Sensor Switching Control Under Attacks Detectable by Finite Sample Dynamic Watermarking Tests

Control system security is enhanced by the ability to detect malicious attacks on sensor measurements. Dynamic watermarking can detect such attacks on linear time-invariant (LTI) systems. However, existing theory focuses on attack detection and not on the use of watermarking in conjunction with attack mitigation strategies. In this paper, we study the problem of switching between two sets of sensors: One set of sensors has high accuracy but is vulnerable to attack, while the second set of sensors has low accuracy but cannot be attacked. The problem is to design a sensor switching strategy based on attack detection by dynamic watermarking. This requires new theory because existing results are not adequate to control or bound the behavior of sensor switching strategies that use finite data. To overcome this, we develop new finite sample hypothesis tests for dynamic watermarking in the case of bounded disturbances, using the modern theory of concentration of measure for random matrices. Our resulting switching strategy is validated with a simulation analysis in an autonomous driving setting, which demonstrates the strong performance of our proposed policy.

[1]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[2]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[3]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[4]  H. E. Tseng,et al.  Linear model predictive control for lane keeping and obstacle avoidance on low curvature roads , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).

[5]  Panganamala Ramana Kumar,et al.  Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[6]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[7]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[8]  R. Bhatia Matrix Analysis , 1996 .

[9]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[10]  G. Como,et al.  Convexity and Robustness of Dynamic Network Traffic Assignment for Control of Freeway Networks , 2016 .

[11]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[12]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[13]  C. Stein A bound for the error in the normal approximation to the distribution of a sum of dependent random variables , 1972 .

[14]  Panganamala Ramana Kumar,et al.  On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[15]  Michael I. Jordan,et al.  Matrix concentration inequalities via the method of exchangeable pairs , 2012, 1201.6002.

[16]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[17]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[18]  Shankar Mohan,et al.  Convex computation of the reachable set for hybrid systems with parametric uncertainty , 2016, 2016 American Control Conference (ACC).

[19]  Jakub Bernat,et al.  Multi-modelling as new estimation schema for high-gain observers , 2015, Int. J. Control.

[20]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[21]  Thomas Parisini,et al.  Distributed watermarking for secure control of microgrids under replay attacks , 2018, ArXiv.

[22]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[23]  E. Polak,et al.  On the Perpetual Collision-Free RHC of Fleets of Vehicles , 2010 .

[24]  Ruzena Bajcsy,et al.  Safe semi-autonomous control with enhanced driver modeling , 2012, 2012 American Control Conference (ACC).

[25]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[26]  Shreyas Sundaram,et al.  Distributed Observers for LTI Systems , 2016, IEEE Transactions on Automatic Control.

[27]  Claire Tomlin,et al.  Game-theoretic routing of GPS-assisted vehicles for energy efficiency , 2011, Proceedings of the 2011 American Control Conference.

[28]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[29]  Maryam Kamgarpour,et al.  A Hierarchical Flight Planning Framework for Air Traffic Management , 2012, Proceedings of the IEEE.

[30]  Ram Vasudevan,et al.  Statistical Watermarking for Networked Control Systems , 2017, 2018 Annual American Control Conference (ACC).

[31]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[32]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[33]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[34]  Ram Vasudevan,et al.  Dynamic watermarking for general LTI systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[35]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.

[36]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[37]  Shreyas Sundaram,et al.  Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[38]  Jaideep Srivastava,et al.  Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .