Concepedia

Publication | Closed Access

Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game

154

Citations

11

References

2017

Year

TLDR

UAVs are increasingly used for parcel delivery worldwide, yet real‑world deployments face significant cyber‑physical security challenges. This work introduces a new mathematical framework to analyze and strengthen the security of drone delivery systems. The authors formulate a zero‑sum network interdiction game between a vendor and an attacker, where the vendor selects a delivery path to minimize time while the attacker chooses an interdiction point to maximize it, and they extend the model with prospect‑theory concepts to capture each player’s subjective perception of success probabilities and time valuations. The Nash equilibrium of the game is derived, and simulations show that incorporating prospect‑theory behavior causes both parties to adopt risk‑seeking paths that increase delivery times beyond the vendor’s target.

Abstract

The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly becoming a global norm, as corroborated by Amazon's "Prime Air" and Google's "Project Wing" projects. However, the real-world deployment of such drone delivery systems faces many cyber-physical security challenges. In this paper, a novel mathematical framework for analyzing and enhancing the security of drone delivery systems is introduced. In this regard, a zero-sum network interdiction game is formulated between a vendor, operating a drone delivery system, and a malicious attacker. In this game, the vendor seeks to find the optimal path that its UAV should follow, to deliver a purchase from the vendor's warehouse to a customer location, to minimize the delivery time. Meanwhile, an attacker seeks to choose an optimal location to interdict the potential paths of the UAVs, so as to inflict cyber or physical damage to it, thus, maximizing its delivery time. First, the Nash equilibrium point of this game is characterized. Then, to capture the subjective behavior of both the vendor and attacker, new notions from prospect theory are incorporated into the game. These notions allow capturing the vendor's and attacker's (i) subjective perception of attack success probabilities, and (ii) their disparate subjective valuations of the achieved delivery times relative to a certain target delivery time. Simulation results have shown that the subjective decision making of the vendor and attacker leads to adopting risky path selection strategies which inflict delays to the delivery, thus, yielding unexpected delivery times which surpass the target delivery time set by the vendor.

References

YearCitations

Page 1