Next Article in Journal
A Precise Calibration Method for the Robot-Assisted Percutaneous Puncture System
Previous Article in Journal
Dynamic Dead-Time Compensation Method Based on Switching Characteristics of the MOSFET for PMSM Drive System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory

Beijing Key Lab of Urban Intelligent Control Technology, North China University of Technology, Beijing 100144, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(23), 4856; https://doi.org/10.3390/electronics12234856
Submission received: 13 October 2023 / Revised: 25 November 2023 / Accepted: 27 November 2023 / Published: 30 November 2023

Abstract

:
In recent years, there has been significant development in intelligent technologies for urban traffic control, such as smart city and vehicle-to-everything (V2X) communication. These advancements aim to provide more efficient and convenient services to participants in urban transportation. As the urban traffic control (UTC) system integrates with various networks and physical infrastructure, the potential threats of malicious attacks and breaches pose significant risks to the safety of individuals and their properties. To address this issue, this academic paper focuses on studying the network structure of the UTC system. A signal security game model is constructed based on the concepts of evolutionary game theory (EGT), involving three parties: attackers, upper computers (UC), and traffic signal machines (TSM). The model aims to analyze the evolutionary stability of the strategies chosen by each party, and to explore the relationships between various factors and the strategy choices of the three parties. Furthermore, the stability of equilibrium points in the three-party game system is analyzed using the Liapunov method. The conditions in which UC and TSM, dependent on detection rates and defense costs, choose to abandon defense at pure-strategy equilibrium points were obtained. Finally, MATLAB is utilized for simulation analysis to validate the impact of attack costs, defense costs, and detection rates on the information security of UTC systems.

1. Introduction

In the past, the communication of urban traffic control (UTC) systems used dedicated networks, which resulted in rare occurrences of attacks on traffic signal networks. As a result, research on the security protection of traffic signal networks has not received widespread attention. Li et al. discovered and proved that the currently deployed connected traffic signal systems in the United States have many security vulnerabilities due to system failures. They proposed a game theory framework that promotes network security and efficient traffic management [1,2]. Haddad et al. proposed an elastic boundary control scheme based on the macroscopic fundamental diagram (MFD) to mitigate the impact of network attacks on traffic signal systems. The developed algorithm can adaptively compensate for the effects of attacks without the need for online fault detection. The stability of closed-loop systems regarding tracking and parameter errors is also demonstrated [3]. Khattak et al. analyzed the security vulnerabilities of active traffic management (ATM) in Virginia, providing a method to determine whether the monitoring system is under attack in real time [4]. Other security researchers have also identified various vulnerabilities in traffic signal systems [5].
Research on UTC system security is relatively scarce. Industrial control systems and UTC systems are both cyber-physical systems that share many similarities. Therefore, research on industrial control system security can provide valuable insights. Nateghi et al. studied the problem of online security state estimation and attack reconstruction to design a resilient controller for systems. The effectiveness of this technique was validated through attack simulations on a real power system [6]. Wang et al. introduced a Bayesian honeypot game model as a bait system for detecting and collecting attack information in advanced metering infrastructure (AMI) in industrial power control systems. This model overcomes the weakness of traditional honeypot technology in detecting dynamic attacks [7]. However, the construction of precise system mechanism models and attack models is complex and challenging, limiting their practical application. Xu et al. proposed a resilient, memory event-triggered scheme (RMETS) for systems. This scheme effectively balances the security performance required by the system with limited network resources in the event of an attack [8].
Research on the information security issues of UTC systems is valuable and necessary. In the process of information attack and defense in UTC systems, attackers and defenders engage in a clear game relationship, making game theory an appropriate method for modeling and analyzing these issues. There have been numerous studies on information security using game theory. Lye et al. applied stochastic game theory to establish a two-player game model for attackers and defenders, obtaining the optimal strategies for both parties by calculating the Nash equilibrium solutions of the model [9]. Zhu et al. employed multi-player non-zero-sum and stochastic game methods to analyze the adversarial behavior between intrusion detection systems and malicious intruders, optimizing the configuration and cooperation of defense systems [10]. Hewett et al. used a complete and perfect information dynamic game approach to analyze the information security of a power grid SCADA system [11]. Game theory has also been applied to defend against distributed denial of service (DDoS) attacks [12,13,14]. Information security often involves incomplete information games. Shaolin Tan et al. developed an absolute distance-based consensus protocol for multi-agent systems to help agents reach a consensus point without knowing the relative positions of other agents [15]. Singh et al. designed the learning algorithm for the incomplete information game (LAIIG), which effectively updates participants’ information machines [16]. Varga B et al. designed near-potential differential games (NPDG) and applied them to large-scale vehicle control systems, verifying the effectiveness of the algorithm [17].
Ahmad F et al. categorized the research on game theory related to traffic into four groups: traffic management, behavioral interactions, routing operation, and transport safety. They found that classical game theory has various limitations, while evolutionary game theory (EGT) is more suitable for simulating real-world scenarios. They mention that Nash equilibrium (NE) does not necessarily guarantee optimal returns for each participant. In some games, there may be multiple NE states, and evolutionary game theory focuses on the decision-making process, which can effectively solve the problem of multiple equilibria. Some scholars have already applied EGT to information security research [18]. Shi L et al. constructed a three-party evolutionary game model of array honeypots composed of defenders, attackers, and legitimate users. By analyzing the strategies and benefits of participants in the game and establishing a three-party game payoff matrix, they obtained evolutionarily stable strategies by analyzing the replicator dynamic equations of each party [19]. Yang Y et al. proposed a multistage asymmetric information attack and defense model (MAIAD) for Internet of Things (IoT) systems. Under the premise of information asymmetry, MAIAD can determine the optimal defense strategy for IoT systems [20]. Their research only focuses on the information level or IoT as the object, without considering the actual situation in the traffic control environment.
In UTC systems, there are often two control entities, upper computers (UC) and traffic signal machines (TSM), which can respond to the impacts of attackers through coordinated control or individual defense. We use EGT analysis tools to explore the stable strategies and system equilibrium points in this three-party attack–defense game. Evolutionary game theory assumes that players are rational given their preferences, but these preferences may evolve over time. In this study, EGT can be represented as follows: attackers in the traffic environment make attack decisions based on individual profit maximization (i.e., they respond rationally to the current state of the system), while the system state evolves over time, causing changes in the payoffs for attacking and not attacking, leading UC and TSM to replicate and dynamically adjust their defense strategies. Compared to traditional information security research that only focuses on the game between attackers and defenders, the three-party game introduces more uncertainty factors, making cooperation and coordination between UC and TSM more challenging, especially in situations where false negatives and false positives may occur.
This paper answers the following key questions:
(1) In order to counter attacks, what defense strategies should Upper Computers (UC) and Traffic Signal Machines (TSM) adopt?
(2) What defense strategies should Upper Computers (UC) and Traffic Signal Machines (TSM) adopt to counter attacks? How do detection rates and defense costs affect the decision making of the participants?
(3) Is it possible for both UC and TSM to abandon defense in the end? This would be highly undesirable. What conditions might lead to this, and how can we prevent it from occurring?
The remainder of the paper is organised as follows: Section 2 describes the problem and its corresponding assumptions, and establishes the framework of the basic model. Section 3 analyzes the strategy stability of each participant. Section 4 employs the first Lyapunov method to analyze the stability of pure-strategy equilibria of the replicator dynamic system, obtaining evolutionarily stable strategy combinations under different conditions. Section 5 and Section 6 conduct numerical simulations and discuss the impact of parameters. Section 7 concludes the research and provides insights.

2. Evolutionary Game Model

To investigate the security issues of a traffic signal network, it is necessary to first understand the network structure of the UTC system, as shown in Figure 1. Typically, the TSM is located near a corresponding intersection, and is responsible for receiving data information from the UC and various traffic detection devices, as well as controlling the traffic signal lights. The UC is housed in the local public transportation management department and is primarily responsible for the coordination, management, and control of the TSMs at each intersection.
In the UTC system, there are numerous attackers who use various attack methods to disrupt or even paralyze the traffic signal system in order to achieve their own objectives. In response to the malicious behavior of attackers, security personnel in different locations employ various defensive strategies. At the beginning, there is limited knowledge about each other’s situation, and through continuous experimentation, they learn about each other and improve their strategies. Eventually, they find the choices that are most favorable to themselves, leading to a stable state. Therefore, studying these stable states and the conditions for their occurrence is meaningful for ensuring the secure operation of the UTC system. Sometimes, the defense cost may be too high, such as protecting one road smoothly at the expense of causing congestion on others, which is clearly not wise. Finding the conditions under which UC and TSM abandon defense can help security personnel avoid such situations. Similarly, identifying the conditions under which attackers abandon their attacks can effectively reduce security incidents in the UTC system. Therefore, the use of EGT to analyze and study the security game process in the UTC system will be beneficial.
Hypothesis 1. 
Let   N d u represent the UC, and its defensive strategy includes selecting defense ( d ) with probability x and not defending ( n d ) with probability   1 x , x [ 0 , 1 ] . Let N d s represent the TSM, and its defensive strategy includes selecting defense ( d ) with probability y and not defending ( n d ) with probability 1 y , y [ 0 , 1 ] . Let N a represent the attacker, and its strategy includes selecting attack ( a ) with probability z and not attacking ( n a ) with probability 1 z , z [ 0 , 1 ] . Let α represent the detection rate of the attack detection system (true positive rate, TPR), α [ 0 , 1 ] . β represents the false alarm rate (false positive rate, FPR), β [ 0 , 1 ] . S represents the security value of the traffic network. C a represents the attack cost, C a > 0 . C d u represents the individual defense cost of the UC, and C d u s represents the UC’s defense cost when coordinating with the TSM, 0 < C d u s < C d u . Let C d s represent the individual defense cost of the TSM, and C d s u represent the TSM’s defense cost when coordinating with the UC, 0 < C d s u < C d s .
Hypothesis 2. 
If both parties in the game are purely rational, the security value of the traffic network S should be greater than any cost. Otherwise, there is no reason for the parties to adopt strategies for the sake of security value [21].
S > m a x C a , C d s , C d u , C d s u , C d u s
Next, we discuss the payoffs under various strategies for the attacker when the attacker targets the UC position. When the strategy is n d , n d , a , the attacker’s payoff is S C a ; the payoffs for the two defenders are S . When the strategy is d , d , a the UC and TSM engage in coordinated defense; the UC’s expected payoff is α S 1 α S C d u s = 2 α 1 S C d u s , and the same applies to the TSM. The attacker’s payoff is the loss of the defenders’ payoff minus the attack cost: 1 α S α S C a = 1 2 α S C a . When the strategy is d , n d , a , the UC’s payoff for individual defense is 2 α 1 S C d u , the TSM’s payoff is 2 α 1 S , and the attacker’s payoff is 1 2 α S C a . When there are no detection errors by the attack detection system, the defenders incur cost: β C d x .
By analyzing the payoffs under various strategies for the participants, we can obtain the evolutionary game payoff matrix of the three-party game, as shown in Table 1. This table reflects the payoff situation of the three parties under various strategy combinations when the attacker chooses a certain attack behavior at a particular moment. If the attacker switches to another attack method, the defensive strategies of the UC and TSM will change accordingly, and the values of the corresponding strategy costs and detection rates will also change.

3. Strategic Stability Analysis

The expected payoff and average expected payoff for the UC when adopting the strategy are
    E x = y z 2 α 1 S C d u s + ( 1 y ) z 2 α 1 S C d u     + ( 1 z ) y β C d u s + ( 1 z ) ( 1 y ) β C d u = z 2 α 1 S y z C d u s ( 1 y ) z C d u ( 1 z ) y β C d u s ( 1 z ) ( 1 y ) β C d u
E 1 x = y z 2 α 1 S + ( 1 y ) z S
E ¯ x = x E x + ( 1 x ) E 1 x
The replicator dynamic equation for the UC, based on the Malthusian equation and combined Equations (1)–(3), is as follows [22,23]:
F ( x ) = d x d t = x E x E ¯ x = x ( 1 x ) ( E x E 1 x ) = x ( 1 x ) z ( 1 y ) 2 α S y z C d u s ( 1 y ) z C d u ( 1 z ) y β C d u s ( 1 z ) ( 1 y ) β C d u
The expected payoff and average expected payoff for the TSM when adopting the strategy are
E y = x z 2 α 1 S C d s u + ( 1 x ) z 2 α 1 S C d s   + ( 1 z ) x C d s u + ( 1 z ) ( 1 x ) C d s     = z 2 α 1 S x z C d s u ( 1 x ) z C d s     ( 1 z ) x β C d s u ( 1 z ) ( 1 x ) β C d s
E 1 y = x z 2 α 1 S + ( 1 x ) z S
E ¯ y = y E y + ( 1 y ) E 1 y
The replicator dynamic equation for the TSM is
G ( y ) = d y d t = y E y y E y ( 1 y ) E 1 y = y ( 1 y ) ( E y E 1 y )   = y ( 1 y ) z ( 1 x ) 2 α S x z C d s u ( 1 x ) z C d s ( 1 z ) x β C d s u ( 1 z ) ( 1 x ) β C d s
The expected payoff and average expected payoff for the attacker when adopting the strategy are
E z   = x y 1 2 α S C a + ( 1 x ) y 1 2 α S C a   + ( 1 y ) x 1 2 α S C a + ( 1 y ) ( 1 x ) S C a     = y + x x y 1 2 α S C a + ( 1 y ) ( 1 x ) S C a
E 1 z = 0
E ¯ z = z E z + ( 1 z ) E 1 z
The replicator dynamic equation for the attacker is
H ( z ) = d z d t = z E z E ¯ z = z ( 1 z ) ( E z E 1 z )             = z ( 1 z ) y + x x y 1 2 α S C a + ( 1 y ) ( 1 x ) S C a
Based on the above, the replicator dynamic equation system for the three-party evolutionary game is as follows:
F ( x ) = x ( 1 x ) z ( 1 y ) 2 α S y z C d u s ( 1 y ) z C d u ( 1 z ) y β C d u s ( 1 z ) ( 1 y ) β C d u G ( y ) = y ( 1 y ) z ( 1 x ) 2 α S x z C d s u ( 1 x ) z C d s ( 1 z ) x β C d s u ( 1 z ) ( 1 x ) β C d s H ( z ) = z ( 1 z ) y + x x y 1 2 α S C a + ( 1 y ) ( 1 x ) S C a
According to the principle of evolutionary stability, the probability of strategy choices by participants must satisfy the following conditions to reach evolutionary stability:
F ( x ) = 0 , d F ( x ) / d x < 0 G ( y ) = 0 , d G ( y ) / d y < 0 H ( z ) = 0 , d H ( z ) / d z < 0
First, analyzing the UC by combining Equations (13) and (14):
z * = y β C d u y β C d u s β C d u 2 α S y 2 α S y C d u s C d u + y C d u + y β C d u s + β C d u y β C d u = β C d u + y β ( C d u s C d u ) ( 1 β ) C d u 2 α S + y ( ( 1 β ) ( C d u s C d u ) + 2 α S )
When z = z * , F ( x ) = 0 , the UC’s strategy choice remains stable and does not vary over time. When z > z * , d F ( x ) / d x x = 1 < 0 and d F ( x ) / d x x = 0 > 0 . According to Equation (14), we find that x = 1 is a stable point, representing the UC’s strategy ( d ) as an evolutionarily stable strategy (ESS). When z < z * , d F ( x ) / d x x = 0 < 0 and d F ( x ) / d x x = 1 > 0 . According to Equation (14), we find that x = 0 is an ESS, representing the UC’s strategy choice of not defending.
Analyzing the TSM by combining Equations (13) and (14):
z * * = x β C d s x β C d s u β C d s 2 α S x 2 α S x C d s u C d s + x C d s + x β C d s u + β C d s x β C d s = β C d s + x β ( C d s u C d s ) ( 1 β ) C d s 2 α S + x ( ( 1 β ) ( C d s u C d s ) + 2 α S )
When z = z * * , G ( y ) = 0 , the TSM’s strategy choice remains stable and does not vary over time. When z > z * * , d G ( y ) / d y y = 1 < 0 and d G ( y ) / d y y = 0 > 0 . According to Equation (14), we find that y = 1 is an ESS, representing the TSM’s strategy choice of defending. When z < z * * , d G ( y ) / d y y = 1 > 0 and d G ( y ) / d y y = 0 < 0 . According to Equation (14), we find that y = 0 is an ESS, representing the TSM’s strategy choice of not defending.
Lastly, analyzing the attacker by combining Equations (13) and (14):
x * = y 1 2 α S C a ( 1 y ) 2 α S + S C a 2 α S
When x = x * , H ( z ) = 0 , the attacker’s strategy choice remains stable and does not vary over time. When x > x * , d H ( z ) / d z z = 1 > 0 and d H ( z ) / d z z = 0 < 0 . According to Equation (14), we find that z = 0 is an ESS, representing the attacker’s strategy choice of not attacking. When x < x * , d H ( z ) / d z z = 1 < 0 and d H ( z ) / d z z = 0 > 0 . According to Equation (14), we find that z = 1 is an ESS, representing the attacker’s strategy choice of attacking.

4. Equilibrium Point Stability Analysis

By solving F ( x ) = 0 , G ( y ) = 0 , H ( z ) = 0 , we obtain 8 pure-strategy equilibrium points, as shown in Table 2. In this paper, the stability of the evolutionary game system is determined using the Liapunov method. Based on the replicator dynamic equation system (13), the Jacobian matrix is as follows:
J = J 1 J 2 J 3 J 4 J 5 J 6 J 7 J 8 J 9 = F ( x ) / x F ( x ) / y F ( x ) / z G ( y ) / x G ( y ) / y G ( y ) / z H ( z ) / x H ( z ) / y H ( z ) / z
J 1 = 1 2 x z 1 y 2 α S y z C d u s 1 y z C d u 1 z y β C d u s 1 z 1 y β C d u
J 2 = x ( 1 x ) z 2 α S z C d u s + z C d u ( 1 z ) β C d u s + ( 1 z ) β C d u
J 3 = x ( 1 x ) ( 1 y ) 2 α S y C d u s ( 1 y ) C d u + y β C d u s + ( 1 y ) β C d u
J 4 = y ( 1 y ) z 2 α S z C d s u + z C d s ( 1 z ) β C d s u + ( 1 z ) β C d s
J 5 = 1 2 y z 1 x 2 α S x z C d s u 1 x z C d s 1 z x β C d s u 1 z 1 x β C d s
J 6 = y ( 1 y ) ( 1 x ) 2 α S x C d s u ( 1 x ) C d s + x β C d s u + ( 1 x ) β C d s
J 7 = z ( 1 z ) ( 1 y ) 2 α S
J 8 = z ( 1 z ) ( 1 x ) 2 α S
J 9 = ( 1 2 z ) y + x x y 1 2 α S C a + ( 1 y ) ( 1 x ) S C a
Using the Liapunov first method [24], if all eigenvalues of the Jacobian matrix have negative real parts, the equilibrium points are asymptotically stable. If at least one eigenvalue of the Jacobian matrix has a positive real part, the equilibrium points are unstable. If the Jacobian matrix has eigenvalues with real parts equal to zero, while the remaining eigenvalues have negative real parts, the equilibrium points are in a critical state and their stability cannot be determined solely by the sign of the eigenvalues. The stability of each equilibrium point is analyzed as follows:
For the equilibrium point ( 0,0 , 1 ) , when 2 α S = C d u or 2 α S = C d s , the equilibrium point is in a critical state and its stability cannot be determined by the sign of the eigenvalues. When 2 α S < C d u and 2 α S < C d s , the equilibrium point is asymptotically stable. This indicates that when the detection rate is too low or the defense cost is close to the security value, both the UC and TSM evolve to a stable state of not defending due to their own interests. As a result, the system is vulnerable to attacks, and poses a serious threat to the safety of urban public transportation. To avoid the situation where the game stabilizes at the strategy combination ( n d , n d , a ) , traffic signal system security workers should strive to increase the detection rate and reduce the defense cost.
For the equilibrium point ( 1 , 0 , 1 ) , by the same analysis, when 2 α S = C d u or C a = ( 1 2 α ) S , the equilibrium point is in a critical state and its stability cannot be determined by the sign of the eigenvalues. When 2 α S > C d u and C a < ( 1 2 α ) S , the equilibrium point is asymptotically stable. This indicates that when the detection rate is high or the defense cost of the UC is low, for their own interests, the evolutionary stable strategy combination for the three parties will stabilize at the strategy combination ( d , n d , a ) , indicating that the UC will actively defend against the attacker’s attacks.
For the equilibrium point ( 0 , 1 , 1 ) , by the same analysis, when 2 α S = C d s or C a = ( 1 2 α ) S , the equilibrium point is in a critical state and its stability cannot be determined by the sign of the eigenvalues. When 2 α S > C d s and C a < ( 1 2 α ) S , the equilibrium point is asymptotically stable. This indicates that when the detection rate is high or the defense cost of the TSM is low, for their own interests, the evolutionary stable strategy combination for the three parties will stabilize at the strategy combination ( n d , d , a ) , indicating that the TSM will actively defend against the attacker’s attacks.

5. Simulation

To verify the effectiveness of the stability analysis, numerical values are assigned to the model and numerical simulations are conducted using MATLAB. The parameters used are as follows:
( α = 0.4 , β = 0.1 , S = 100 , C d u s = 10 , C d u = 30 , C d s u = 10 , C d s = 30 , C a = 10 )
These parameters satisfy the conditions for the equilibrium points ( 1 , 0 , 1 ) and ( 0 , 1 , 1 ) to be asymptotically stable. To analyze the impact of different initial strategy probabilities for each participant on the overall evolutionary path, initial strategy probability combinations ( x , y , z ) are randomly selected within 0 , 1 . The evolutionary results are shown in Figure 2. Although different initial strategy probabilities lead to different evolutionary rates, they all converge to ( 1 , 0 , 1 ) and ( 0 , 1 , 1 ) , confirming the correctness of the theoretical derivation.
Next, we conducted a simulation of the attack−defense evolution process of the UTC system based on the data from Case Study I [21]. The system security value (S) was set to 200, and the security requirements were represented by C a = C d s = C d u = 20 ,   C d s u = C d u s = 10 . The TPR and FPR were set to α = 91.78%, β = 0.25%, respectively. The initial state of the game was set to ( 0.2,0.2,0.2 ) . After 50 iterations, we obtained the replicating dynamics of the evolving game, as shown in Figure 3. The trajectory exhibits a spiral convergence, indicating a mixed−strategy equilibrium. At this point   ( 0.286,0.286,0.017 ) , the attacker tends to abandon the attack, while both UC and TSM adopt active defense.
To compare the security systems of the UC and TSM, we set C d s = 30 ,   C d s u = 15 , while keeping the other parameters unchanged. After 50 iterations, we obtained the replicating dynamics of the evolving game, as shown in Figure 4. The trajectory forms a closed loop around the central point, and there is no asymptotic ESS of the three-party game. In this scenario, TSM abandons defense due to its high cost, and the ratio between the attacker and UC remains in constant flux.
In order to analyze the influence of each parameter on the three-party strategy selection, we set the parameters to satisfy the condition of a pure strategy equilibrium point ( 1 , 0 , 1 ) , with α = 40% and keeping the other parameters unchanged. Then, we varied one of the parameters and observed the changes in the trajectory.
First, we analyze the impact of the detection rate on the evolutionary process and results. Setting the detection rate α = 0.2,0.3,0.4 , the results after 50 iterations are shown in Figure 5. Decreasing the detection rate accelerates the evolutionary rate of the attacker’s strategy choice of attack. With an increased detection rate, the UC’s probability of adopting the defense strategy increases, while the attacker’s probability of choosing the attack strategy decreases. Therefore, information security personnel should strengthen the research and development of corresponding attack detection technologies to increase the detection rate and reduce the probability of system attacks.
Next, we analyze the impact of defense cost on the evolutionary process and results. Setting the defense cost C d u = 10,20,30 , the results after 50 iterations are shown in Figure 6. The results show that during the evolutionary process, as the defense cost increases, the UC’s probability of adopting the defense strategy decreases, while the attacker’s probability of choosing the attack strategy increases. Therefore, reducing the cost of defense strategies is an effective means of ensuring the safe and stable operation of the traffic system.
Lastly, we analyze the impact of the attack cost. Setting the attack cost C a = 10,20,30 , the results after 50 iterations are shown in Figure 7. It can be observed that as the attack cost increases, the UC’s probability of adopting the defense strategy increases, while the attacker’s probability of choosing the attack strategy decreases. From a system design perspective, designers should focus on designing more secure systems, increasing the cost of attacks, and reducing the probability of being attacked.

6. Discussion

The simulated results above reveal the impact of the main parameters on the three-party behavioral strategy evolution and provide different final states of the three-party game evolution under various conditions, which can increase the probability of attackers abandoning their attacks. We found that higher detection rates and comparable attack and defense costs can effectively encourage attackers to abandon their attacks. Lower TPR and higher defense costs can significantly increase the probability of the UTC system being attacked, leading to a tendency for defenders to abandon defense, which is highly dangerous.
The factors influencing the evolutionary dynamics of the UTC system information security can be divided into three priority levels based on their impact. The first priority is TPR, the second priority is defense cost, and the third priority is attack cost. Based on the simulation results, we combined the probabilities of attack and defense to determine the degree of influence of these factors. As shown in Figure 5, Figure 6 and Figure 7, among all the influencing factors, TPR has the most significant impact, followed by defense cost, while the impact of attack cost is the smallest.
In comparison with the Bayesian game method in [21], the evolutionary game approach allows for a more intuitive understanding of the degree of influence of each parameter on the three-party strategy selection. It helps identify various final evolutionary game states and their corresponding conditions, as well as the evolutionary process from the initial state to the final state. The accuracy of the analysis results of the Bayesian game method is highly dependent on the selection of prior probabilities. Therefore, our approach is more advantageous in assisting researchers in analyzing information security issues in UTC systems.

7. Conclusions

The issue of information security in UTC systems has received relatively little attention. However, as they become increasingly integrated with various information networks, information security concerns are becoming more prominent. In this paper, a three-party evolutionary game model was constructed to analyze the network structure of UTC systems and the interactions between attackers, the UC, and the TSM. The stability of strategy choices for each party, the stability of equilibrium strategy combinations in the game system, and the relationships between various factors were analyzed. The validity of the conclusions was verified through simulation analysis. The main conclusions and insights are as follows.
In situations where the attack detection rate is high and the attack defense costs are unequal, there is no asymptotic ESS, and the behavior of the participants exhibits periodic characteristics. However, in situations where the attack detection rate is high and the attack defense costs are equal, the system trajectory converges in a spiral and then stabilizes. This finding suggests that UTC systems’ security personnel can gradually reduce the probability of system attacks by controlling the TPR and costs.
The attack detection rate and defense cost are negatively correlated with the probability of system attacks and positively correlated with the defense rate. These parameters can be further optimized and prioritized based on their impact on the evolutionary dynamics of the system’s attack and defense. Therefore, security personnel should focus their efforts on developing strategies that address specific priorities.
Finally, as the attack detection rate decreases and defense costs increase to a certain extent, the system will tend to abandon defense and the probability of being attacked will significantly increase. Therefore, UTC systems’ security personnel should continuously monitor new attack methods in the field of information security, and regularly update the system’s detection and defense methods.

Author Contributions

Conceptualization, L.W. and K.P.; methodology, K.P.; software, K.P.; validation, K.P.; formal analysis, K.P.; resources, L.W.; data curation, L.Z.; writing—original draft preparation, K.P.; writing—review and editing, K.P.; visualization, L.Z.; supervision, L.Z.; project administration, L.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Beijing Municipal Science and Technology Plan grant number Z221100008122006.

Data Availability Statement

The related authors are willing to provide the data used to support the study’s findings upon request, but only for research purposes. Informed consent was obtained from all subjects involved in the study.

Conflicts of Interest

The authors declare that they have no conflict of interest.

Abbreviations

UTCurban traffic control
UCupper computers
TSMtraffic signal machines
EGTevolutionary game theory
ESSevolutionary stable strategy
TPRtrue positive rate
FPRfalse positive rate
Variables
x the probability of UC adopting a defensive strategy
y the probability of TSM adopting a defensive strategy
z the probability of attackers choosing an offensive strategy
Parameters
α detection rate of attacks
β false positive rate of attacks
C d u the individual defense cost of the UC
C d u s the UC’s defense cost when coordinating with the TSM
C d s the individual defense cost of the TSM
C d s u the TSM’s defense cost when coordinating with the UC
S the security value of the traffic network

References

  1. Li, Z.Y.; Jin, D.; Hannon, C.; Shahidehpour, M.; Wang, J.H. Assessing and mitigating cybersecurity risks of traffic light systems in smart cities. IET Cyber-Phys. Syst. Theory Appl. 2017, 1, 60–69. [Google Scholar] [CrossRef]
  2. Li, Z.Y.; Shahidehpour, M. Deployment of cybersecurity for managing traffic efficiency and safety in smart cities. Electr. J. 2017, 30, 52–61. [Google Scholar] [CrossRef]
  3. Haddad, J.; Mirkin, B. Resilient perimeter control of macroscopic fundamental diagram networks under cyberattacks. Transp. Res. Part B Methodol. 2020, 132, 44–59. [Google Scholar] [CrossRef]
  4. Khattak, Z.H.; Park, H.; Hong, S. Investigating cybersecurity issues in active traffic management systems. Transp. Res. Rec. J. Transp. Res. Board 2018, 2672, 79–90. [Google Scholar] [CrossRef]
  5. Ghena, B.; Beyer, W.; Hillaker, A. Green lights forever: Analyzing the security of traffic infrastructure. In Proceedings of the 8th USENIX conference on Offensive Technologies, San Diego, CA, USA, 19 August 2014. [Google Scholar]
  6. Nateghi, S.; Shtessel, Y.; Edwards, C. Resilient control of cyber-physical systems using adaptive super-twisting observer. Asian J. Control 2023, 25, 1775–1790. [Google Scholar] [CrossRef]
  7. Wang, K.; Du, M.; Maharjan, S. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 2017, 8, 2474–2482. [Google Scholar] [CrossRef]
  8. Xu, Y.; Chai, S.; Shi, P. Resilient and event-triggered control of stochastic jump systems under deception and denial of service attacks. Int. J. Robust Nonlinear Control 2023, 33, 1821–1837. [Google Scholar] [CrossRef]
  9. Lye, K.W.; Wing, J.M. Game strategies in network security. Int. J. Inf. Secur. 2005, 4, 71–86. [Google Scholar] [CrossRef]
  10. Zhu, Q.; Tembine, H.; Tamer, B. Network security configurations: A nonzero-sum stochastic game approach. In Proceedings of the American Control Conference, Baltimore, MD, USA, 30 June–2 July 2010. [Google Scholar]
  11. Hewett, R.; Rudrapattana, S.; Kijsanayothin, P. Cyber-security analysis of smart grid SCADA systems with game models. In Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, 8–10 April 2014; pp. 109–112. [Google Scholar]
  12. Mairaj, A.; Javaid, A.Y. Game theoretic solution for an Unmanned Aerial Vehicle network host under DDoS attack. Comput. Netw. 2022, 211, 108962. [Google Scholar] [CrossRef]
  13. Vetha, S.; Vimala, D.K. A trust-based hypervisor framework for preventing DDoS attacks in cloud. Concurr. Comput. Pract. Exp. 2019, 33, e5279. [Google Scholar] [CrossRef]
  14. Gao, C.; Wang, Y. Reinforcement learning based self-adaptive moving target defense against DDoS attacks. J. Phys. Conf. Ser. 2021, 1812, 012039. [Google Scholar] [CrossRef]
  15. Tan, S.; Wang, Y. A payoff-based learning approach for Nash equilibrium seeking in continuous potential games. Neurocomputing 2021, 468, 431–440. [Google Scholar] [CrossRef]
  16. Singh, M.T.; Borkotokey, S.; Lahcen, R.A.; Mohapatra, R.N. A generic scheme for cyber security in resource constraint network using incomplete information game. Evol. Intell. 2022, 16, 819–832. [Google Scholar] [CrossRef]
  17. Varga, B.; Inga, J.; Hohmann, S. Limited Information Shared Control: A Potential Game Approach. IEEE Trans. Hum. Mach. Syst. 2023, 53, 282–292. [Google Scholar] [CrossRef]
  18. Ahmad, F.; Shah, Z.; Al-Fagih, L. Applications of evolutionary game theory in urban road transport network: A state of the art review. Sustain. Cities Soc. 2023, 98, 104791. [Google Scholar] [CrossRef]
  19. Shi, L.; Wang, X.; Hou, H. Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory. Mathematics 2021, 9, 805. [Google Scholar] [CrossRef]
  20. Yang, Y.; Che, B.; Zeng, Y.; Cheng, Y.; Li, C. MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory. Symmetry 2019, 11, 215. [Google Scholar] [CrossRef]
  21. Zhang, J.; Liu, X.; Zhu, P. Cooperation Stimulation and Security in Wireless Ad Hoc Networks—A Power-Efficient Bayesian Game Approach. In Proceedings of the 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), London, UK, 19–21 September 2016. [Google Scholar] [CrossRef]
  22. Taylor, P.D.; Jonker, L.B. Evolutionary stable strategies and game dynamics. Math. Biosci. 1978, 40, 145–156. [Google Scholar] [CrossRef]
  23. Schuster, P.; Sigmund, K. Replicator dynamics. J. Theor. Biol. 1983, 100, 533–538. [Google Scholar] [CrossRef]
  24. Khalil, H.K. Nonlinear Systems; Prentice-Hall: Upper Saddle River, NJ, USA, 1996. [Google Scholar]
Figure 1. Network structure of the UTC system.
Figure 1. Network structure of the UTC system.
Electronics 12 04856 g001
Figure 2. Impact of different initial strategy probabilities.
Figure 2. Impact of different initial strategy probabilities.
Electronics 12 04856 g002
Figure 3. The evolutionary trajectory with equal defense and attack costs.
Figure 3. The evolutionary trajectory with equal defense and attack costs.
Electronics 12 04856 g003
Figure 4. The evolutionary trajectory with unequal defense costs.
Figure 4. The evolutionary trajectory with unequal defense costs.
Electronics 12 04856 g004
Figure 5. Impact of the detection rate.
Figure 5. Impact of the detection rate.
Electronics 12 04856 g005
Figure 6. Impact of defense cost.
Figure 6. Impact of defense cost.
Electronics 12 04856 g006
Figure 7. Impact of attack cost.
Figure 7. Impact of attack cost.
Electronics 12 04856 g007
Table 1. Payoff matrix of the three-party game.
Table 1. Payoff matrix of the three-party game.
N d u : d ( x ) N d u : n d ( 1 x )
N d s : d ( y ) N d s : d ( 1 y ) N d s : d ( y ) N d s : d ( 1 y )
N a : a ( z ) 2 α 1 S C d u s , 2 α 1 S C d s u , 1 2 α S C a 2 α 1 S C d u , 2 α 1 S , 1 2 α S C a 2 α 1 S , 2 α 1 S C d s , 1 2 α S C a S , S , S C a
N a : n a ( 1 z ) β C d u s , β C d s u , 0 β C d u , 0 , 0 0 , β C d s , 0 0 , 0 , 0
Table 2. Stability analysis of equilibrium points.
Table 2. Stability analysis of equilibrium points.
λ 1 λ 2 λ 3 Symbol 1Stability 2
( 0,0 , 0 ) S C a β C d s β C d u ( + , , ) no
( 1 , 0 , 0 ) β C d u β C d s u ( 1 2 α ) S C a ( + , , ? ) no
( 0 , 1 , 0 ) β C d s β C d u s ( 1 2 α ) S C a ( + , , ? ) no
( 0,0 , 1 ) 2 α S C d s 2 α S C d u C a S ( ? , ? , ) ?
( 1,1 , 0 ) β C d s u β C d u s ( 1 2 α ) S C a ( + , + , ? ) no
( 1 , 0 , 1 ) C d s u 2 α S + C d u C a ( 1 2 α ) S ( , ? , ? ) ?
( 0 , 1 , 1 ) C d u s 2 α S + C d s C a ( 1 2 α ) S ( , ? , ? ) ?
( 1,1 , 1 ) C d s u C d u s C a ( 1 2 α ) S ( + , + , ? ) no
1 The symbol represent the signs of the real parts of the eigenvalues ( λ 1 , λ 2 , λ 3 ) , where “+” indicates a positive real part, “−” indicates a negative real part, and “?” indicates an unknown sign, requiring further discussion. 2 Stability indicates whether the equilibrium point is stable, where “?” indicates unknown stability, necessitating further discussion.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pan, K.; Wang, L.; Zhang, L. A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory. Electronics 2023, 12, 4856. https://doi.org/10.3390/electronics12234856

AMA Style

Pan K, Wang L, Zhang L. A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory. Electronics. 2023; 12(23):4856. https://doi.org/10.3390/electronics12234856

Chicago/Turabian Style

Pan, Ke, Li Wang, and Lingyu Zhang. 2023. "A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory" Electronics 12, no. 23: 4856. https://doi.org/10.3390/electronics12234856

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop