The wireless control network: Monitoring for malicious behavior

We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear combination of the values in its neighborhood. In this paper, we design an Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes and uses that information to (a) recover the plant outputs (for data-logging and diagnostic purposes) and (b) identify malicious behavior by any of the wireless nodes in the network. We show that if the connectivity of the network is sufficiently high, the IDS only needs to observe a subset of the nodes in the network in order to achieve this objective. Our approach provides a characterization of the set of nodes that should be observed, a systematic procedure for the IDS to use to identify the malicious nodes and recover the outputs of the plant, and an upper bound on the delay required to obtain the necessary information.

[1]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[2]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.

[3]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[4]  Jacob van der Woude,et al.  A graph-theoretic characterization for the rank of the transfer matrix of a structured system , 1991, Math. Control. Signals Syst..

[5]  J. W. van deWoude A graph theoretic characterization for the rank of the transfer matrix of a structured system , 1988 .

[6]  Ulf Lindqvist,et al.  An intrusion detection system for wireless process control systems , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[7]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[8]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Stephen Northcutt,et al.  Network intrusion detection , 2003 .

[10]  W. Marsden I and J , 2012 .

[11]  Gabor Karsai,et al.  A testbed for secure and robust SCADA systems , 2008, SIGBED.

[12]  Shreyas Sundaram,et al.  The Wireless Control Network: Synthesis and robustness , 2010, 49th IEEE Conference on Decision and Control (CDC).

[13]  J. Massey,et al.  Invertibility of linear time-invariant dynamical systems , 1969 .

[14]  A. Willsky On the invertibility of linear systems , 1974 .

[15]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network , 2008, 2008 American Control Conference.

[16]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[17]  Richard M. Murray,et al.  Data Transmission Over Networks for Estimation and Control , 2009, IEEE Transactions on Automatic Control.

[18]  Shreyas Sundaram,et al.  Distributed function calculation and consensus using linear iterative strategies , 2008, IEEE Journal on Selected Areas in Communications.

[19]  Paul M. Frank,et al.  Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results , 1990, Autom..

[20]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[21]  Andrzej Pelc,et al.  Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..

[22]  Muriel Medard,et al.  Resilient Network Coding in the Presence of , 2007 .

[23]  D. West Introduction to Graph Theory , 1995 .

[24]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[25]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[26]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.