Recovery after attacks of deception on Networked Control Systems

This paper follows on the authors' recent work that developed a network-wide attack detector and isolator. Having determined that the sensor of a regulated process is compromised, the problem shifts to maintaining the stability of the subject process and the integrity of the greater physical plant. First, measurements gathered at other processes, interconnected at the physical layer, provide estimates of the output of the process under attack through a bank of state observers. Next, a weighted consensus algorithm fuses all of these estimates into information that is actionable, being independent of the deceptive sensory data. The estimation error is shown to be sector-bounded. To address the resulting latency time in regulation, the authors employ a self-triggered control policy whose aim is to stabilize the attacked process. Furthermore, they test the proposed concept by simulation and demonstrate the safe operation of the physical plant.

[1]  Long Wang,et al.  Finite-time weighted average consensus with respect to a monotonic function and its application , 2011, Syst. Control. Lett..

[2]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[3]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[4]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .

[5]  Paulo Tabuada,et al.  An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[6]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[7]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[8]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[10]  Manuel Mazo,et al.  An ISS self-triggered implementation of linear controllers , 2009, Autom..

[11]  S. Hosoe Determination of generic dimensions of controllable subspaces and its application , 1980 .

[12]  Randal W. Beard,et al.  Consensus seeking in multiagent systems under dynamically changing interaction topologies , 2005, IEEE Transactions on Automatic Control.

[13]  Kai Cai,et al.  Average consensus on general strongly connected digraphs , 2012, Autom..

[14]  David K. Y. Yau,et al.  A sensor-cyber network testbed for plume detection, identification, and tracking , 2007, IPSN.

[15]  Brian Connett,et al.  Detecting and Isolating Attacks of Deception in Networked Control Systems , 2016, 2016 IEEE International Conference on Autonomic Computing (ICAC).

[16]  E.M. Atkins,et al.  A survey of consensus problems in multi-agent coordination , 2005, Proceedings of the 2005, American Control Conference, 2005..

[17]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[18]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[19]  Frédéric Hamelin,et al.  State and input observability for structured linear systems: A graph-theoretic approach , 2007, Autom..