We study a control system where sensor measurements are transmitted to a remote station. Information may become outdated due to system drift or compromised by malicious false data injection. To quantify the impact of staleness and inaccuracy in the information at the receiver's side, we use Age of Incorrect Information (AoII). In particular, we consider the Excess AoII above a certain threshold as our key objective to minimize, which we argue to be a sensible goal for many real-time control systems. We adopt a game-theoretic framework to model the strategic interaction between a transmitter, which aims to minimize both Excess AoII and transmission costs, and a malicious agent, which seeks to maximize the same Excess AoII metric while minimizing its own costs. Our analysis reveals the existence of a Nash equilibrium for this game, and we investigate how the system parameters influence the adversary's decision to attack, identifying the conditions under which an attack becomes advantageous or not.
Bonagura, V., Badia, L., Foglietta, C., Pascucci, F., Panzieri, S. (2025). Controlling Age of Incorrect Information Violation Under Data Drift and Strategic Attacks. In 11th 2025 International Conference on Control, Decision and Information Technologies, CoDIT 2025 (pp.1406-1411). Institute of Electrical and Electronics Engineers Inc. [10.1109/CoDIT66093.2025.11321873].
Controlling Age of Incorrect Information Violation Under Data Drift and Strategic Attacks
Bonagura V.;Pascucci F.;Panzieri S.
2025-01-01
Abstract
We study a control system where sensor measurements are transmitted to a remote station. Information may become outdated due to system drift or compromised by malicious false data injection. To quantify the impact of staleness and inaccuracy in the information at the receiver's side, we use Age of Incorrect Information (AoII). In particular, we consider the Excess AoII above a certain threshold as our key objective to minimize, which we argue to be a sensible goal for many real-time control systems. We adopt a game-theoretic framework to model the strategic interaction between a transmitter, which aims to minimize both Excess AoII and transmission costs, and a malicious agent, which seeks to maximize the same Excess AoII metric while minimizing its own costs. Our analysis reveals the existence of a Nash equilibrium for this game, and we investigate how the system parameters influence the adversary's decision to attack, identifying the conditions under which an attack becomes advantageous or not.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


