Toward Cyber-Secure and Resilient Networked Control Systems

Resilience is the ability to maintain acceptable levels of operation in the presence of abnormal conditions. It is an essential property in industrial control systems, which are the backbone of several critical infrastructures. The trend towards using pervasive information technology systems, such as the Internet, results in control systems becoming increasingly vulnerable to cyber threats. Traditional cyber security does not consider the interdependencies between the physical components and the cyber systems. On the other hand, control-theoretic approaches typically deal with independent disturbances and faults, thus they are not tailored to handle cyber threats. Theory and tools to analyze and build control system resilience are, therefore, lacking and in need to be developed. This thesis contributes towards a framework for analyzing and building resilient control systems.First, a conceptual model for networked control systems with malicious adversaries is introduced. In this model, the adversary aims at disrupting the system behavior while remaining undetected by an anomaly detector The adversary is constrained in terms of the available model knowledge, disclosure resources, and disruption capabilities. These resources may correspond to the anomaly detector’s algorithm, sniffers of private data, and spoofers of control commands, respectively.Second, we address security and resilience under the perspective of risk management, where the notion of risk is defined in terms of a threat’s scenario, impact, and likelihood. Quantitative tools to analyze risk are proposed. They take into account both the likelihood and impact of threats. Attack scenarios with high impact are identified using the proposed tools, e.g., zero-dynamics attacks are analyzed in detail. The problem of revealing attacks is also addressed. Their stealthiness is characterized, and how to detect them by modifying the system’s structure is also described.As our third contribution, we propose distributed fault detection and isolation schemes to detect physical and cyber threats on interconnected second-order linear systems. A distributed scheme based on unknown input observers is designed to jointly detect and isolate threats that may occur on the network edges or nodes. Additionally, we propose a distributed scheme based on local models and measurements that is resilient to changes outside the local subsystem. The complexity of the proposed methods is decreased by reducing the number of monitoring nodes and by characterizing the minimum amount of model information and measurements needed to achieve fault detection and isolation.Finally, we tackle the problem of distributed reconfiguration under sensor and actuator faults. In particular, we consider a control system with redundant sensors and actuators cooperating to recover from the removal of individual nodes. The proposed scheme minimizes a quadratic cost while satisfying a model-matching condition, which maintains the nominal closed-loop behavior after faults. Stability of the closed-loop system under the proposed scheme is analyzed.

[1]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[2]  Marcel Staroswiecki Fault tolerant control : The pseudo-inverse method revisited , 2005 .

[3]  K. J. Szalai,et al.  Multi-flight Computer Redundancy Management For Digital Fly-by-wire Aircraft Control , 1977 .

[4]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[5]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[6]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[7]  Long Cheng,et al.  Decentralized Robust Adaptive Control for the Multiagent System Consensus Problem Using Neural Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[8]  Roberto Uribeetxeberria,et al.  A Review of SCADA Anomaly Detection Systems , 2011, SOCO.

[9]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[10]  Panos J. Antsaklis,et al.  Control and Communication Challenges in Networked Real-Time Systems , 2007, Proceedings of the IEEE.

[11]  Tariq Samad,et al.  System architecture for process automation: Review and trends , 2007 .

[12]  Karl Henrik Johansson,et al.  Design of State-Based Schedulers for a Network of Control Loops , 2012, IEEE Transactions on Automatic Control.

[13]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[14]  Xiaofeng Wang,et al.  Event-Triggering in Distributed Networked Control Systems , 2011, IEEE Transactions on Automatic Control.

[15]  Alessandro Vespignani,et al.  Dynamical Processes on Complex Networks , 2008 .

[16]  G. Basile,et al.  Controlled and conditioned invariants in linear system theory , 1992 .

[17]  Jan Lunze,et al.  Feedback control of large-scale systems , 1992 .

[18]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[19]  P. Kundur Power System Stability , 2012 .

[20]  David I. Gertman,et al.  Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.

[21]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[22]  Wei Zhang,et al.  Stability of networked control systems , 2001 .

[23]  Karl Johan Åström,et al.  Control: A perspective , 2014, Autom..

[24]  Jason L. Speyer,et al.  Robust fault detection filter design , 1995, Proceedings of 1995 American Control Conference - ACC'95.

[25]  Remus Teodorescu,et al.  Special tests for the power electronic converters of wind turbine generators , 2011, 2011 IEEE Power and Energy Society General Meeting.

[26]  Giorgio Battistelli,et al.  Model-free Adaptive Switching Control of Uncertain Time-Varying Plants , 2011 .

[27]  Robert R. Moeller,et al.  Risk Management Fundamentals , 2011 .

[28]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[29]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[30]  Dragoslav D. Šiljak,et al.  Decentralized control of complex systems , 2012 .

[31]  Marcel Staroswiecki,et al.  Progressive accommodation of parametric faults in linear quadratic control , 2007, Autom..

[32]  Ronald L. Krutz Securing SCADA systems , 2005 .

[33]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[34]  Steven X. Ding,et al.  Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .

[35]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[36]  Henrik Sandberg,et al.  The VIKING project: An initiative on resilient control of power networks , 2009, 2009 2nd International Symposium on Resilient Control Systems.

[37]  Jan Lunze,et al.  Reconfigurable Fault-tolerant Control: A Tutorial Introduction , 2008, Eur. J. Control.

[38]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[39]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[40]  Petros G. Voulgaris,et al.  Failure-robust distributed controller architectures , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[41]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[42]  Behrouz Touri,et al.  Consensus in the Presence of an Adversary , 2012 .

[43]  Cédric Langbort,et al.  Distributed control design for systems interconnected over an arbitrary graph , 2004, IEEE Transactions on Automatic Control.

[44]  Karl Henrik Johansson,et al.  The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..

[45]  Quanyan Zhu,et al.  A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.

[46]  Shreyas Sundaram,et al.  A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks , 2012, Autom..

[47]  Inseok Yang,et al.  Fault-tolerant control strategy based on control allocation using smart actuators , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).

[48]  Wei Xing Zheng,et al.  Coordination of Multiple Agents With Double-Integrator Dynamics Under Generalized Interaction Topologies , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[49]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[50]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[51]  Asuman E. Ozdaglar,et al.  Constrained Consensus and Optimization in Multi-Agent Networks , 2008, IEEE Transactions on Automatic Control.

[52]  Rafael Castro-Linares,et al.  Trajectory tracking for non-holonomic cars: A linear approach to controlled leader-follower formation , 2010, 49th IEEE Conference on Decision and Control (CDC).

[53]  Karl Henrik Johansson,et al.  On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem , 2011, IEEE Transactions on Smart Grid.

[54]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[55]  G. Zames Feedback and optimal sensitivity: Model reference transformations, multiplicative seminorms, and approximate inverses , 1981 .

[56]  Karl Henrik Johansson,et al.  Optimal power flow: Closing the loop over corrupted data , 2012, 2012 American Control Conference (ACC).

[57]  A. Willsky,et al.  Analytical redundancy and the design of robust failure detection systems , 1984 .

[58]  Björn Johansson,et al.  On Distributed Optimization in Networked Systems , 2008 .

[59]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[60]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[61]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[62]  R. J. Patton,et al.  Fault detection, supervision, and safety for technical processes 1997 (SAFEPROCESS '97) : a proceedings volume from the 3rd IFAC symposium, Kingston Upon Hull, UK, 26-28 August 1997 , 1998 .

[63]  Marc E. Pfetsch,et al.  The Computational Complexity of the Restricted Isometry Property, the Nullspace Property, and Related Concepts in Compressed Sensing , 2012, IEEE Transactions on Information Theory.

[64]  Luca Schenato,et al.  To Zero or to Hold Control Inputs With Lossy Links? , 2009, IEEE Transactions on Automatic Control.

[65]  Tor Arne Johansen,et al.  Control allocation - A survey , 2013, Autom..

[66]  Suresh M. Joshi,et al.  An adaptive control scheme for systems with unknown actuator failures , 2002, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).

[67]  N. Eva Wu,et al.  Control reconfigurability of linear time-invariant systems , 2000, Autom..

[68]  Naomi Ehrich Leonard,et al.  Dynamics of Decision Making in Animal Group Motion , 2009, J. Nonlinear Sci..

[69]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[70]  Ilya V. Kolmanovsky,et al.  Predictive energy management of a power-split hybrid electric vehicle , 2009, 2009 American Control Conference.

[71]  Marios M. Polycarpou,et al.  A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems , 2002, IEEE Trans. Autom. Control..

[72]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[73]  Richard M. Murray,et al.  Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..

[74]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[75]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[76]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[77]  W. H. Chung,et al.  A game theoretic fault detection filter , 1998, IEEE Trans. Autom. Control..

[78]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[79]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[80]  Mohammad Shahidehpour,et al.  Impact of Security on Power Systems Operation , 2005, Proceedings of the IEEE.

[81]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .

[82]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[83]  Guang-Hong Yang,et al.  Distributed fault-tolerant control systems design against actuator faults and faulty interconnection links: An adaptive method , 2009, 2009 American Control Conference.

[84]  P. Kundur,et al.  Power system stability and control , 1994 .

[85]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[86]  Sonia Martínez,et al.  On resilient consensus against replay attacks in operator-vehicle networks , 2012, 2012 American Control Conference (ACC).

[87]  P. Antsaklis,et al.  Stability of the pseudo-inverse method for reconfigurable control systems , 1991 .

[88]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[89]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[90]  Rolf Isermann,et al.  Fault-diagnosis systems : an introduction from fault detection to fault tolerance , 2006 .

[91]  A.G. Phadke,et al.  The Wide World of Wide-area Measurement , 2008, IEEE Power and Energy Magazine.

[92]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[93]  Fernando Paganini,et al.  Distributed control of spatially invariant systems , 2002, IEEE Trans. Autom. Control..

[94]  M. Demetriou Using unknown input observers for robust adaptive fault detection in vector second-order systems , 2005 .

[95]  Alan S. Willsky,et al.  A survey of design methods for failure detection in dynamic systems , 1976, Autom..

[96]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[97]  Jan Lunze,et al.  Plug-and-Play control - Theory and implementation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[98]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[99]  Janusz Bialek,et al.  Power System Dynamics: Stability and Control , 2008 .

[100]  P. Barooah,et al.  Graph Effective Resistance and Distributed Control: Spectral Properties and Applications , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[101]  Yaakov Bar-Shalom Update with out-of-sequence measurements in tracking: exact solution , 2002 .

[102]  Craig G. Rieger Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[103]  Thomas Rid Cyber War Will Not Take Place , 2012 .

[104]  K. Åström Introduction to Stochastic Control Theory , 1970 .

[105]  Eric Chien,et al.  W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.

[106]  Qi Zhang,et al.  Distributed fault detection and isolation for multimachine power systems , 2012, Proceedings of 2012 IEEE/ASME 8th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications.

[107]  Steven X. Ding,et al.  Advanced design scheme for fault tolerant distributed networked control systems , 2008 .

[108]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[109]  M. Staroswiecki,et al.  Fault recovery by nominal trajectory tracking , 2008, 2008 American Control Conference.

[110]  Sirish L. Shah,et al.  Fault detection and isolation in the presence of process uncertainties , 2005 .

[111]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[112]  Alexander Schrijver,et al.  Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.

[113]  Jasbir S. Arora,et al.  Survey of multi-objective optimization methods for engineering , 2004 .

[114]  Astrom Computer Controlled Systems , 1990 .

[115]  Gerhard P Hancke,et al.  Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.

[116]  Giorgio Battistelli,et al.  Unfalsified Virtual Reference Adaptive Switching Control of Plants with Persistent Disturbances , 2008 .

[117]  Khosrow Moslehi,et al.  Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.

[118]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[119]  Jean-Baptiste Hiriart-Urruty,et al.  Global Optimality Conditions in Maximizing a Convex Quadratic Function under Convex Quadratic Constraints , 2001, J. Glob. Optim..

[120]  Jean-Pierre Richard,et al.  Time-delay systems: an overview of some recent advances and open problems , 2003, Autom..

[121]  Fatos Xhafa,et al.  Special issue on cyber physical systems , 2013, Computing.

[122]  A. Willsky,et al.  Failure detection and identification , 1989 .

[123]  W. H. Kwon,et al.  Quadratic stability and stabilization of linear systems with Frobenius norm-bounded uncertainties , 1996, IEEE Trans. Autom. Control..

[124]  Kun Ji,et al.  Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[125]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[126]  Thomas Steffen,et al.  Control Reconfiguration After Actuator Failures Using Disturbance Decoupling Methods , 2006, IEEE Transactions on Automatic Control.

[127]  Ciwei Gao,et al.  Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[128]  Jie Chen,et al.  Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.

[129]  Qingbo Yang,et al.  A Survey of Anomaly Detection Methods in Networks , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.

[130]  Jie Chen,et al.  Observer-based fault detection and isolation: robustness and applications , 1997 .

[131]  Mikael Gidlund,et al.  Future research challenges in wireless sensor and actuator networks targeting industrial automation , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[132]  José M. F. Moura,et al.  Distributing the Kalman Filter for Large-Scale Systems , 2007, IEEE Transactions on Signal Processing.

[133]  Ron J. Patton,et al.  FAULT-TOLERANT CONTROL SYSTEMS: THE 1997 SITUATION , 1997 .

[134]  P. Frank,et al.  Survey of robust residual generation and evaluation methods in observer-based fault detection systems , 1997 .

[135]  Jerry M. Mendel,et al.  IEEE control systems society , 2004, IEEE Control Systems.

[136]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[137]  Nathan van de Wouw,et al.  Reconfigurable control of piecewise affine systems with actuator and sensor faults: Stability and tracking , 2011, Autom..

[138]  Mathias Ekstedt,et al.  The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures , 2013, IEEE Systems Journal.

[139]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[140]  Marios M. Polycarpou,et al.  Distributed Fault Diagnosis With Overlapping Decompositions: An Adaptive Approximation Approach , 2009, IEEE Transactions on Automatic Control.

[141]  Paulo Tabuada,et al.  Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[142]  Michel Kinnaert,et al.  Diagnosis and Fault-tolerant Control, 2nd edition , 2006 .

[143]  Youmin Zhang,et al.  Bibliographical review on reconfigurable fault-tolerant control systems , 2003, Annu. Rev. Control..

[144]  Torkel Glad,et al.  Resolving actuator redundancy - optimal control vs. control allocation , 2005, Autom..

[145]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[146]  J. J. Serrano,et al.  Distributed industrial control systems: a fault-tolerant architecture , 1999, Microprocess. Microsystems.

[147]  M.J. Ellsworth,et al.  The evolution of water cooling for IBM large server systems: Back to the future , 2008, 2008 11th Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems.

[148]  Marc E. Pfetsch,et al.  Exact and Approximate Sparse Solutions of Underdetermined Linear Equations , 2008, SIAM J. Sci. Comput..

[149]  Orest Iftime,et al.  Proceedings of the 16th IFAC World congress , 2006 .

[150]  David Wetherall,et al.  Computer networks, 5th Edition , 2011 .

[151]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[152]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[153]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[154]  Jan Dimon Bendtsen,et al.  Plug-and-Play Control—Modifying Control Systems Online , 2013, IEEE Transactions on Control Systems Technology.

[155]  Anjan Bose,et al.  On-line power system security analysis , 1992, Proc. IEEE.

[156]  Marcel Staroswiecki,et al.  Supervisory fault tolerant control for a class of uncertain nonlinear systems , 2009, Autom..

[157]  Rolf Isermann,et al.  Model-based fault-detection and diagnosis - status and applications , 2004, Annu. Rev. Control..

[158]  Harvey J. Everett Generalized Lagrange Multiplier Method for Solving Problems of Optimum Allocation of Resources , 1963 .

[159]  Ella M. Atkins,et al.  Distributed multi‐vehicle coordinated control via local information exchange , 2007 .

[160]  K. J. Morrisse,et al.  Distributed Control Schemes for wind-farm power regulation , 2012, 2012 North American Power Symposium (NAPS).

[161]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[162]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[163]  Yuwa Chompoobutrgool,et al.  Survey on power system stabilizers control and their prospective applications for power system damping using Synchrophasor‐based wide‐area systems , 2011 .

[164]  Naum Zuselevich Shor,et al.  Minimization Methods for Non-Differentiable Functions , 1985, Springer Series in Computational Mathematics.

[165]  Jochen Trumpf,et al.  Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, CDC-ECC 2011, Orlando, FL, USA, December 12-15, 2011 , 2011, CDC-ECE.

[166]  Hiroaki Nishino,et al.  Distributed Detection of Cyber Attacks and Faults for Power Systems , 2014 .

[167]  Ernst Scholtz,et al.  Graphical observer design suitable for large-scale DAE power systems , 2008, 2008 47th IEEE Conference on Decision and Control.

[168]  Jie Chen,et al.  Design of unknown input observers and robust fault detection filters , 1996 .

[169]  Fabrizio Grandoni,et al.  A note on the complexity of minimum dominating set , 2006, J. Discrete Algorithms.

[170]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[171]  Israel Koren,et al.  Fault-Tolerant Systems , 2007 .

[172]  Marcello Farina,et al.  Plug-and-Play Decentralized Model Predictive Control for Linear Systems , 2013, IEEE Transactions on Automatic Control.

[173]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[174]  Pablo Soldati,et al.  Modular Design of Jointly Optimal Controllers and Forwarding Policies for Wireless Control , 2012, IEEE Transactions on Automatic Control.

[175]  S. T. McCormick,et al.  A combinatorial approach to some sparse matrix problems , 1983 .

[176]  Euhanna Ghadimi,et al.  The ADMM algorithm for distributed averaging: Convergence rates and optimal parameter selection , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[177]  Ian Postlethwaite,et al.  Multivariable Feedback Control: Analysis and Design , 1996 .

[178]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[179]  Karl Henrik Johansson,et al.  Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.