Detection of Man in the Middle Attacks in Model-Free Reinforcement Learning for the Linear Quadratic Regulator

被引:0
作者
Rani, Rishi [1 ]
Franceschetti, Massimo [2 ]
机构
[1] Univ Calif San Diego, Dept Elect & Comp Engn, La Jolla, CA 92093 USA
[2] Univ Calif San Diego, Fac Dept Elect & Comp Engn, La Jolla, CA USA
来源
2024 AMERICAN CONTROL CONFERENCE, ACC 2024 | 2024年
基金
美国国家科学基金会;
关键词
Cyber-physical systems; linear dynamical systems; secure control; system identification; manin-the-middle attack; physical-layer authentication; linear quadratic regulator; CONTROL-SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of a learning-based, man-in-the-middle (MITM) attack in a cyber-physical system. We use a simple abstraction where an agent performs linear quadratic regulation (LQR) of a discrete-time, linear, time-invariant (LTI) system with stochastic disturbances, using model-free reinforcement learning. The system may be subject to an adversarial attack that overrides the feedback signal and the controller actions. We propose a "Bellman Deviation" algorithm that can be used by the agent to detect the attack. This algorithm only requires an estimate of the Q-function, and optimal average stage cost, and no explicit information of the system parameters. We show that the proposed algorithm asymptotically guarantees attack detection (AD) with high probability while avoiding false alarms, when an "informational advantage" condition is met. This condition compares the amount of information the agent has aquired about the system with the one aquired by the adversary.
引用
收藏
页码:4038 / 4043
页数:6
相关论文
共 17 条
[1]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[2]  
Berkenkamp F, 2017, ADV NEUR IN, V30
[3]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[4]   Event-Triggered Control Systems Under Denial-of-Service Attacks [J].
Dolk, V. S. ;
Tesi, P. ;
De Persis, C. ;
Heemels, W. P. M. H. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :93-105
[5]   A General Safety Framework for Learning-Based Control in Uncertain Robotic Systems [J].
Fisac, Jaime F. ;
Akametalu, Anayo K. ;
Zeilinger, Melanie N. ;
Kaynama, Shahab ;
Gillula, Jeremy ;
Tomlin, Claire J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (07) :2737-2752
[6]  
Flamholz D., 2019, BAITING DEFENSE STEA
[7]   A Survey of Research on Cloud Robotics and Automation [J].
Kehoe, Ben ;
Patil, Sachin ;
Abbeel, Pieter ;
Goldberg, Ken .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2015, 12 (02) :398-409
[8]   Learning-Based Attacks in Cyber-Physical Systems [J].
Khojasteh, Mohammad Javad ;
Khina, Anatoly ;
Franceschetti, Massimo ;
Javidi, Tara .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2021, 8 (01) :437-449
[9]   PHYSICAL AUTHENTICATION OF CONTROL SYSTEMS DESIGNING WATERMARKED CONTROL INPUTS TO DETECT COUNTERFEIT SENSOR OUTPUTS [J].
Mo, Yilin ;
Weerakkody, Sean ;
Sinopoli, Bruno .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :93-109
[10]  
Rangi Anshuka., 2021, Learning for Dynamics and Control, P879