Dual rate control for security in cyber-physical systems

We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop. We precisely characterize the role of the unstable poles and zeros of the system in the ability to detect stealthy attacks in the context of the sampled data implementation of the controller in feedback with the continuous (physical) plant. We show that, if there is a single sensor that is guaranteed to be secure and the plant is observable from that sensor, then there exist a class of multirate sampled data controllers that ensure that all attacks remain detectable. These dual rate controllers are sampling the output faster than the zero order hold rate that operates on the control input and as such, they can even provide better nominal performance than single rate, at the price of higher sampling of the continuous output.

[1]  Karl Henrik Johansson,et al.  The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..

[2]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Li Qiu,et al.  H∞ design of general multirate sampled-data control systems , 1994, Autom..

[4]  B. Francis,et al.  Stability Theory for Linear Time-Invariant Plants with Periodic Digital Controllers , 1988, 1988 American Control Conference.

[5]  Patrizio Colaneri,et al.  Stabilization of multirate sampled-data linear systems , 1990, Autom..

[6]  Petros G. Voulgaris,et al.  Control of asynchronous sampled data systems , 1994, IEEE Trans. Autom. Control..

[7]  P. Kabamba Control of Linear Systems Using Generalized Sampled-Data Hold Functions , 1987, 1987 American Control Conference.

[8]  D. G. Meyer A parametrization of stabilizing controllers for multirate sampled-data systems , 1990 .

[9]  Munther A. Dahleh,et al.  H∞ and H2 optimal controllers for periodic and multirate systems , 1994, Autom..

[10]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[11]  Li Qiu,et al.  𝓗2-optimal Design of Multirate Sampled-data Systems , 1994, IEEE Trans. Autom. Control..

[12]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[13]  Bruce A. Francis,et al.  Optimal Sampled-Data Control Systems , 1996, Communications and Control Engineering Series.

[14]  Richard H. Middleton,et al.  Robustness of zero shifting via generalized sampled-data hold functions , 1997, IEEE Trans. Autom. Control..

[15]  Hannu T. Toivonen,et al.  H∞ and LQG control of asynchronous sampled-data systems , 1997, Autom..

[16]  Tomomichi Hagiwara,et al.  Design of a stable state feedback controller based on the multirate sampling of the plant output , 1988 .

[17]  Petros G. Voulgaris,et al.  Optimal H ∞ and H 2 control of hybrid multirate systems , 1993 .

[18]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[19]  Geir E. Dullerud Control of Uncertain Sampled-Data Systems , 1995 .

[20]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[21]  M. Dahleh,et al.  Control of Uncertain Systems: A Linear Programming Approach , 1995 .

[22]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[23]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[24]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[25]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[26]  C. Nett,et al.  Controller parametrization for time-varying multirate plants , 1990 .

[27]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).