Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

被引:944
作者
Fawzi, Hamza [1 ]
Tabuada, Paulo [2 ]
Diggavi, Suhas [2 ]
机构
[1] MIT, Informat & Decis Syst Lab, Dept Elect Engn & Comp Sci, Cambridge, MA 02139 USA
[2] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
基金
美国国家科学基金会;
关键词
Algorithm; feedback controller;
D O I
10.1109/TAC.2014.2303233
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. We give a new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A, C) of the system and we show in particular that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked. In addition, we show how the design of a secure local control loop can improve the resilience of the system. When the number of attacks is smaller than a threshold, we propose an efficient algorithm inspired from techniques in compressed sensing to estimate the state of the plant despite attacks. We give a theoretical characterization of the performance of this algorithm and we show on numerical simulations that the method is promising and allows to reconstruct the state accurately despite attacks. Finally, we consider the problem of designing output-feedback controllers that stabilize the system despite sensor attacks. We show that a principle of separation between estimation and control holds and that the design of resilient output feedback controllers can be reduced to the design of resilient state estimators.
引用
收藏
页码:1454 / 1467
页数:14
相关论文
共 30 条
[1]  
Adam N., 2010, WORKSH FUT DIR CYB P
[2]  
[Anonymous], 2000, POWER SYSTEMS TEST C
[3]  
[Anonymous], 2009, WORKSH FUT DIR CYB P
[4]  
[Anonymous], 2007, CRITICAL INFRASTRUCT
[5]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[6]  
Blanke M., 2006, Diagnosis and fault-tolerant control
[7]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[8]  
Davenport MarkA., 2011, Preprint, V93, P1
[9]   Generic properties and control of linear structured systems: a survey [J].
Dion, JM ;
Commault, C ;
van der Woude, J .
AUTOMATICA, 2003, 39 (07) :1125-1144
[10]   BLOCK-SPARSITY: COHERENCE AND EFFICIENT RECOVERY [J].
Eldar, Yonina C. ;
Boelcskei, Helmut .
2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, :2885-+