Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models

This paper investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. The design of the observers is achieved by using a delay-dependent linear matrix inequality method. The performance of our model-based diagnostic scheme is tested on a class of adversarial scenarios based on a generalized fault/attack model. This model represents both classical sensor-actuator faults and communication network-induced deception attacks. Our particular focus is on stealthy deception attacks in which the attacker's goal is to pilfer water through canal offtakes. Our analysis reveals the benefits of accurate hydrodynamic models in detecting physical faults and cyber attacks to automated canal systems. We also comment on the criticality of sensor measurements for the purpose of detection. Finally, we discuss the knowledge and effort required for a successful deception attack.

[1]  Manuel Rijo,et al.  Supervision and Water Depth Automatic Control of an Irrigation Canal , 2010 .

[2]  Georges Bastin,et al.  Leak detection in open water channels , 2008 .

[3]  E. Weyer,et al.  Reconfiguration schemes to mitigate faults in automated irrigation channels , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[4]  D. Koenig,et al.  Unknown Input Observers Design for Time-Delay Systems Application to An Open-Channel , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[5]  Erik Weyer,et al.  Algorithms for leak detection, estimation, isolation and localization in open water channels☆ , 2011 .

[6]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[7]  Iven M. Y. Mareels,et al.  Control of Large-Scale Irrigation Networks , 2007, Proceedings of the IEEE.

[8]  Xavier Litrico,et al.  Static and Dynamic Data Reconciliation for an Irrigation Canal , 2008 .

[9]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[10]  Jonathan de Halleux,et al.  Boundary feedback control in networks of open channels , 2003, Autom..

[11]  Xavier Litrico,et al.  Automatic Tuning of PI Controllers for an Irrigation Canal Pool , 2007 .

[12]  A. Perdon,et al.  Unknown Input Observers and Residual Generators for Linear Time Delay Systems , 2006 .

[13]  M. Darouach,et al.  Full-order observers for linear systems with unknown inputs , 1994, IEEE Trans. Autom. Control..

[14]  P. Frank,et al.  Survey of robust residual generation and evaluation methods in observer-based fault detection systems , 1997 .

[15]  Herve Plusquellec,et al.  Modernization of large‐scale irrigation systems: is it an achievable objective or a lost cause , 2009 .

[16]  Jack K. Hale,et al.  Introduction to Functional Differential Equations , 1993, Applied Mathematical Sciences.

[17]  Xavier Litrico,et al.  Analytical approximation of open-channel flow for controller design , 2004 .

[18]  Xavier Litrico,et al.  Modeling and Control of Hydrosystems , 2009 .

[19]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[20]  Tong Heng Lee,et al.  A less conservative robust stability test for linear uncertain time-delay systems , 2006, IEEE Trans. Autom. Control..

[21]  Georges Bastin,et al.  Methods for the localization of a leak in open water channels , 2009, Networks Heterog. Media.

[22]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[23]  Ole Morten Aamo,et al.  OBSERVER DESIGN USING BOUNDARY INJECTIONS FOR PIPELINE MONITORING AND LEAK DETECTION , 2006 .

[24]  S. T. Buckland,et al.  An Introduction to the Bootstrap , 1994 .

[25]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[26]  X. Litrico,et al.  H∞ observer for time-delay systems Application to FDI for irrigation canals , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.