Secure trajectory planning against undetectable spoofing attacks

This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker. In particular, we consider a robot moving in a two-dimensional space and equipped with two sensors, namely, a Global Navigation Satellite System (GNSS) sensor and a Radio Signal Strength Indicator (RSSI) sensor. The attacker can arbitrarily spoof the readings of the GNSS sensor and the robot control input so as to maximally deviate his trajectory from the nominal precomputed path. We derive explicit and constructive conditions for the existence of undetectable attacks, through which the attacker deviates the robot trajectory in a stealthy way. Conversely, we characterize the existence of secure trajectories, which guarantee that the robot either moves along the nominal trajectory or that the attack remains detectable. We show that secure trajectories can only exist between a subset of states, and provide a numerical mechanism to compute them. We illustrate our findings through several numerical studies, and discuss that our methods are applicable to different models of robot dynamics, including unicycles. More generally, our results show how control design affects security in systems with nonlinear dynamics.

[1]  G. Fairweather,et al.  Numerical Methods for Two – Point Boundary Value Problems , 2008 .

[2]  João P. Hespanha,et al.  Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks , 2019, 2019 American Control Conference (ACC).

[3]  Paulo Tabuada,et al.  Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[4]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  Peter F. Swaszek,et al.  GNSS Spoof Detection Using Shipboard IMU Measurements , 2014 .

[6]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[7]  Claire J. Tomlin,et al.  Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.

[8]  H. Keller Numerical Methods for Two-Point Boundary-Value Problems , 1993 .

[9]  Todd E. Humphreys,et al.  Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..

[10]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[11]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[12]  S. Brendle,et al.  Calculus of Variations , 1927, Nature.

[13]  Todd E. Humphreys,et al.  GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[14]  Raffaello D'Andrea,et al.  Path Planning for Unmanned Aerial Vehicles in Uncertain and Adversarial Environments , 2003 .

[15]  Alejandro D. Dominguez-Garcia,et al.  Spoofing GPS Receiver Clock Offset of Phasor Measurement Units , 2013, IEEE Transactions on Power Systems.

[16]  T. Başar,et al.  Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .

[17]  Todd E. Humphreys,et al.  GNSS Spoofing Detection Using Two-Antenna Differential Carrier Phase , 2014 .

[18]  G. Oriolo,et al.  Robotics: Modelling, Planning and Control , 2008 .

[19]  Peter F. Swaszek,et al.  GNSS Spoof Detection Based on Pseudoranges from Multiple Receivers , 2015 .

[20]  Todd E. Humphreys,et al.  Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer , 2009 .

[21]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  W. Chan,et al.  Numerical computation of optimal control problems with unknown final time , 1974 .

[23]  Maria Domenica Di Benedetto,et al.  Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..

[24]  Suresh P. Sethi,et al.  A Survey of the Maximum Principles for Optimal Control Problems with State Constraints , 1995, SIAM Rev..

[25]  Fabio Pasqualetti,et al.  Secure Navigation of Robots in Adversarial Environments , 2020, IEEE Control Systems Letters.

[26]  Steven M. LaValle,et al.  Planning algorithms , 2006 .

[27]  Rogelio Lozano,et al.  Energy based control of the Pendubot , 2000, IEEE Trans. Autom. Control..

[28]  Ali Broumandan,et al.  GNSS spoofing detection in handheld receivers based on signal spatial correlation , 2012, Proceedings of the 2012 IEEE/ION Position, Location and Navigation Symposium.

[29]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[30]  Ming Cong,et al.  Detection of GPS spoofing based on UAV model estimation , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.

[31]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[32]  Hyungbo Shim,et al.  Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors , 2018, IEEE Transactions on Automatic Control.