On Attack-Resilient Distributed Formation Control in Operator-Vehicle Networks

This paper tackles a distributed formation control problem where a group of vehicles is remotely controlled by a network of operators. Each operator-vehicle pair is attacked by an adversary, who corrupts the commands sent from the operator to the vehicle. From the point of view of operators, each adversary follows an attacking strategy linearly parameterized by some (potentially time-varying) matrix which is unknown a priori. In particular, we consider two scenarios depending upon whether adversaries can adapt their attacking tactics online. To assure mission completion in such a hostile environment, we propose two novel attack-resilient distributed control algorithms that allow operators to adjust their policies on the fly by exploiting the latest collected information about adversaries. Both algorithms enable vehicles to asymptotically achieve the desired formation from any initial configuration and initial estimate of the adversaries' strategies. It is further shown that the sequence of the distances t...

[1]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[2]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[3]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[4]  João Pedro Hespanha,et al.  Stabilization of nonlinear systems with limited information feedback , 2005, IEEE Transactions on Automatic Control.

[5]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[6]  Jie Lin,et al.  Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..

[7]  Wei Zhang,et al.  Stability of networked control systems: explicit analysis of delay , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[8]  Sonia Martínez,et al.  Discrete-time dynamic average consensus , 2010, Autom..

[9]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[10]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[13]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[14]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[15]  William B. Dunbar,et al.  Distributed receding horizon control for multi-vehicle formation stabilization , 2006, Autom..

[16]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[17]  Ruggero Carli,et al.  A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[18]  John S. Baras,et al.  A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems , 2010 .

[19]  P. Olver Nonlinear Systems , 2013 .

[20]  Daniel Liberzon,et al.  Quantized feedback stabilization of linear systems , 2000, IEEE Trans. Autom. Control..

[21]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[22]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[23]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[24]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[25]  Tansu Alpcan,et al.  Network Security , 2010 .

[26]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[27]  Brian D. O. Anderson,et al.  Reaching a Consensus in a Dynamically Changing Environment: Convergence Rates, Measurement Delays, and Asynchronous Events , 2008, SIAM J. Control. Optim..

[28]  Dragan Nesic,et al.  Input-output stability properties of networked control systems , 2004, IEEE Transactions on Automatic Control.

[29]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[30]  Panos J. Antsaklis,et al.  Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.

[31]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[32]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[33]  Jorge Cortés,et al.  Global and robust formation-shape stabilization of relative sensing networks , 2009, Autom..

[34]  Karl Johan Åström,et al.  Adaptive Control , 1989, Embedded Digital Control with Microcontrollers.

[35]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[36]  Sonia Martínez,et al.  Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.