Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario. Simulation results show the effectiveness of the proposed strategy both against Denial of Service and False Data Injection attacks.

[1]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using a moving target approach , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[2]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[3]  A. Kurzhanski,et al.  Ellipsoidal Calculus for Estimation and Control , 1996 .

[4]  P. Varaiya,et al.  Ellipsoidal Toolbox (ET) , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[5]  Franco Blanchini,et al.  Any domain of attraction for a linear constrained system is a tracking domain of attraction , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).

[6]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[7]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[8]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  D. Bertsekas,et al.  On the minimax reachability of target sets and target tubes , 1971 .

[10]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[11]  Manfred Morari,et al.  Multi-Parametric Toolbox 3.0 , 2013, 2013 European Control Conference (ECC).

[12]  Francesco Tedesco,et al.  Model predictive control for constrained networked systems subject to data losses , 2015, Autom..

[13]  Franco Blanchini,et al.  Set-theoretic methods in control , 2007 .

[14]  Edoardo Mosca,et al.  An ellipsoidal off-line MPC scheme for uncertain polytopic discrete-time systems , 2008, Autom..

[15]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[16]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.