On Single-Input Controllable Linear Systems Under Periodic DoS Jamming Attacks

In this paper, we study remotely-controlled single-input controllable linear systems, subject to periodic Denial-of-Service (DoS) attacks. We propose a control strategy which can beat any partially identified jammer by properly placing the closed-loop poles. This is proven theoretically for systems of dimension 4 or less. Nevertheless, simulations show the practicality of this strategy for systems up to order 5.

[1]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[2]  Paulo Tabuada,et al.  Event-Triggered Real-Time Scheduling of Stabilizing Control Tasks , 2007, IEEE Transactions on Automatic Control.

[3]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[4]  V. Faddeeva,et al.  Computational methods of linear algebra: : chapter 1, basic material from linear algebra , 1952 .

[5]  Ruggero Carli,et al.  Distributed Estimation and False Data Detection with Application to Power Networks , 2011, ArXiv.

[6]  Manuel Mazo,et al.  An ISS self-triggered implementation of linear controllers , 2009, Autom..

[7]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.

[8]  Sonia Martínez,et al.  Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[9]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[10]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[12]  D. Bernstein Matrix Mathematics: Theory, Facts, and Formulas , 2009 .

[13]  Alexandros G. Fragkiadakis,et al.  Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.

[14]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  D. Faddeev,et al.  Computational methods of linear algebra , 1981 .

[16]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[18]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[19]  S. Basu,et al.  Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics) , 2006 .

[20]  Sourabh Bhattacharya,et al.  Differential Game-Theoretic Approach to a Spatial Jamming Problem , 2013 .

[21]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[22]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[23]  Xiapu Luo,et al.  Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..

[24]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[25]  Xiapu Luo,et al.  On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.

[26]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[27]  C. Loan The Sensitivity of the Matrix Exponential , 1977 .

[28]  Sonia Martínez,et al.  On distributed constrained formation control in operator-vehicle adversarial networks , 2013, Autom..

[29]  Patrick Tague,et al.  Digital Filter Design for Jamming Mitigation in 802.15.4 Communication , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[30]  Aloysius K. Mok Position Paper for Workshop on Future Directions in Cyber-physical Systems Security , 2009 .

[31]  Xiaofeng Wang,et al.  Self-Triggered Feedback Control Systems With Finite-Gain ${\cal L}_{2}$ Stability , 2009, IEEE Transactions on Automatic Control.