Adversarial Model Predictive Control via Second-Order Cone Programming

We study the problem of designing attacks to safety-critical systems in which the adversary seeks to maximize the overall system cost within a model predictive control framework. Although in general this problem is NP-hard, we characterize a family of problems that can be solved in polynomial time via a second-order cone programming relaxation. In particular, we show that positive systems fall under this family. We provide examples demonstrating the design of optimal attacks on an autonomous vehicle and a microgrid.

[1]  Panos M. Pardalos,et al.  Quadratic programming with one negative eigenvalue is NP-hard , 1991, J. Glob. Optim..

[2]  Alberto Bemporad,et al.  Predictive Control for Linear and Hybrid Systems , 2017 .

[3]  Daniel Axehill,et al.  Controlling the level of sparsity in MPC , 2014, Syst. Control. Lett..

[4]  Hilary E. Brown,et al.  Risk of Cyber-Physical Attack via Load With Emulated Inertia Control , 2018, IEEE Transactions on Smart Grid.

[5]  Stephen P. Boyd,et al.  General Heuristics for Nonconvex Quadratically Constrained Quadratic Programming , 2017, 1703.07870.

[6]  Sara Dadras,et al.  Identification of the Attacker in Cyber-Physical Systems with an Application to Vehicular Platooning in Adversarial Environment , 2018, 2018 Annual American Control Conference (ACC).

[7]  Frank Allgöwer,et al.  Indefinite Linear Quadratic Optimal Control: Strict Dissipativity and Turnpike Properties , 2018, IEEE Control Systems Letters.

[8]  Behçet Açikmese,et al.  Lossless Convexification of Nonconvex Control Bound and Pointing Constraints of the Soft Landing Optimal Control Problem , 2013, IEEE Transactions on Control Systems Technology.

[9]  Soummya Kar,et al.  Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.

[10]  Stephen P. Boyd,et al.  Antagonistic control , 2016, Syst. Control. Lett..

[11]  Ming Jin,et al.  A semidefinite programming relaxation under false data injection attacks against power grid AC state estimation , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[12]  Bruno Sinopoli,et al.  Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.

[13]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[14]  J. Lofberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).

[15]  Anthony Tzes,et al.  Adversarial control scheme for an islanded power plant , 2016, 2016 European Control Conference (ECC).

[16]  Maria Elena Valcher,et al.  A Tutorial on Positive Systems and Large Scale Control , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[17]  Johan Efberg,et al.  YALMIP : A toolbox for modeling and optimization in MATLAB , 2004 .

[18]  Masakazu Kojima,et al.  Exact Solutions of Some Nonconvex Quadratic Optimization Problems via SDP and SOCP Relaxations , 2003, Comput. Optim. Appl..

[19]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[20]  Richard M. Murray,et al.  Analysis of control systems on symmetric cones , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[21]  Anders Rantzer,et al.  Distributed control of positive systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[22]  Jan M. Maciejowski,et al.  Implications of dissipativity on stability of economic model predictive control - The indefinite linear quadratic case , 2017, Syst. Control. Lett..

[23]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[24]  Karl Henrik Johansson,et al.  Voltage control for interconnected microgrids under adversarial actions , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).