Secure networked control systems against replay attacks without injecting authentication noise

This paper studies detection of replay attacks on networked control systems, assuming that the actuation and sensing signals are transmitted over an additive white Gaussian noise channel. It explores the use of the spectral estimation technique to detect the presence of a replay attack without injecting authentication noise to the control signal at the plant input. Our proposed detection method is applicable to networked feedback systems equipped with stable controllers and designed with classical and modern control system techniques. A numerical example from the literature is used to illustrate the detection results for replay attacks on networked control systems.

[1]  Petter Ögren,et al.  Cooperative control of mobile sensor networks:Adaptive gradient climbing in a distributed environment , 2004, IEEE Transactions on Automatic Control.

[2]  Mathukumalli Vidyasagar,et al.  Control System Synthesis , 1985 .

[3]  Panos J. Antsaklis,et al.  Special Issue on Technology of Networked Control Systems , 2007 .

[4]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[6]  J. Capon High-resolution frequency-wavenumber spectrum analysis , 1969 .

[7]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[8]  Panos J. Antsaklis,et al.  Guest Editorial Special Issue on Networked Control Systems , 2004, IEEE Trans. Autom. Control..

[9]  R.H. Middleton,et al.  Feedback Stabilization Over Signal-to-Noise Ratio Constrained Channels , 2007, IEEE Transactions on Automatic Control.

[10]  Guoxiang Gu,et al.  Discrete-Time Linear Systems , 2012 .

[11]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[12]  Richard H. Middleton,et al.  Feedback stabilization over signal-to-noise ratio constrained channels , 2007, Proceedings of the 2004 American Control Conference.

[13]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[14]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[15]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[16]  Peter J Seiler,et al.  Analysis of communication losses in vehicle control problems , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).

[17]  Petre Stoica,et al.  Spectral Analysis of Signals , 2009 .

[18]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[19]  Richard H. Middleton,et al.  Minimum Variance Control Over a Gaussian Communication Channel , 2008, IEEE Transactions on Automatic Control.

[20]  Jong-Ho Lee,et al.  Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).

[21]  Kristin Decker,et al.  Discrete Time Linear Systems Theory And Design With Applications , 2016 .

[22]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[23]  Bixiang Tang,et al.  New Approaches to Smart Grid Security with SCADA Systems , 2014 .

[24]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[25]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[26]  Luc Moreau,et al.  Stability of multiagent systems with time-dependent communication links , 2005, IEEE Transactions on Automatic Control.

[27]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.