Model-based resilient control for a multi-agent system against Denial of Service attacks

The computerization of critical infrastructure such as control systems means that these systems interact with information technology (IT) to an extent that makes them susceptible to malicious attacks. While IT security places emphasis on data accuracy easily attainable through simple error correction schemes such as packet re-transmission, control systems emphasize timely and accurate transmission of control signals in which delays or re-transmissions can have detrimental effects on the system. This motivates the need for resilient control algorithms that guarantee normal operation of critical infrastructure subject to malicious attacks and disturbances both at the physical layer and communication layer. In this paper, a team of networked autonomous agents whose collective objective is formation control is used to represent a cyber-physical system. A distributed formation control algorithm in which each agent depends only on its local information and that received from one neighbor to cooperatively carry out the group mission is employed. We develop a model-based resilient control algorithm that enables the team of autonomous agents accomplish their formation task even in the presence of a malicious denial of service (DOS) attack disrupting inter-agent communication. The technique is demonstrated through a laboratory experiment with 6 pioneer 3DX robots.

[1]  S. Shankar Sastry,et al.  Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..

[2]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[3]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[4]  Lee H. Keel,et al.  Secured formation control for multi-agent systems under DoS attacks , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).

[5]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[6]  Kar-Han Tan,et al.  High Precision Formation Control of Mobile Robots Using Virtual Structures , 1997, Auton. Robots.

[7]  Tucker R. Balch,et al.  Behavior-based formation control for multirobot teams , 1998, IEEE Trans. Robotics Autom..

[8]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[9]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[10]  Sherali Zeadally,et al.  Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..

[11]  Vijay Kumar,et al.  Leader-to-formation stability , 2004, IEEE Transactions on Robotics and Automation.

[12]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[13]  David Geer Security of critical control systems sparks concern , 2006, Computer.

[14]  Mireille E. Broucke,et al.  Local control strategies for groups of mobile autonomous agents , 2004, IEEE Transactions on Automatic Control.

[15]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[16]  Sonia Martínez,et al.  Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[17]  Alfred M. Bruckstein,et al.  Ants, Crickets and Frogs in Cyclic Pursuit , 1991 .

[18]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[19]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.

[20]  Morgan Quigley,et al.  ROS: an open-source Robot Operating System , 2009, ICRA 2009.

[21]  Mo-Yuen Chow,et al.  Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems , 2014, IEEE Transactions on Cybernetics.

[22]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[23]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[24]  Tansel Yucelen,et al.  Resilient networked multiagent systems: A distributed adaptive control approachy , 2014, 53rd IEEE Conference on Decision and Control.