Robust Sensor Design Against Multiple Attackers with Misaligned Control Objectives

We introduce a robust sensor design framework to provide defense against attackers that can bypass/hijack the existing defense mechanisms. For effective control, such attackers would still need to have access to the state of the system because of the presence of plant noise. We design "affine" sensor outputs to control their perception of the system so that their adversarial intentions would not be fulfilled or even inadvertently end up having a positive impact. The specific model we adopt is a Gauss-Markov process driven by a controller with a "private" malicious/benign quadratic control objective. We seek to defend against the worst possible distribution over the controllers' objectives in a robust way. Under the solution concept of game-theoretic hierarchical equilibrium, we obtain a semi-definite programming problem equivalent to the problem faced by the sensor against a controller with an arbitrary, but known control objective even when the sensor has noisy measurements. Based on this equivalence relationship, we provide an algorithm to compute the optimal affine sensor outputs. Finally, we analyze the ensuing performance numerically for various.

[1]  Soummya Kar,et al.  Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).

[2]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[3]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[4]  Nell Nelson,et al.  The Impact of Dragonfly Malware on Industrial Control Systems , 2020 .

[5]  Emrah Akyol,et al.  Hierarchical Multi-stage Gaussian Signaling Games: Strategic Communication and Control , 2016 .

[6]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[7]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[8]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[10]  Tamer Basar,et al.  Simultaneous design of measurement and control strategies for stochastic systems with feedback , 1989, Autom..

[11]  Tamer Basar,et al.  Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats , 2017, GameSec.

[12]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[13]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[14]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[15]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[16]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Soummya Kar,et al.  Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[18]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Tamer Basar,et al.  Secure Sensor Design Against Undetected Infiltration: Minimum Impact-Minimum Damage , 2018, ArXiv.

[20]  Tamer Başar,et al.  Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems , 2016, Autom..

[21]  Tamer Basar,et al.  Deceptive Multi-dimensional Information Disclosure over a Gaussian Channel* , 2018, 2018 Annual American Control Conference (ACC).

[22]  Efe A. Ok Preliminaries of Real Analysis, from Real Analysis with Economic Applications , 2007 .

[23]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[24]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[25]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[26]  Tamer Basar,et al.  Dynamic Information Disclosure for Deception* , 2018, 2018 IEEE Conference on Decision and Control (CDC).