Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security

Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security

[1]  Jacob van der Woude,et al.  A graph-theoretic characterization for the rank of the transfer matrix of a structured system , 1991, Math. Control. Signals Syst..

[2]  J. Zaborszky,et al.  A Clustered Dynamic Model for a class of LInear Autonomous Systems Unsing Simple Enumerative Sorting , 1982 .

[3]  F. Allgöwer,et al.  An Observer That Converges in Finite Time Due to Measurement-Based State Updates , 2008 .

[4]  Emrah Biyik,et al.  Area Aggregation and Time Scale Modeling for Sparse Nonlinear Networks , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[5]  Gordon F. Royle,et al.  Algebraic Graph Theory , 2001, Graduate texts in mathematics.

[6]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.

[7]  Ali H. Sayed,et al.  Adaptive Processing over Distributed Networks , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  Robert D. Nowak,et al.  Quantized incremental algorithms for distributed optimization , 2005, IEEE Journal on Selected Areas in Communications.

[9]  David S. Johnson,et al.  Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .

[10]  G. Basile,et al.  Controlled and conditioned invariants in linear system theory , 1992 .

[11]  Ali H. Sayed,et al.  Diffusion Strategies for Distributed Kalman Filtering and Smoothing , 2010, IEEE Transactions on Automatic Control.

[12]  Frank L. Lewis,et al.  Geometric design techniques for observers in singular systems , 1990, Autom..

[13]  Antonio Bicchi,et al.  On the security of linear consensus networks , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[14]  Mehrdad Saif,et al.  Decentralized state estimation in large-scale interconnected dynamical systems , 1992, Autom..

[15]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[16]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[17]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[18]  Francesco Bullo,et al.  Distributed multi-camera synchronization for smart-intruder detection , 2012, 2012 American Control Conference (ACC).

[19]  Gene H. Golub,et al.  Matrix computations , 1983 .

[20]  Alejandro Ribeiro,et al.  Consensus in Ad Hoc WSNs With Noisy Links—Part I: Distributed Estimation of Deterministic Signals , 2008, IEEE Transactions on Signal Processing.

[21]  Florian Dörfler,et al.  Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[23]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[24]  Jie Lin,et al.  Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..

[25]  Ulrike von Luxburg,et al.  A tutorial on spectral clustering , 2007, Stat. Comput..

[26]  Marios M. Polycarpou,et al.  A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.

[27]  Donald A. Pierre,et al.  An application of Prony methods in PSS design for multimachine systems , 1991 .

[28]  Marc C. Steinbach,et al.  Optimization models for operative planning in drinking water networks , 2009 .

[29]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[30]  Ruggero Carli,et al.  Distributed Kalman filtering based on consensus strategies , 2008, IEEE Journal on Selected Areas in Communications.

[31]  C. SIAMJ. THE GENERIC NUMBER OF INVARIANT ZEROS OF A STRUCTURED LINEAR SYSTEM , 1999 .

[32]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[33]  George E Apostolakis,et al.  A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism , 2005, Risk analysis : an official publication of the Society for Risk Analysis.

[34]  Kevin E Lansey,et al.  Comprehensive Handbook on Water Quality Analysis for Distribution Systems , 2005 .

[35]  Stephen P. Boyd,et al.  Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[36]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[37]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[38]  Guy Richards Hackers vs slackers - [control security] , 2008 .

[39]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[40]  Alberto L. Sangiovanni-Vincentelli,et al.  The Waveform Relaxation Method for Time-Domain Analysis of Large Scale Integrated Circuits , 1982, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[41]  Shreyas Sundaram,et al.  Robustness of information diffusion algorithms to locally bounded adversaries , 2011, 2012 American Control Conference (ACC).

[42]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[43]  Y. Censor Row-Action Methods for Huge and Sparse Systems and Their Applications , 1981 .

[44]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[45]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[46]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[47]  Steven X. Ding,et al.  Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .

[48]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[49]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part II: Approximate Model , 1970 .

[50]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[51]  Ioannis D. Schizas,et al.  Distributed LMS for Consensus-Based In-Network Adaptive Processing , 2009, IEEE Transactions on Signal Processing.

[52]  Antonio Bicchi,et al.  Identifying cyber attacks via local model information , 2010, 49th IEEE Conference on Decision and Control (CDC).

[53]  F. Bullo,et al.  A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.

[54]  Ton Geerts Invariant subspaces and invertibility properties for singular systems: The general case , 1993 .

[55]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[56]  Antonio Franchi,et al.  On Cooperative Patrolling: Optimal Trajectories, Complexity Analysis, and Approximation Algorithms , 2011, IEEE Transactions on Robotics.

[57]  Vaibhav Srivastava,et al.  Stochastic surveillance strategies for spatial quickest detection , 2013, Int. J. Robotics Res..

[58]  P. Kokotovic,et al.  A singular perturbation approach to modeling and control of Markov chains , 1981 .

[59]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[60]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network , 2008, 2008 American Control Conference.

[61]  Antonio Bicchi,et al.  Distributed Estimation and Detection under Local Information , 2010 .

[62]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[63]  J. Tokarzewski Finite Zeros in Discrete Time Control Systems , 2006 .

[64]  Ali H. Sayed,et al.  Incremental Adaptive Strategies Over Distributed Networks , 2007, IEEE Transactions on Signal Processing.

[65]  K. Reinschke Graph-theoretic approach to symbolic analysis of linear descriptor systems , 1994 .

[66]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[67]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[68]  Ruggero Carli,et al.  Distributed estimation via iterative projections with application to power network monitoring , 2011, Autom..

[69]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[70]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[71]  Ruggero Carli,et al.  Simultaneous Boundary Partitioning and Cameras Synchronization for Optimal Video Surveillance , 2012 .

[72]  Xi Yang,et al.  On convergence conditions of waveform relaxation methods for linear differential-algebraic equations , 2011, J. Comput. Appl. Math..

[73]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[74]  Y. Ohta,et al.  Decentralized control using quasi-block diagonal dominance of transfer function matrices , 1986 .

[75]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[76]  Andrzej J. Osiadacz Osiadacz,et al.  Simulation and Analysis of Gas Networks , 1987 .

[77]  K. Tanabe Projection method for solving a singular system of linear equations and its applications , 1971 .

[78]  Ali H. Sayed,et al.  Diffusion recursive least-squares for distributed estimation over adaptive networks , 2008, IEEE Transactions on Signal Processing.

[79]  Shreyas Sundaram,et al.  Consensus of multi-agent networks in the presence of adversaries using only local information , 2012, HiCoNS '12.

[80]  William F. Moss,et al.  Decay rates for inverses of band matrices , 1984 .

[81]  Ian Postlethwaite,et al.  Multivariable Feedback Control: Analysis and Design , 1996 .

[82]  Milos S. Stankovic,et al.  Consensus Based Overlapping Decentralized Estimation With Missing Observations and Communication Faults , 2008 .

[83]  W. Wonham Linear Multivariable Control: A Geometric Approach , 1974 .

[84]  Antonio Franchi,et al.  On optimal cooperative patrolling , 2010, 49th IEEE Conference on Decision and Control (CDC).

[85]  Alberto Isidori,et al.  A Geometric Approach to Nonlinear Fault Detection and Isolation , 2000 .

[86]  Antonio Bicchi,et al.  Steering a Leader-Follower Team Via Linear Consensus , 2008, HSCC.

[87]  M. Vidyasagar Input-Output Analysis of Large-Scale Interconnected Systems: Decomposition, Well-Posedness, and Stability , 1981 .

[88]  P. Daoutidis,et al.  Control of nonlinear differential algebraic equation systems , 1999 .

[89]  Joe Chow,et al.  A Sparsity-Based Technique for Identifying Slow-Coherent Areas in Large Power Systems , 1984, IEEE Transactions on Power Apparatus and Systems.

[90]  D. Luenberger Optimization by Vector Space Methods , 1968 .

[91]  M. Lewin On nonnegative matrices , 1971 .

[92]  Ernst Scholtz,et al.  Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems , 2004 .

[93]  Volker Mehrmann,et al.  Differential-Algebraic Equations: Analysis and Numerical Solution , 2006 .

[94]  Ruggero Carli,et al.  A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[95]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[96]  Xavier Litrico,et al.  Modeling and Control of Hydrosystems , 2009 .

[97]  R. A. Silverman,et al.  Introductory Real Analysis , 1972 .

[98]  L. Dai,et al.  Singular Control Systems , 1989, Lecture Notes in Control and Information Sciences.

[99]  Krzysztof Tchon,et al.  On generic properties of linear systems: An overview , 1983, Kybernetika.

[100]  P. Kundur,et al.  Power system stability and control , 1994 .

[101]  Juan Pablo Conti,et al.  The day the samba stopped , 2010 .

[102]  P. Daoutidis,et al.  Feedback control of nonlinear differential-algebraic-equation systems , 1995 .

[103]  Francesco Bullo,et al.  Cooperative Patrolling via Weighted Tours: Performance Analysis and Distributed Algorithms , 2012, IEEE Transactions on Robotics.

[104]  Kurt Johannes Reinschke,et al.  Multivariable Control a Graph-theoretic Approach , 1988 .

[105]  W. Marsden I and J , 2012 .

[106]  C. L. DeMarco,et al.  The potential for malicious control in a competitive power systems environment , 1996, Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applications held together with IEEE International Symposium on Intelligent Contro.

[107]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[108]  Florian Dörfler,et al.  Continuous-Time Distributed Observers With Discrete Communication , 2013, IEEE Journal of Selected Topics in Signal Processing.

[109]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[110]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[111]  Florian Dörfler,et al.  Kron Reduction of Graphs With Applications to Electrical Networks , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.

[112]  Harry L. Trentelman,et al.  Control theory for linear systems , 2002 .

[113]  Seif Haridi,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[114]  K. Ikramov Matrix pencils: Theory, applications, and numerical methods , 1993 .

[115]  F. Lewis A survey of linear singular systems , 1986 .

[116]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[117]  A. Medvedev,et al.  Feedforward time-delay structures in state estimation: finite memory smoothing and continuous deadbeat observers , 1994 .

[118]  M. Ilić,et al.  The waveform relaxation method for systems of differential/algebraic equations , 1990, 29th IEEE Conference on Decision and Control.

[119]  Andrzej Banaszuk,et al.  Hearing the clusters of a graph: A distributed algorithm , 2009, Autom..

[120]  A. Willsky,et al.  Failure detection and identification , 1989 .

[121]  G. Herman,et al.  Algebraic reconstruction techniques (ART) for three-dimensional electron microscopy and x-ray photography. , 1970, Journal of theoretical biology.

[122]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[123]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[124]  S. Premrudeepreechacharn,et al.  Measurement placement for power system state estimation by decomposition technique , 2004, 2004 11th International Conference on Harmonics and Quality of Power (IEEE Cat. No.04EX951).

[125]  Ali H. Sayed,et al.  Diffusion Least-Mean Squares Over Adaptive Networks: Formulation and Performance Analysis , 2008, IEEE Transactions on Signal Processing.

[126]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[127]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[128]  A. Isidori Nonlinear Control Systems , 1985 .

[129]  Wilfrid Perruquetti,et al.  Observability and detectability analysis of singular linear systems with unknown inputs , 2011, IEEE Conference on Decision and Control and European Control Conference.

[130]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[131]  Wei Ren,et al.  Information consensus in multivehicle cooperative control , 2007, IEEE Control Systems.