We study a control system where sensor measurements are transmitted to a remote station. Information may become outdated due to system drift or compromised by malicious false data injection. To quantify the impact of staleness and inaccuracy in the information at the receiver's side, we use Age of Incorrect Information (AoII). In particular, we consider the Excess AoII above a certain threshold as our key objective to minimize, which we argue to be a sensible goal for many real-time control systems. We adopt a game-theoretic framework to model the strategic interaction between a transmitter, which aims to minimize both Excess AoII and transmission costs, and a malicious agent, which seeks to maximize the same Excess AoII metric while minimizing its own costs. Our analysis reveals the existence of a Nash equilibrium for this game, and we investigate how the system parameters influence the adversary's decision to attack, identifying the conditions under which an attack becomes advantageous or not.

Controlling Age of Incorrect Information Violation Under Data Drift and Strategic Attacks

Badia L.;
2025

Abstract

We study a control system where sensor measurements are transmitted to a remote station. Information may become outdated due to system drift or compromised by malicious false data injection. To quantify the impact of staleness and inaccuracy in the information at the receiver's side, we use Age of Incorrect Information (AoII). In particular, we consider the Excess AoII above a certain threshold as our key objective to minimize, which we argue to be a sensible goal for many real-time control systems. We adopt a game-theoretic framework to model the strategic interaction between a transmitter, which aims to minimize both Excess AoII and transmission costs, and a malicious agent, which seeks to maximize the same Excess AoII metric while minimizing its own costs. Our analysis reveals the existence of a Nash equilibrium for this game, and we investigate how the system parameters influence the adversary's decision to attack, identifying the conditions under which an attack becomes advantageous or not.
2025
11th 2025 International Conference on Control, Decision and Information Technologies, CoDIT 2025
11th International Conference on Control, Decision and Information Technologies, CoDIT 2025
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3589911
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact