Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems

In this paper, a resilient distributed control scheme against replay attacks for multi-agent networked systems subject to input and state constraints is proposed. The methodological starting point relies on a smart use of predictive arguments with a twofold aim: 1) Promptly detect malicious agent behaviors affecting normal system operations; 2) Apply specific control actions, based on predictive ideas, for mitigating as much as possible undesirable domino effects resulting from adversary operations. Specifically, the multi-agent system is topologically described by a leader-follower digraph characterized by a unique leader and set-theoretic receding horizon control ideas are exploited to develop a distributed algorithm capable to instantaneously recognize the attacked agent. Finally, numerical simulations are carried out to show benefits and effectiveness of the proposed approach.

[1]  Quanyan Zhu,et al.  Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.

[2]  Sherali Zeadally,et al.  Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies , 2015, IEEE Wireless Communications.

[3]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[4]  Walter Lucia,et al.  Resilient Control for Cyber-Physical Systems Subject to Replay Attacks , 2019, IEEE Control Systems Letters.

[5]  Qing-Long Han,et al.  A Set-Membership Approach to Event-Triggered Filtering for General Nonlinear Systems Over Sensor Networks , 2020, IEEE Transactions on Automatic Control.

[6]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[7]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[8]  Andong Liu,et al.  Distributed model predictive control for wide area measurement power systems under malicious attacks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[9]  Francesco Tedesco,et al.  Model predictive control for constrained networked systems subject to data losses , 2015, Autom..

[10]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[11]  Ruggero Carli,et al.  A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Alessandro Casavola,et al.  Distributed Receding Horizon Control of Constrained Networked Leader–Follower Formations Subject to Packet Dropouts , 2018, IEEE Transactions on Control Systems Technology.

[13]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[14]  Sonia Martínez,et al.  On distributed constrained formation control in operator-vehicle adversarial networks , 2013, Autom..

[15]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[16]  Panagiotis D. Christofides,et al.  Distributed model predictive control: A tutorial review and future research directions , 2013, Comput. Chem. Eng..

[17]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Nathan van de Wouw,et al.  Networked Control Systems With Communication Constraints: Tradeoffs Between Transmission Intervals, Delays and Performance , 2010, IEEE Transactions on Automatic Control.

[19]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[20]  Hamidreza Modares,et al.  Resilient Autonomous Control of Distributed Multiagent Systems in Contested Environments , 2017, IEEE Transactions on Cybernetics.

[21]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[22]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[23]  Franco Blanchini,et al.  Set-theoretic methods in control , 2007 .

[24]  Bruno Sinopoli,et al.  A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks , 2016, 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS).

[25]  Vijay Kumar,et al.  Distributed Coverage and Exploration in Unknown Non-convex Environments , 2010, DARS.

[26]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[27]  Wei Chen,et al.  Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[28]  Walter Lucia,et al.  A distributed model predictive control scheme for leader–follower multi-agent systems , 2018, Int. J. Control.