Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Joint controller and detector design against data injection attacks on actuators
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Signals and Systems.
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Signals and Systems.ORCID iD: 0000-0001-5491-4068
2020 (English)In: IFAC PapersOnline, Elsevier BV , 2020, Vol. 53, no 2, p. 7439-7445Conference paper, Published paper (Refereed)
Abstract [en]

This paper addresses the issue of data injection attacks on actuators in control systems. Considering attacks that aim at maximizing impact while remaining undetected, the paper revisits the recently proposed output-to-output gain, which is compared to classical sensitivity metrics such as H-infinity and H_. In its original formulation, the output-to-output gain is unbounded for strictly proper systems. This limitation is further investigated and addressed by modifying the performance output of the system and ensuring that the system from attack signal to performance output is also strictly proper. With this system description, and by using the theory of dissipative systems, a Bi-linear Matrix Inequality (BMI) is formulated for system design. Using this BMI, a design algorithm is proposed based on the heuristic of alternating minimization. Through numerical simulations of the proposed algorithm, it is found that the output-to-output gain presents advantages over the other metrics: the effect of the attack is reduced in the performance output and increased in the detection output in a relatively large spectrum of frequencies.

Place, publisher, year, edition, pages
Elsevier BV , 2020. Vol. 53, no 2, p. 7439-7445
Keywords [en]
System security, Quadratic performance indices, Fault detection, H-infinity control, Optimization
National Category
Control Engineering Signal Processing
Identifiers
URN: urn:nbn:se:uu:diva-447676DOI: 10.1016/j.ifacol.2020.12.1291ISI: 000652593000483OAI: oai:DiVA.org:uu-447676DiVA, id: diva2:1575120
Conference
21st IFAC World Congress on Automatic Control - Meeting Societal Challenges, JUL 11-17, 2020, ELECTR NETWORK
Funder
Swedish Research Council, 2018-04396Available from: 2021-06-29 Created: 2021-06-29 Last updated: 2024-04-07Bibliographically approved
In thesis
1. Risk-Based Analysis and Design of Secure Control Systems
Open this publication in new window or tab >>Risk-Based Analysis and Design of Secure Control Systems
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Networked Control Systems (NCSs) are integral to many critical infrastructures such as power grids, transportation, and production systems. The resilient operation of such NCS against cyber-attacks is essential for society, and risk management presents an effective framework for addressing these security challenges. The risk management framework encompasses two steps: risk assessment and risk mitigation. The risk assessment step aims to quantify the risk, whereas the risk mitigation step focuses on designing mitigation strategies. This thesis leverages the risk management framework to analyze and design NCSs that are resilient to cyber-attacks. In particular, this thesis aims to address the following research challenges. 

Firstly, we aim to assess the risk of attack scenarios that are realistic (risk assessment step). In particular, we consider adversaries and operators with different levels of knowledge about the NCS. For instance, an adversary or operator may possess complete knowledge of the system dynamics or have only partial knowledge with varying degrees of uncertainty. Hence, we describe a systematic approach to assess the risk considering the interplay between the knowledge levels of adversaries and operators.

Secondly, we aim to design the NCS to minimize the risk of attacks (risk mitigation step). We explore three different strategies to minimize the risk: (a) controller/detector design, (b) security measure allocation, and (c) system architecture design. In the first strategy, we design the controller and detector gains to minimize the risk of attacks. Here, risk is characterized by the performance loss caused by stealthy attacks on the NCS. In the second strategy, we consider a distributed NCS where certain distributed devices can be secured from attacks by deploying secure sensors and actuators. Then, we aim to strategically determine the devices to secure and mitigate the risk of attacks effectively. Finally, inspired by digital watermarking, we explore the idea of introducing watermarks in NCS to detect attacks efficiently. Throughout the thesis, we provide various numerical examples to depict the efficacy of risk assessment and risk mitigation algorithms. We also provide numerous discussions and avenues for future research directions.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2024. p. 83
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 2391
Keywords
Cyber-Security, Cyber-Attacks, Cyber-Physical Systems, Risk Management, Risk Metrics, Impact Metrics, Networked Control Systems, Privacy, Controller Design, Robust Control
National Category
Control Engineering
Research subject
Electrical Engineering with specialization in Automatic Control
Identifiers
urn:nbn:se:uu:diva-525726 (URN)978-91-513-2101-1 (ISBN)
Public defence
2024-05-30, Häggsalen, Ångströmslaboratoriet, Lägerhyddsvägen 1, Uppsala, 09:00 (English)
Opponent
Supervisors
Funder
Swedish Foundation for Strategic ResearchSwedish Research Council, 2018-04396
Available from: 2024-05-02 Created: 2024-04-07 Last updated: 2024-05-02

Open Access in DiVA

fulltext(533 kB)162 downloads
File information
File name FULLTEXT01.pdfFile size 533 kBChecksum SHA-512
ae2ca8ae20cc111b9c051e0934d6456e721363e96e2bdcb2ed08c8fdbbb07d1c04e13a981662727786a651f9c24ec24ffca971b46bed1dc614799903542fc240
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records

Coimbatore Anand, SribalajiTeixeira, André M. H.

Search in DiVA

By author/editor
Coimbatore Anand, SribalajiTeixeira, André M. H.
By organisation
Signals and Systems
Control EngineeringSignal Processing

Search outside of DiVA

GoogleGoogle Scholar
Total: 164 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 519 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf