Attack detection in a cluster divided consensus network

We consider the problem of attack detection, isolation and counterattack in a network of agents. This particular network is divided into several smaller networks, which are disconnected from each other. The states continuously evolve following a linear consensus protocol and approach local agreements specific to each sub-network/cluster. So the agents are capable of achieving global consensus, at a given instant one agent from each sub-network, called leader, updates its state. Our objective here, to be more specific, is to develop a bank of unknown input observers (UIOs) such that each agent can monitor its own output link and detect if a neighbor is being attacked. Moreover, these observers should also be able to estimate the attack value and respond with a counter-attack to keep the global consensus from diverging too far from the expected global consensus value. We provide LMI sufficient conditions for the design of the bank of observers. Simulations are presented to illustrate our results.

[1]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[2]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[3]  Paulo Tabuada,et al.  An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[4]  Francesco Bullo,et al.  Secure control systems: a control-theoretic approach to cyber-physical security , 2012 .

[5]  Peng Ning,et al.  Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[6]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[7]  Jie Chen,et al.  Design of unknown input observers and robust fault detection filters , 1996 .

[8]  D. Kushner,et al.  The real story of stuxnet , 2013, IEEE Spectrum.

[9]  Jamal Daafouz,et al.  Reset strategy for consensus in networks of clusters , 2016, Autom..

[10]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[11]  Ping Zhang,et al.  Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).

[12]  Jamal Daafouz,et al.  LMI sufficient conditions for the consensus of linear agents with nearly-periodic resets , 2014, 2014 American Control Conference.

[13]  Marios M. Polycarpou,et al.  Distributed Sensor Fault Diagnosis for a Network of Interconnected Cyberphysical Systems , 2015, IEEE Transactions on Control of Network Systems.

[14]  Malka N. Halgamuge,et al.  Energy efficient cluster formation in wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[15]  Andre Teixeira,et al.  Toward Cyber-Secure and Resilient Networked Control Systems , 2014 .

[16]  Eugênio B. Castelan,et al.  Event-triggered tracking control of unicycle mobile robots , 2015, Autom..