Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems

Cyberphysical systems integrate physical processes, computational resources, and communication capabilities. Cyberphysical systems have permeated modern society, becoming prevalent in many domains, including energy production, health care, and telecommunications. Examples of cyberphysical systems include sensor networks, industrial automation systems, and critical infrastructures such as transportation networks, power generation and distribution networks, water and gas distribution networks, and advanced manufacturing systems. The integration of cybertechnologies with physical processes increases system efficiencies and, at the same time, introduces vulnerabilities that undermine the reliability of critical infrastructures. As recently highlighted by the Maroochy water breach in March 2000 [1], multiple recent power blackouts in Brazil [2], the SQL Slammer worm attack on the Davis-Besse nuclear plant in January 2003 [3], the StuxNet computer worm in June 2010 [4], and various industrial security incidents [5], cyberphysical systems are prone to failures and attacks on their physical infrastructure and cyberattacks on their data management and communication layer [6], [7].

[1]  Kurt Johannes Reinschke,et al.  Multivariable Control a Graph-theoretic Approach , 1988 .

[2]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[3]  Frank L. Lewis,et al.  A tutorial on the geometric analysis of linear time-invariant implicit systems , 1992, Autom..

[4]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[5]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[6]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[7]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[8]  W. Wonham Linear Multivariable Control: A Geometric Approach , 1974 .

[9]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[10]  P. Daoutidis,et al.  Control of nonlinear differential algebraic equation systems , 1999 .

[11]  G. Basile,et al.  Controlled and conditioned invariants in linear system theory , 1992 .

[12]  Juan Pablo Conti,et al.  The day the samba stopped , 2010 .

[13]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[14]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[15]  Jovan Ilic,et al.  Frequency Instability Problems in North American Interconnections , 2011 .

[16]  Ernst Scholtz,et al.  Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems , 2004 .

[17]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[18]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[19]  C. L. DeMarco,et al.  The potential for malicious control in a competitive power systems environment , 1996, Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applications held together with IEEE International Symposium on Intelligent Contro.

[20]  Xavier Litrico,et al.  Modeling and Control of Hydrosystems , 2009 .

[21]  Florian Dörfler,et al.  Continuous-Time Distributed Observers With Discrete Communication , 2013, IEEE Journal of Selected Topics in Signal Processing.

[22]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[23]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[24]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[25]  Alberto Speranzon,et al.  On analysis and design of stealth-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[26]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[27]  Sonia Martínez,et al.  On Distributed Convex Optimization Under Inequality and Equality Constraints , 2010, IEEE Transactions on Automatic Control.

[28]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[29]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[30]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[31]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[32]  Guy Richards Hackers vs slackers - [control security] , 2008 .

[33]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[34]  F. Bullo,et al.  A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.

[35]  Ton Geerts Invariant subspaces and invertibility properties for singular systems: The general case , 1993 .

[36]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[37]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[38]  Andrzej J. Osiadacz Osiadacz,et al.  Simulation and Analysis of Gas Networks , 1987 .

[39]  P. Daoutidis,et al.  Feedback control of nonlinear differential-algebraic-equation systems , 1995 .

[40]  Harry L. Trentelman,et al.  Control theory for linear systems , 2002 .

[41]  Donald A. Pierre,et al.  An application of Prony methods in PSS design for multimachine systems , 1991 .

[42]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[43]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[44]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[45]  A. Willsky,et al.  Failure detection and identification , 1989 .

[46]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[47]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[48]  J. Y. Keller,et al.  Monitoring of stealthy attack in networked control systems , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).

[49]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[50]  Robert Axelrod,et al.  Timing of cyber conflict , 2014, Proceedings of the National Academy of Sciences.

[51]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[52]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[53]  Marios M. Polycarpou,et al.  A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.

[54]  Marc C. Steinbach,et al.  Optimization models for operative planning in drinking water networks , 2009 .

[55]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).