Constraining Attacker Capabilities Through Actuator Saturation

For LTI control systems, we provide mathematical tools – in terms of Linear Matrix Inequalities – for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide tools for designing new artificial limits on the actuators (smaller than their physical bounds) such that the new ellipsoidal bounds (and thus the new reachable sets) are as large as possible (in terms of volume) while guaranteeing that the dangerous states are not reachable. This guarantees that the new bounds cut as little as possible from the original reachable set to minimize the loss of system performance. Computer simulations using a platoon of vehicles are presented to illustrate the performance of our tools.

[1]  Vijay Gupta,et al.  On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.

[2]  Carlos Murguia,et al.  Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.

[3]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[4]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[5]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[6]  Nathan van de Wouw,et al.  Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .

[7]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[8]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[9]  J. Hedrick,et al.  String stability of interconnected systems , 1995, Proceedings of 1995 American Control Conference - ACC'95.

[10]  Nathan van de Wouw,et al.  Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.

[11]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[12]  Zhili Sun,et al.  Applications of vehicular communications for reducing fuel consumption and CO2 emission: the state of the art and research challenges , 2012, IEEE Communications Magazine.

[13]  Martín Ochoa,et al.  Design-time Quantification of Integrity in Cyber-physical Systems , 2017, PLAS@CCS.

[14]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[15]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .

[16]  Carlos Murguia,et al.  CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).

[17]  Quanyan Zhu,et al.  Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.

[18]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[19]  Sophie Tarbouriech,et al.  Stability and Stabilization of Linear Systems with Saturating Actuators , 2011 .

[20]  Karl Johan Åström,et al.  Computer-controlled systems (3rd ed.) , 1997 .

[21]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[22]  Nathan van de Wouw,et al.  Controller Synthesis for String Stability of Vehicle Platoons , 2014, IEEE Transactions on Intelligent Transportation Systems.

[23]  J. Lofberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).

[24]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[25]  Soodeh Dadras,et al.  Vehicular Platooning in an Adversarial Environment , 2015, AsiaCCS.

[26]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[27]  Phan Thanh Nam,et al.  Reachable Set Bounding for Linear Discrete-Time Systems with Delays and Bounded Disturbances , 2013, J. Optim. Theory Appl..

[28]  Ahmad-Reza Sadeghi,et al.  Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , 2017, AsiaCCS.