Abstract
We address the problem of security of cyber-physical systems where some sensors may be malicious. We consider a multiple-input, multiple-output stochastic linear dynamical system controlled over a network of communication and computational nodes which contains (i) a controller that computes the inputs to be applied to the physical plant, (ii) actuators that apply these inputs to the plant, and (iii) sensors which measure the outputs of the plant. Some of these sensors, however, may be malicious. The malicious sensors do not report the true measurements to the controller. Rather, they report false measurements that they fabricate, possibly strategically, so as to achieve any objective that they may have, such as destabilizing the closed-loop system or increasing its running cost. Recently, it was shown that under certain conditions, an approach of “dynamic watermarking” can secure such a stochastic linear dynamical system in the sense that either the presence of malicious sensors in the system is detected, or the malicious sensors are constrained to adding a distortion that can only be of zero power to the noise already entering the system. The first contribution of this paper is to generalize this result to partially observed MIMO systems with both process and observation noises, a model which encompasses some of the previous models for which dynamic watermarking was established to guarantee security. This result, similar to the prior ones, is shown to hold when the controller subjects the reported sequence of measurements to two particular tests of veracity. The second contribution of this paper is in showing, via counterexamples, that both of these tests are needed in order to secure the control system in the sense that if any one of these two tests of sensor veracity is dropped, then the above guarantee does not hold. Finally, a survey of recent results in Dynamic Watermarking is presented, along with a laboratory demonstration in securing a prototypical intelligent transportation system. The proposed approach has several potential applications, including in smart grids, automated transportation, and process control.
This material is based upon work partially supported by NSF under Contract Nos. ECCS-1547075, CNS-1646449, CCF-1619085 and Science & Technology Center Grant CCF-0939370, the U.S. Army Research Office under Contract No. W911NF-15-1-0279, and NPRP grant NPRP 8-1531-2-651 from the Qatar National Research Fund, a member of Qatar Foundation.
P.R. Kumar—Fellow, IEEE.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)
Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, September 2009
Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-Physical Systems Security (2009)
Abrams, M.: Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, Australia (2008)
Satchidanandan, B., Kumar, P.R.: Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)
Ponniah, J., Hu, Y.-C., Kumar, P.R.: A clean slate approach to secure wireless networking. Found. Trends Netw. 9(1), 1–105 (2014). doi:10.1561/1300000037
Hou, I.-H., Borkar, V., Kumar, P.R.: A theory of QoS for wireless. In: IEEE INFOCOM. IEEE (2009)
Satchidanandan, B., Kumar, P.R.: On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems. In: 9th International Conference on Communication Systems and Networks (COMSNETS) (2017, to appear)
Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: The 28th International Conference on Distributed Computing Systems Workshops. IEEE (2008)
Cardenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems (2008)
Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31–45. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00602-9_3
Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton (2004)
Sou, K.C., Sandberg, H., Johansson, K.H.: Data attack isolation in power networks using secure voltage magnitude measurements. IEEE Trans. Smart Grid 5(1), 14–28 (2014)
Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems (SCS), Stockholm (2010)
Hendrickx, J.M., Johansson, K.H., Jungers, R.M., Sandberg, H., Sou, K.C.: Efficient computations of a security index for false data attacks in power networks. IEEE Trans. Autom. Control 59(12), 3194–3208 (2014)
Guo, Z., Johansson, K.H., Shi, L.: A study of packet-reordering integrity attack on remote state estimation. In: 2016 35th Chinese Control Conference (CCC), pp. 7250–7255, July 2016
Guo, Z., Shi, D., Johansson, K.H., Shi, L.: Optimal linear cyber-attack on remote state estimation
Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)
Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)
Fawzi, H., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE (2011)
Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)
Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: Revealing stealthy attacks in control systems. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1806–1813, October 2012
Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SHIELD: a data verification framework for participatory sensing systems. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. ACM, New York (2015). http://doi.acm.org/10.1145/2766498.2766503
Weerakkody, S., Mo, Y., Sinopoli, B.: Detecting integrity attacks on control systems using robust physical watermarking. In: 53rd IEEE Conference on Decision and Control, pp. 3757–3764, December 2014
Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)
Satchidanandan, B., Kumar, P.R.: Secure control of networked cyber-physical systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 283–289, December 2016
Kumar, P.R., Varaiya, P.: Stochastic Systems: Estimation, Identification and Adaptive Control. SIAM Classics in Applied Mathematics. SIAM, Philadelphia (2015)
Lai, T.L., Wei, C.Z.: Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. In: The Annals of Statistics, pp. 154–166 (1982)
Kailath, T.: The innovations approach to detection and estimation theory. Proc. IEEE 58(5), 680–695 (1970)
Ko, W.-H., Satchidanandan, B., Kumar, P.R.: Theory and application of dynamic watermarking for cybersecurity of advanced transportation systems. In: International Workshop on Cyber-Physical Systems Security (to appear)
Robinson, C.L., Schutz, H.-J., Baliga, G., Kumar, P.: Architecture and algorithm for a laboratory vehicle collision avoidance system. In: IEEE 22nd International Symposium on Intelligent Control, vol. 2007, pp. 23–28. IEEE (2007)
Secure control of an intelligent transportation system. https://youtu.be/qMSakEtkk_0
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Satchidanandan, B., Kumar, P.R. (2017). Defending Cyber-Physical Systems from Sensor Attacks. In: Sastry, N., Chakraborty, S. (eds) Communication Systems and Networks. COMSNETS 2017. Lecture Notes in Computer Science(), vol 10340. Springer, Cham. https://doi.org/10.1007/978-3-319-67235-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-67235-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67234-2
Online ISBN: 978-3-319-67235-9
eBook Packages: Computer ScienceComputer Science (R0)