Secure Control Loop Execution of Cyber-Physical Devices Using Predictive State Space Checks

There has been increased interest in detection of adversarial security attacks on control functions of autonomous systems. In this research, we propose the use of low-cost state space checks for detection of security attacks on sensors, actuators and control software of autonomous systems. These attacks are assumed to be initiated by intrusions, malware, or embedded hardware Trojans. Checks consist of predicting sensor (actuator) values from prior values of actuators (sensors) and external control inputs. The associated nonlinear predictors are learned in real time using Gaussian Process regressors (GPs). Recovery from sensor and actuator attacks is performed by sensor-actuator data restoration. Recovery from control software attacks is performed by reverting to a lightweight linearized controller that prevents short-term catastrophic system malfunction. Experimental results on a brake-by-wire, steer-by-wire system, and a traveling robot (hardware) prove the viability of the proposed approach.

[1]  Hassan N. Noura,et al.  Cyber-physical systems security: Limitations, issues and future trends , 2020, Microprocessors and Microsystems.

[2]  Robert B. Gramacy,et al.  Surrogates: Gaussian Process Modeling, Design, and Optimization for the Applied Sciences , 2020 .

[3]  Srinivas Devadas,et al.  MI6: Secure Enclaves in a Speculative Out-of-Order Processor , 2018, MICRO.

[4]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[5]  Yi Qian,et al.  Defense Mechanisms against Data Injection Attacks in Smart Grid Networks , 2017, IEEE Communications Magazine.

[6]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[7]  Sandeep K. Gupta,et al.  A Resizing Method to Minimize Effects of Hardware Trojans , 2014, 2014 IEEE 23rd Asian Test Symposium.

[8]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[9]  Zhihong Man,et al.  Sliding Mode Control for Steer-by-Wire Systems With AC Motors in Road Vehicles , 2013, IEEE Transactions on Industrial Electronics.

[10]  F. Bullo,et al.  Attack Detection and Identification in Cyber-Physical Systems , 2013, IEEE Transactions on Automatic Control.

[11]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[12]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[13]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[14]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[15]  S. Shankar Sastry,et al.  Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..

[16]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[18]  R. Bergman Surrogates , 2008, Obesity.

[19]  Bing Zheng,et al.  An Antilock-Braking Algorithm for an Eddy-Current-Based Brake-By-Wire System , 2007, IEEE Transactions on Vehicular Technology.

[20]  Uwe Kiencke,et al.  Automotive Control Systems: For Engine, Driveline, and Vehicle , 2000 .

[21]  R. Husson,et al.  The dead reckoning localization system of the wheeled mobile robot ROMANE , 1996, 1996 IEEE/SICE/RSJ International Conference on Multisensor Fusion and Integration for Intelligent Systems (Cat. No.96TH8242).

[22]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[23]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[24]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.