Observability-based secure state encryption design for cyberphysical systems

While the area of cryptography has progressed considerably over the last few decades, its applications to networked dynamical systems are only being considered recently. In this paper, we view the encryption problem for cyberphysical systems through the lens of modern control theory. Specifically, an encryption-like algorithm is proposed for a general nonlinear dynamical system by exploiting the observability property of dynamical systems. The proposed encryption design is applied to augment the security of a recently developed signal authentication mechanism in networked multi-agent systems. The effectiveness of proposed method is studied through numerical simulations.

[1]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[2]  Arthur J. Krener,et al.  Measures of unobservability , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[3]  Paul F. Syverson,et al.  Hiding Routing Information , 1996, Information Hiding.

[4]  Karl Henrik Johansson,et al.  Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .

[5]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[6]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[8]  George J. Pappas,et al.  State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.

[9]  Liang Xu,et al.  A quantitative measure of observability and controllability , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[10]  Anthony M. Bloch,et al.  Nonlinear Dynamical Control Systems (H. Nijmeijer and A. J. van der Schaft) , 1991, SIAM Review.

[11]  B. Tibken,et al.  Observability of nonlinear systems - an algebraic approach , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[12]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[13]  W. Kang,et al.  Computational Analysis of Control Systems Using Dynamic Optimization , 2009, 0906.0215.

[14]  Nikhil Chopra,et al.  Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics. , 2016, Chaos.

[15]  W. Kang,et al.  Observability for optimal sensor locations in data assimilation , 2015 .

[16]  Nikhil Chopra,et al.  On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).

[17]  A. Krener,et al.  Nonlinear controllability and observability , 1977 .

[18]  Sonia Martínez,et al.  On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[19]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[20]  Saurabh Amin,et al.  In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.

[21]  Jorge Nocedal,et al.  Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.