed throughout this paper.
In this paper, we deal with the problem of optimal sensor
placement against an adversary in an uncertain networked
control system which is represented by interconnected ver-
tices. Given a protected performance vertex, the detector
monitors the system by selecting a single monitor vertex and
placing a sensor to measure its output with the purpose of
detecting cyber-attacks. Meanwhile, the adversary chooses a
single vertex to attack and directly injects attack signals into
its input via the wireless network. The aim of the adversary
is to steer the attack vertex as to maximally disrupt the
protected performance vertex while remaining undetected by
the detector. The contributions of this paper are the following
1) The problem of optimal sensor placement against the
adversary is formulated as a zero-sum game between
two strategic players, i.e., the adversary and the detec-
tor, with the same uncertain system knowledge.
2) Due to the uncertainty, the game payoff of the zero-
sum game, which is a min-max optimization problem,
is computationally intractable [10]. To deal with the
problem, we adopt the scenario approach [11] to ap-
proximately compute the above game payoff.
3) We show that the existence of a finite solution to the
problem is related to the system-theoretic properties of
the dynamical system, namely its invariant zeros and
arXiv:2210.04091v1 [eess.SY] 8 Oct 2022