Communication Link Elimination in Static LQG Teams

We consider here a scenario in which a team of agents switch to a secure shared communication channel with limited bandwidth to prevent man-in-the-middle attacks. To deal with the limited bandwidth, the agents identify which communication links in the team can be eliminated without paying a high penalty in terms of the performance of the control task. We formulate this problem as an LQG team problem with communication link elimination. Using Schur Complement Eigenvalue Interlacing Property, we bound the achievable optimal cost for removing only one communication link within the team problem. Under certain assumptions on the eigenvalues of the cost and covariance matrices, we identify an (heuristic) index-based link elimination policy with some tight performance guarantees. We substantiate our bounds with numerical simulation on random instances of static team problems and identify interesting directions for future research.

[1]  Ronald L. Smith Some interlacing properties of the Schur complement of a Hermitian matrix , 1992 .

[2]  Bruno Sinopoli,et al.  Sensor selection strategies for state estimation in energy constrained wireless sensor networks , 2011, Autom..

[3]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[4]  Thomas Engel,et al.  A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[5]  Tamer Basar,et al.  One-stage control over an adversarial channel with finite codelength , 2011, IEEE Conference on Decision and Control and European Control Conference.

[6]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[7]  Christoph Schmittner,et al.  Standardization challenges for safety and security of connected, automated and intelligent vehicles , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).

[8]  Guosong Yang,et al.  Modeling and Mitigating the Coremelt Attack , 2018, 2018 Annual American Control Conference (ACC).

[9]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[10]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[11]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[12]  Paulo Tabuada,et al.  Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[13]  Andrew K. Wright,et al.  Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.

[14]  R. Radner,et al.  Team Decision Problems , 1962 .

[15]  Lei Fan,et al.  Classified security protection evaluation for vehicle information system , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[16]  Y. Ho,et al.  Team decision theory and information structures in optimal control problems--Part II , 1972 .

[17]  Daniel E. Quevedo,et al.  Encrypted Cooperative Control Based on Structured Feedback , 2019, IEEE Control Systems Letters.

[18]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[19]  Hiro Onishi,et al.  Approaches for vehicle cyber security , 2014, 2014 IEEE Conference on Communications and Network Security.

[20]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[21]  Alan J. Laub,et al.  Matrix analysis - for scientists and engineers , 2004 .

[22]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[23]  Tamer Basar,et al.  A dynamic transmitter-jammer game with asymmetric information , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[24]  Paulo Tabuada,et al.  Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).