Mitigation of sensor attacks on legacy industrial control systems

Nowadays control systems have a communication infrastructure that enables sensors, actuators, and controllers proper operation. Industrial control systems include diverse technologies composed by novel devices and legacy systems together. Because most of contemporary industrial control systems were designed and put into operation many years ago with little or no consideration of security issues, which emerged from the capabilities of interconnection available these days. Communication infrastructure opens up a backdoor to cyber-attacks on control systems. In this brief, we show how concepts from fault tolerant control can be utilized to mitigate the effect of cyber-attacks on sensors. This paper analyzes how Luenberger Observers (LOs) and Unknown Input Observers (UIOs), two of the traditional tools of Fault Detection and Isolation, can be utilized to detect and isolate attacks on legacy industrial control systems. We show how the simultaneous use of LOs and UIOs can help to compute the malicious injected signal (attack) and the sensor where it happens, in a better way than when only UIOs are used. In addition, the computation of the required modification of the control action (reconfiguration) is exposed. This reconfiguration has as purpose to mitigate the effect of the attack on the control system. A numerical example shows the implementation of the proposed procedure, and the comparison of the effect on the behavior of the control system, with and without reconfiguration, in the presence of attacks is also shown. Finally, some conclusions are exposed, and some open problems are outlined.

[1]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[2]  Mustapha Ouladsine,et al.  An actuator fault detection, isolation and estimation system for an UAV using input observers , 2007, 2007 European Control Conference (ECC).

[3]  Thomas Steffen,et al.  Control Reconfiguration of Dynamical Systems: Linear Approaches and Structural Tests , 2005 .

[4]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[5]  Nicanor Quijano,et al.  Response and reconfiguration of cyber-physical control systems: A survey , 2015, 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC).

[6]  Semyon M. Meerkov,et al.  Resilient plant monitoring systems: Techniques, analysis, design, and performance evaluation , 2015 .

[7]  Youmin Zhang,et al.  Bibliographical review on reconfigurable fault-tolerant control systems , 2003, Annu. Rev. Control..

[8]  Jie Chen,et al.  Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.

[9]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[10]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[11]  Panganamala Ramana Kumar,et al.  Secure control of networked cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.