Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1
Optimization Problems in Infrastructure Security
Evangelos Kranakis
Carleton University School of Computer Science Ottawa, ON, Canada
FPS 2015
Optimization Problems in Infrastructure Security Evangelos Kranakis - - PowerPoint PPT Presentation
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa, ON, Canada FPS 2015 Evangelos Kranakis,
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2
Outline
– SCADA
– Robot Patrolling. – Sensor Coverage and Interference. – Robot Evacuation. – Domain Protection and Blocking.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 3
What is Infrastructure Security?
– So, a night watchman position was created!
– So, a planning department was created!
– So, a Quality Control Department was created!
– So, . . .
– So, . . .
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 4
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 5
Infrastructure Security
assets so as to – withstand, and – rapidly recover from potential threats that may affect critical resources located
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 6
Diversity of Infrastructure Security
to grasp and the required rigorous security analysis almost impossible to pursue.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 7
Infrastructure Sectors
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 8
What is SCADA?
– Large scale computer based industrial control system for monitoring and controlling industrial facility based processes
and ventilation systems, energy production and consumption.
– originally primitive in design and conception – evolving systems; distributed and networked control augmented with sensor systems based on IoT.
components, control system for HCI by supervisory station(s), various types of communication methods.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 9
SCADAa
ing a Networked Nation, 2006
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 10
General fault tree of possible vulnerabilitiesa
ing a Networked Nation, 2006
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 11
Smart Cities
– water systems, – public safety, – transportation, – hospitals, – electricity grids, and – buildings, . . .
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 12
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 13
Optimization Problems
– Optimizing the solution of a problem affects reaction time.
– There are so many!
– Robot Patrolling. – Sensor Coverage and Interference. – Robot Evacuation. – Domain Protection and Blocking.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 14
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 15
Motivation
– Safeguard a given region/domain/territory from enemy invasions.
Interior Exterior
– Patrolling is defined as the perpetual process of walking around an area in order to protect or supervise it.
Interior Exterior FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 16
Problem
through a point of the boundary, unknown to and unseen by the agents.
before the intrusion is complete.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 17
Setting
1, 2, . . . , k.
around the boundary, without exceeding their maximum speed.
for given speeds {v1, v2, . . . , vk} and time τ, does there exist a deployment of agents which protects the boundary from any intruder with intrusion time not exceeding τ?
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 18
Efficiency
the environment?
visit of the node. – Idleness can be average, worst-case, experimentally verified, etc,...
the best effort result you can accomplish!
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 19
Patrolling Strategies
approximated by a set of subgraphs forming a (skeletonization).
is being conducted by the robots.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 20
Goal
robots with distinct maximal speeds (v1, v2, . . . , vk)
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 21
Traversal Algorithms
continuous function ai(t).
for each real value t ≥ 0 and ǫ > 0, s.t., ǫvi < 1/2, the following condition is true dist(ai(t), ai(t + ǫ)) ≤ vi · ǫ (1) where dist(ai(t), ai(t + ǫ)) denotes the distance along the cycle between the positions of agent ai at times t and t + ǫ.
k-tuple A = (a1(t), a2(t), . . . , ak(t)) which satisfies Inequality (1), for all i = 1, 2, . . . , k.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 22
Proportional Partition
for k agents with maximal speeds (v1, v2, . . . , vk)
length of the i-th segment si equals
vi v1+v2+···+vk .
speed, alternately visiting both endpoints of si.
I = 2 v1 + v2 + · · · + vk .
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 23
Cyclic
circle at the same speed, with equal spacing.
for k agents with maximal speeds (v1, v2, . . . , vk) on the circle
circle.
the circle at speed vr.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 24
Conclusion & Further Results
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 25
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 26
Why Monitoring
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 27
Sensor (Barrier) Coverage
(barrier of the) domain in the sense that every point in the (barrier of the) domain is within the range of a sensor. Optimize the movement!
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 28
Sensor Coverage & Interference
r s r r
distance of at least s apart. – Signals interfere during communication if distance is < s.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 29
Random Model for Coverage & Interference
uniform distribution in the unit interval.
X1 X2 . . . Xn
X1 X2 . . . Xn . . .
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 30
Coverage: Motivation (1/3)
1 2n at random in a unit interval.
anchors ai = i
n + 1 2n, for i = 0, 1, . . . , n − 1.
– This is the worst-case total movement! – The cost is roughly √n. – Why?
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 31
Coverage: Motivation (2/3)
– The bigger the radius the less the movement! Why?
n ), w.h.p. no sensor needs to move!
– The probability that no sensor drops inside a subinterval of length x is (1 − x)n.
x 1
– However, (1 − x)n =
n n ≈ e−xn = 1 nc , for x = c ln n
n , where c > 0. FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 32
Coverage: Prediction (3/3)
√n O(1) Sensor Range r Movement
ln n n 1 2n
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 33
Interference: Motivation (1/2)
ensure no two sensors are at distance < s. – To ensure no two sensors are at distance <
1 2n they must all
be placed to anchors ai = i
n + 1 2n, for i = 0, 1, . . . , n − 1.
This is the worst-case total movement! Why?
– The smaller the interference distance s the less the movement! Why?
Arrival Time of i + 1st sensor − Arrival Time of ith sensor are the interarrival times of the Poisson process.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 34
Interference: Prediction (2/2)
√n O(1) Movement
1 n
Interference Distance s
movement.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 35
Critical Regime for Coverage Sensor Range r Total Displacement E(r)
1 2n
Θ(√n)
1+ǫ 2n
O (1)
√n O(1) Sensor Range r Movement
ln n n 1 2n
Sharp Drop
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 36
Critical Regime for Interference
n,
n − 1 n3/2 , E(s) is a constant O(1),
1
n − 1 n3/2 , 1 n + 1 n3/2
n + 1 n3/2 , E(s) is above Θ(√n).
√n O(1) Movement
1 n
Interference Distance s Sharp Drop
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 37
Conclusion and Further Results
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 38
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 39
Searching for an Exit (1/3)
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 40
Searching for an Exit (2/3)
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 41
Searching for an Exit (3/3)
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 42
Evacuation from a Circle
exit k robots
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 43
Lets simplify the geometry!
exit k robots
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 44
Evacuation Problem
unknown exit: a point situated on its boundary.
and starting at the centre of the disk.
about the presence (and its position) or the absence of an exit.
minimum time.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 45
Communication Models
– face-to-face (or local) communication model: robots exchange information only when simultaneously located at the same point, and – wireless communication model: robots can communicate with each other at any time.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 46
Evacuation Time
– Robots can try to find the exit on their own! – As soon as a robot finds the exit it tries to inform the rest!
– Minimum time required so that all robots evacuate.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 47
Face-to-Face Model: Evacuation Algorithm for 2 robots
from an unknown exit located on the perimeter of the disk which takes time 1 + α/2 + 3 sin(α/2) where the angle α satisfies the equation cos(α/2) = −1/3. It follows that the evacuation algorithm takes time ∼ 5.74.
x x y y α K B A C D
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 48
Wireless Communication Model
from an unknown exit located on the perimeter of the disk which takes time at most 1 + 2π
3 +
√ 3 ≈ 4.826.
x x A B c(x)
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 49
What Else is Known about Evacuation
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 50
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 51
Rectangular Domain
including buildings and sensors in specific locations.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 52
Penetration
domain.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 53
Protection & Blocking
be detected.
dimension or two dimensions. – A one-dimensional attack succeeds when an intruder enters from the top (North) side and exits out the bottom (South) side of the domain without being detected. – Preventing attacks in two dimensions requires that we simultaneously prevent the intruder from either entering North and exiting South or entering East (left side) and exiting West (right side) undetected.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 54
Fault Tolerant
is fully protected, i.e., attacks will be detected, in both dimensions
working sensors. Under these conditions we wish to
persists and
sensors required to ensure detection in either one or two dimensions.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 55
Blocking: k-Fault Tolerant
to k faults and
sensors to in order to achieve k fault-tolerance
sensors to in order to achieve k fault-tolerance that minimizes the total or max movement.
protection in one dimension and for restoring protection in two dimensions (optimally for k = 0 and approximately otherwise).
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 56
Main Idea: Steiner Points
N S E W
grid laid out over the rectangle.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 57
Results
two-dimensional k-protection decision problems.
the one-dimensional k-protection placement problem.
two-dimensional protection placement problem.
algorithm for solving the two-dimensional k-protection placement problem.
that the problems can not be solved otherwise.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 58
Extensions
including protecting:
East-West.
FPS 2015
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 59
Conclusions
vital to the proper functioning of infrastrucure in our society.
FPS 2015