Professional Documents
Culture Documents
Outline.
Our Results/Contribution.
Taxonomy of attacks to control systems.
Secure control problem under DoS attacks.
Outline
Our Results/Contribution.
Taxonomy of attacks to control systems.
Secure control problem under DoS attacks.
Sensors
Actuators s1
a1 Physical
s2
System
a2 a3 s3
s4
Network
c1 c2 c3
Distributed Controllers
Outline
Our Results/Contribution.
Taxonomy of attacks to control systems.
Secure control problem under DoS attacks.
Research challenges.
◮ Investigate realistic models of attacks to control systems
from the "systems viewpoint".
◮ Understand the consequences of an attack: How can the
adversary select an attack strategy after obtaining
unauthorized access to some control system components?
◮ Design attack-detection algorithms: Based on
measurements, how to identify if attacker is tampering with
control and/or sensor data?
◮ Design attack-resilient algorithms and architectures:
After detecting an attack, how to change state estimates
and control commands to improve system’s resiliency?
Outline
Our Results/Contribution.
Taxonomy of attacks to control systems.
Secure control problem under DoS attacks.
Example cases
Canal control linear PDE safety, perf. max. DoS, demand fluctuation
A5 A1
A4 Physical ỹ
System
A3 A2
ũ Controller
A1 & A3: integrity attacks; A2 & A4: DoS attacks; A5: Physical attack.
95 2640 10 0
0 10 20 30 40 50 0 10 20 30 40 50 0 10 20 30 40 50 0 10 20 30 40 50
Time [h] Time [h] Time [h] Time [h]
Product Rate [kmol/h] Pressure [kPa] operation cost [$/kmol product] Manipulated Variables [%]
120 3050 80
compromised feed1 valve
110 3000 signal 24.2 feed2 valve
70
real signal purge valve
24
100 2950
23.8 60
90 2900
23.6
80 2850 50
23.4
70 2800
23.2 40
60 2750
compromised 23
signal 30
50 2700 22.8
real signal
40 2650 22.6 20
0 5 10 15 0 5 10 15 0 5 10 15 0 5 10 15
Time [h] Time [h] Time [h] Time [h]
Outline
Our Results/Contribution.
Taxonomy of attacks to control systems.
Secure control problem under DoS attacks.
Availability
The ability of a control system of being accessible and usable
upon demand; lack of availability results in DoS of sensor and
control data.
xk +1 = Axk + Buka + wk k = 0, . . . , N − 1,
uka = νk uk νk ∈ {0, 1},
xka = γ k xk γk ∈ {0, 1},
to minimize
N−1
X ⊤
xk xk
JN (x̄, P0 , u0N−1 )
N−1
= E xN⊤ Q xx xN + Q u0 , x̄, P0
νk uk νk uk
k =0
Attack models.
Random adversary
Theorem
The solution to the secure control problem for the
(γ0N−1 , ν0N−1 ) ∈ ABer(γ̄,ν̄) attack model using the affine
error-feedback parameterization
k
X
uk = uk◦ + γj Mk ,j (xj − x̂j|j−1 ), k = 0, . . . , N − 1
j=0
⊤ xx ∗ ⊤ ⊤ uu −1 ⊤
Sk = A Sk +1 A + Q − νk +1 A Sk +1 B(B Sk +1 B + Q ) B Sk +1 A
⊤ xx
ck = Tr{(A Sk +1 A + Q − Sk )Σk |k } + Tr(Sk +1 Q) + ck +1
k −1
kX k
k k⊤ i i⊤
Y Y
Σk |k = (1 − γj )A P0 A + (1 − γj )A QA .
j=0 i=0 j=(k −i)