Encrypted Control for Networked Systems: An Illustrative Introduction and Current Challenges

Cloud computing and distributed computing are becoming ubiquitous in many modern control areas such as smart grids, building automation, robot swarms, and intelligent transportation systems. Compared to “isolated” control systems, the main advantages of cloud-based and distributed control systems are resource pooling and outsourcing, rapid scalability, and high performance. However, these capabilities do not come without risks. In fact, the involved communication and processing of sensitive data via public networks and on third-party platforms promote (among other cyberthreats) eavesdropping and the manipulation of data (see “Summary”). That these threats are relevant to real-world applications is apparent from an increasing number of cyberattacks explicitly addressing industrial control systems [68]. Prominent examples are the malwares Stuxnet, Duqu, Industroyer, and Triton [14] as well as inference attacks arising from smart meters used as surveillance devices [30, 46].

[1]  C. Sanchez-Avila,et al.  The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[2]  Oded Regev,et al.  The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Moritz Schulze Darup,et al.  On Closed-Loop Dynamics of ADMM-Based MPC , 2019, Recent Advances in Model Predictive Control.

[5]  Manfred Morari,et al.  Cloud-Based MPC with Encrypted Data , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[6]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[7]  Farhad Farokhi,et al.  Towards Encrypted MPC for Linear Constrained Systems , 2018, IEEE Control Systems Letters.

[8]  Masako Kishida,et al.  Encrypted Average Consensus with Quantized Control Law , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[9]  Yurii Nesterov,et al.  Gradient methods for minimizing composite functions , 2012, Mathematical Programming.

[10]  Frederik Vercauteren,et al.  FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data , 2019, 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA).

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Ping Zhang,et al.  Controller encryption for discrete event systems , 2019, 2019 American Control Conference (ACC).

[13]  Daniel E. Quevedo,et al.  On Remote State Estimation in the Presence of an Eavesdropper , 2017 .

[14]  Francisco Javier González-Serrano,et al.  State estimation using an extended Kalman filter with privacy-protected observed inputs , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[15]  Moritz Schulze Darup,et al.  Encrypted Model Predictive Control in the Cloud , 2019 .

[16]  James F. Whidborne,et al.  Digital Controller Implementation and Fragility: A Modern Perspective , 2001 .

[17]  Zhong-Ping Jiang,et al.  Input-to-state stability for discrete-time nonlinear systems , 1999 .

[18]  Yang Liu,et al.  Federated Learning , 2019, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[19]  Dragan Nesic,et al.  Secure Control of Nonlinear Systems Using Semi-Homomorphic Encryption , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[20]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[21]  G. Fitzgerald,et al.  'I. , 2019, Australian journal of primary health.

[22]  George J. Pappas,et al.  Encrypted LQG using labeled homomorphic encryption , 2019, ICCPS.

[23]  Daniel E. Quevedo,et al.  Encrypted Cooperative Control Based on Structured Feedback , 2019, IEEE Control Systems Letters.

[24]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[25]  Seiichi Shin,et al.  Security enhancements of networked control systems using RSA public-key cryptosystem , 2015, 2015 10th Asian Control Conference (ASCC).

[26]  Iman Shames,et al.  Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption* , 2016 .

[27]  Marc Joye,et al.  A New Framework for Privacy-Preserving Aggregation of Time-Series Data , 2016, TSEC.

[28]  Iman Shames,et al.  Implementing homomorphic encryption based secure feedback control , 2020 .

[29]  Kaoru Teranishi,et al.  Stability Analysis and Dynamic Quantizer for Controller Encryption , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[30]  Hyungbo Shim,et al.  Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[31]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[32]  Fu Lin,et al.  Augmented Lagrangian Approach to Design of Structured Optimal State Feedback Gains , 2011, IEEE Transactions on Automatic Control.

[33]  Hyungbo Shim,et al.  Encrypted State Estimation in Networked Control Systems , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[34]  David Q. Mayne,et al.  Constrained model predictive control: Stability and optimality , 2000, Autom..

[35]  George J. Pappas,et al.  Encrypted Cooperative Control Revisited , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[36]  Hao Chen,et al.  CHET: an optimizing compiler for fully-homomorphic neural-network inferencing , 2019, PLDI.

[37]  Shai Halevi,et al.  Algorithms in HElib , 2014, CRYPTO.

[38]  George J. Pappas,et al.  State estimation codes for perfect secrecy , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[39]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[40]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[41]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[42]  Marc Joye,et al.  A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data , 2013, Financial Cryptography.

[43]  Hyungbo Shim,et al.  Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .

[44]  Marten van Dijk,et al.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.

[45]  Elaine Shi,et al.  Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.

[46]  Alberto Bemporad,et al.  The explicit linear quadratic regulator for constrained systems , 2003, Autom..

[47]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[48]  Farhad Farokhi,et al.  Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption , 2018, IEEE Transactions on Automatic Control.

[49]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[50]  Tibor Jager,et al.  Encrypted Cloud-based Control using Secret Sharing with One-time Pads , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[51]  Rafael Wisniewski,et al.  Privacy Preservation in Distributed Optimization via Dual Decomposition and ADMM , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[52]  Henning Trsek,et al.  Control-as-a-service from the cloud: A case study for using virtualized PLCs , 2014, 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014).

[53]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[54]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[55]  David Hutchison,et al.  A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..

[56]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[57]  Ivan Damgård,et al.  Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.

[58]  Hyungbo Shim,et al.  Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption , 2018, IEEE Access.

[59]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[60]  Stephen P. Boyd,et al.  Proximal Algorithms , 2013, Found. Trends Optim..

[61]  D. Delchamps Stabilizing a linear system with quantized state feedback , 1990 .

[62]  Michael Naehrig,et al.  Accelerating Homomorphic Evaluation on Reconfigurable Hardware , 2015, CHES.

[63]  George J. Pappas,et al.  Secure Multi-party Computation for Cloud-based Control , 2019, Privacy in Dynamical Systems.

[64]  Vladimir Kolesnikov,et al.  A Pragmatic Introduction to Secure Multi-Party Computation , 2019, Found. Trends Priv. Secur..

[65]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[66]  Berk Sunar,et al.  Accelerating Fully Homomorphic Encryption in Hardware , 2015, IEEE Transactions on Computers.

[67]  Yehuda Lindell,et al.  Introduction to Modern Cryptography, Second Edition , 2014 .

[68]  Iman Shames,et al.  Secure and private control using semi-homomorphic encryption , 2017 .

[69]  Ulrich Greveler,et al.  Multimedia Content Identification Through Smart Meter Power Usage Profiles , 2012 .

[70]  Paulo Tabuada,et al.  Control Barrier Function Based Quadratic Programs for Safety Critical Systems , 2016, IEEE Transactions on Automatic Control.

[71]  Yongqiang Wang,et al.  Secure and Privacy-Preserving Consensus , 2017, IEEE Transactions on Automatic Control.

[72]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[73]  Kurt Rohloff,et al.  Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor , 2017, IEEE Transactions on Emerging Topics in Computing.

[74]  Henrik Sandberg,et al.  A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems , 2019, 2019 18th European Control Conference (ECC).

[75]  George J. Pappas,et al.  Privacy preserving cloud-based quadratic optimization , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[76]  Brett Hemenway,et al.  SoK: General Purpose Compilers for Secure Multi-Party Computation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[77]  Jung Hee Cheon,et al.  Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.

[78]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[79]  Yixing Lao,et al.  nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data , 2018, IACR Cryptol. ePrint Arch..

[80]  Huseyin Polat,et al.  Efficient paillier cryptoprocessor for privacy-preserving data mining , 2016, Secur. Commun. Networks.

[81]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[82]  Yang Lu,et al.  Privacy preserving distributed optimization using homomorphic encryption , 2018, Autom..

[83]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[84]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[85]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[86]  Mihir Bellare,et al.  Foundations of garbled circuits , 2012, CCS.

[87]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[88]  Dragan Nesic,et al.  A Unified Framework for Design and Analysis of Networked and Quantized Control Systems , 2009, IEEE Transactions on Automatic Control.

[89]  T. Johansen,et al.  Computation and approximation of piecewise affine control laws via binary search trees , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..

[90]  Goele Pipeleers,et al.  Real-time proximal gradient method for linear MPC* , 2018, 2018 European Control Conference (ECC).

[91]  R. Curry Estimation and Control with Quantized Measurements , 1970 .

[92]  Daniel E. Quevedo,et al.  Encrypted cloud-based MPC for linear systems with input constraints , 2018 .

[93]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[94]  Paulo Tabuada,et al.  Privacy-aware quadratic optimization using partially homomorphic encryption , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).