Joint Security and Resources Allocation Scheme Design in Edge Intelligence Enabled CBTCs: A Two-Level Game Theoretic Approach

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS(2023)

引用 0|浏览6
暂无评分
摘要
The increasingly intense cyber-attacks have always been a crucial issue to the communication-based train control (CBTC) system due to exposed wireless channels. Both cyber-attack intrusion detection and defense policy calculation demand substantial computing resources. Combined with high capacity and reliability 5G technologies, edge intelligence (EI) is believed to help empower CBTC systems in terms of security and efficiency. This paper proposes an EI-enabled structure for CBTCs to defend against cyber-attacks, where the EI server provides real-time intelligent computing services for trains to derive real-time defense policies. We formulate the cyber-attack and defense process in EI-enabled CBTCs as a two-level game model, where system security and edge computing resource allocation are jointly optimized. In the lower-level game, we model interactions between the cyber attacker and system defender as a discrete repeated security game (DRSG), which is also a non-zero sum and incomplete information game. The fictitious play (FP) is introduced to derive a Nash equilibrium (NE) based optimal defense scheme. In the upper-level game, considering that the EI server cannot simultaneously update the optimal defense scheme for all trains due to the limited computation resources, we construct a multi-stage computation resource allocation game (MCRAG). We derive the optimal computation resource allocation scheme by the neural fictitious self-play (NFSP), where a deep Q-learning network (DQN) and a supervised learning network are jointly built to learn the strategy. Extensive simulation results show that our proposed EI-enabled CBTC system and the two-level game model can effectively defend against various attacks.
更多
查看译文
关键词
edge intelligence,resources allocation scheme design,cbtcs,joint security,two-level
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要