The securable subspace of a linear stochastic system with malicious sensors and actuators

Analogous to the notions of controllable and unobservable subspaces, the recently introduced notions of securable and unsecurable subspaces for linear dynamical systems have important operational meaning in the context of secure control of deterministic linear dynamical systems. Specifically, given a multiple input, multiple output linear dynamical system, an arbitrary subset of whose sensors and actuators are malicious, the unsecurable subspace has the operational meaning as the set of states that the malicious actuators can steer the system to, without detection of the visit to such a state by the honest sensors in the system. In this paper, we examine these subspaces from the standpoint of a fully-observed stochastic linear dynamical system, and establish operational meanings for them in this context.

[1]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[2]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  T. Lai,et al.  Least Squares Estimates in Stochastic Regression Models with Applications to Identification and Control of Dynamic Systems , 1982 .

[4]  Panganamala Ramana Kumar,et al.  Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[5]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[6]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[7]  Bharadwaj Satchidanandan,et al.  Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System , 2018 .

[8]  Panganamala Ramana Kumar,et al.  On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[9]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[10]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[11]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[12]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[13]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[14]  W. Wonham Linear Multivariable Control: A Geometric Approach , 1974 .

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[16]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[17]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[18]  Panganamala Ramana Kumar,et al.  Secure control of networked cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[19]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[20]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.