Skip to main content

Defending Cyber-Physical Systems from Sensor Attacks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10340))

Abstract

We address the problem of security of cyber-physical systems where some sensors may be malicious. We consider a multiple-input, multiple-output stochastic linear dynamical system controlled over a network of communication and computational nodes which contains (i) a controller that computes the inputs to be applied to the physical plant, (ii) actuators that apply these inputs to the plant, and (iii) sensors which measure the outputs of the plant. Some of these sensors, however, may be malicious. The malicious sensors do not report the true measurements to the controller. Rather, they report false measurements that they fabricate, possibly strategically, so as to achieve any objective that they may have, such as destabilizing the closed-loop system or increasing its running cost. Recently, it was shown that under certain conditions, an approach of “dynamic watermarking” can secure such a stochastic linear dynamical system in the sense that either the presence of malicious sensors in the system is detected, or the malicious sensors are constrained to adding a distortion that can only be of zero power to the noise already entering the system. The first contribution of this paper is to generalize this result to partially observed MIMO systems with both process and observation noises, a model which encompasses some of the previous models for which dynamic watermarking was established to guarantee security. This result, similar to the prior ones, is shown to hold when the controller subjects the reported sequence of measurements to two particular tests of veracity. The second contribution of this paper is in showing, via counterexamples, that both of these tests are needed in order to secure the control system in the sense that if any one of these two tests of sensor veracity is dropped, then the above guarantee does not hold. Finally, a survey of recent results in Dynamic Watermarking is presented, along with a laboratory demonstration in securing a prototypical intelligent transportation system. The proposed approach has several potential applications, including in smart grids, automated transportation, and process control.

This material is based upon work partially supported by NSF under Contract Nos. ECCS-1547075, CNS-1646449, CCF-1619085 and Science & Technology Center Grant CCF-0939370, the U.S. Army Research Office under Contract No. W911NF-15-1-0279, and NPRP grant NPRP 8-1531-2-651 from the Qatar National Research Fund, a member of Qatar Foundation.

P.R. Kumar—Fellow, IEEE.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Article  Google Scholar 

  2. Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, September 2009

    Google Scholar 

  3. Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)

    Article  Google Scholar 

  4. Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-Physical Systems Security (2009)

    Google Scholar 

  5. Abrams, M.: Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services, Australia (2008)

    Google Scholar 

  6. Satchidanandan, B., Kumar, P.R.: Dynamic watermarking: active defense of networked cyber-physical systems. Proc. IEEE 105(2), 219–240 (2017)

    Article  Google Scholar 

  7. Ponniah, J., Hu, Y.-C., Kumar, P.R.: A clean slate approach to secure wireless networking. Found. Trends Netw. 9(1), 1–105 (2014). doi:10.1561/1300000037

    Article  MATH  Google Scholar 

  8. Hou, I.-H., Borkar, V., Kumar, P.R.: A theory of QoS for wireless. In: IEEE INFOCOM. IEEE (2009)

    Google Scholar 

  9. Satchidanandan, B., Kumar, P.R.: On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems. In: 9th International Conference on Communication Systems and Networks (COMSNETS) (2017, to appear)

    Google Scholar 

  10. Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: The 28th International Conference on Distributed Computing Systems Workshops. IEEE (2008)

    Google Scholar 

  11. Cardenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems (2008)

    Google Scholar 

  12. Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31–45. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00602-9_3

    Chapter  Google Scholar 

  13. Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton (2004)

    Book  Google Scholar 

  14. Sou, K.C., Sandberg, H., Johansson, K.H.: Data attack isolation in power networks using secure voltage magnitude measurements. IEEE Trans. Smart Grid 5(1), 14–28 (2014)

    Article  Google Scholar 

  15. Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems (SCS), Stockholm (2010)

    Google Scholar 

  16. Hendrickx, J.M., Johansson, K.H., Jungers, R.M., Sandberg, H., Sou, K.C.: Efficient computations of a security index for false data attacks in power networks. IEEE Trans. Autom. Control 59(12), 3194–3208 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  17. Guo, Z., Johansson, K.H., Shi, L.: A study of packet-reordering integrity attack on remote state estimation. In: 2016 35th Chinese Control Conference (CCC), pp. 7250–7255, July 2016

    Google Scholar 

  18. Guo, Z., Shi, D., Johansson, K.H., Shi, L.: Optimal linear cyber-attack on remote state estimation

    Google Scholar 

  19. Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  20. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Fawzi, H., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE (2011)

    Google Scholar 

  22. Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  23. Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: Revealing stealthy attacks in control systems. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1806–1813, October 2012

    Google Scholar 

  24. Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SHIELD: a data verification framework for participatory sensing systems. In: Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. ACM, New York (2015). http://doi.acm.org/10.1145/2766498.2766503

  25. Weerakkody, S., Mo, Y., Sinopoli, B.: Detecting integrity attacks on control systems using robust physical watermarking. In: 53rd IEEE Conference on Decision and Control, pp. 3757–3764, December 2014

    Google Scholar 

  26. Mo, Y., Weerakkody, S., Sinopoli, B.: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015)

    Article  MathSciNet  Google Scholar 

  27. Satchidanandan, B., Kumar, P.R.: Secure control of networked cyber-physical systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 283–289, December 2016

    Google Scholar 

  28. Kumar, P.R., Varaiya, P.: Stochastic Systems: Estimation, Identification and Adaptive Control. SIAM Classics in Applied Mathematics. SIAM, Philadelphia (2015)

    Book  MATH  Google Scholar 

  29. Lai, T.L., Wei, C.Z.: Least squares estimates in stochastic regression models with applications to identification and control of dynamic systems. In: The Annals of Statistics, pp. 154–166 (1982)

    Google Scholar 

  30. Kailath, T.: The innovations approach to detection and estimation theory. Proc. IEEE 58(5), 680–695 (1970)

    Article  MathSciNet  Google Scholar 

  31. Ko, W.-H., Satchidanandan, B., Kumar, P.R.: Theory and application of dynamic watermarking for cybersecurity of advanced transportation systems. In: International Workshop on Cyber-Physical Systems Security (to appear)

    Google Scholar 

  32. Robinson, C.L., Schutz, H.-J., Baliga, G., Kumar, P.: Architecture and algorithm for a laboratory vehicle collision avoidance system. In: IEEE 22nd International Symposium on Intelligent Control, vol. 2007, pp. 23–28. IEEE (2007)

    Google Scholar 

  33. Secure control of an intelligent transportation system. https://youtu.be/qMSakEtkk_0

Download references

Acknowledgments

The laboratory demonstration of Dynamic Watermarking, summarized in Sect. 6.2, is from [31].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharadwaj Satchidanandan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Satchidanandan, B., Kumar, P.R. (2017). Defending Cyber-Physical Systems from Sensor Attacks. In: Sastry, N., Chakraborty, S. (eds) Communication Systems and Networks. COMSNETS 2017. Lecture Notes in Computer Science(), vol 10340. Springer, Cham. https://doi.org/10.1007/978-3-319-67235-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67235-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67234-2

  • Online ISBN: 978-3-319-67235-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics