Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy and Security in Network Controlled Systems via Dynamic Masking
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Systems and Control. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Automatic control.ORCID iD: 0000-0001-5474-7060
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Signals and Systems.ORCID iD: 0000-0002-9948-4118
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Division of Systems and Control. Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Electrical Engineering, Signals and Systems. Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Automatic control.ORCID iD: 0000-0001-5491-4068
2023 (English)In: IFAC-PapersOnLine, E-ISSN 2405-8963, Vol. 56, no 2, p. 991-996Article in journal (Refereed) Published
Abstract [en]

In this paper, we propose a new architecture to enhance the privacy and security of networked control systems against malicious adversaries. We consider an adversary which first learns the system using system identification techniques (privacy), and then performs a data injection attack (security). In particular, we consider an adversary conducting zero-dynamics attacks (ZDA) which maximizes the performance cost of the system whilst staying undetected. Using the proposed architecture, we show that it is possible to (i) introduce significant bias in the system estimates obtained by the adversary: thus providing privacy, and (ii) efficiently detect attacks when the adversary performs a ZDA using the identified system: thus providing security. Through numerical simulations, we illustrate the efficacy of the proposed architecture

Place, publisher, year, edition, pages
Elsevier, 2023. Vol. 56, no 2, p. 991-996
Keywords [en]
Networked systems, Secure networked control systems, Linear systems, Privacy
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:uu:diva-525721DOI: 10.1016/j.ifacol.2023.10.1694ISI: 001196708400157OAI: oai:DiVA.org:uu-525721DiVA, id: diva2:1847310
Conference
22nd IFAC World Congress, Yokohama, Japan, July 9-14, 2023
Funder
Swedish Research Council, 2018-04396Swedish Foundation for Strategic ResearchAvailable from: 2024-03-27 Created: 2024-03-27 Last updated: 2024-04-18Bibliographically approved
In thesis
1. Risk-Based Analysis and Design of Secure Control Systems
Open this publication in new window or tab >>Risk-Based Analysis and Design of Secure Control Systems
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Networked Control Systems (NCSs) are integral to many critical infrastructures such as power grids, transportation, and production systems. The resilient operation of such NCS against cyber-attacks is essential for society, and risk management presents an effective framework for addressing these security challenges. The risk management framework encompasses two steps: risk assessment and risk mitigation. The risk assessment step aims to quantify the risk, whereas the risk mitigation step focuses on designing mitigation strategies. This thesis leverages the risk management framework to analyze and design NCSs that are resilient to cyber-attacks. In particular, this thesis aims to address the following research challenges. 

Firstly, we aim to assess the risk of attack scenarios that are realistic (risk assessment step). In particular, we consider adversaries and operators with different levels of knowledge about the NCS. For instance, an adversary or operator may possess complete knowledge of the system dynamics or have only partial knowledge with varying degrees of uncertainty. Hence, we describe a systematic approach to assess the risk considering the interplay between the knowledge levels of adversaries and operators.

Secondly, we aim to design the NCS to minimize the risk of attacks (risk mitigation step). We explore three different strategies to minimize the risk: (a) controller/detector design, (b) security measure allocation, and (c) system architecture design. In the first strategy, we design the controller and detector gains to minimize the risk of attacks. Here, risk is characterized by the performance loss caused by stealthy attacks on the NCS. In the second strategy, we consider a distributed NCS where certain distributed devices can be secured from attacks by deploying secure sensors and actuators. Then, we aim to strategically determine the devices to secure and mitigate the risk of attacks effectively. Finally, inspired by digital watermarking, we explore the idea of introducing watermarks in NCS to detect attacks efficiently. Throughout the thesis, we provide various numerical examples to depict the efficacy of risk assessment and risk mitigation algorithms. We also provide numerous discussions and avenues for future research directions.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2024. p. 83
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 2391
Keywords
Cyber-Security, Cyber-Attacks, Cyber-Physical Systems, Risk Management, Risk Metrics, Impact Metrics, Networked Control Systems, Privacy, Controller Design, Robust Control
National Category
Control Engineering
Research subject
Electrical Engineering with specialization in Automatic Control
Identifiers
urn:nbn:se:uu:diva-525726 (URN)978-91-513-2101-1 (ISBN)
Public defence
2024-05-30, Häggsalen, Ångströmslaboratoriet, Lägerhyddsvägen 1, Uppsala, 09:00 (English)
Opponent
Supervisors
Funder
Swedish Foundation for Strategic ResearchSwedish Research Council, 2018-04396
Available from: 2024-05-02 Created: 2024-04-07 Last updated: 2024-05-02

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Abdalmoaty, MohamedCoimbatore Anand, SribalajiTeixeira, André

Search in DiVA

By author/editor
Abdalmoaty, MohamedCoimbatore Anand, SribalajiTeixeira, André
By organisation
Division of Systems and ControlAutomatic controlSignals and Systems
In the same journal
IFAC-PapersOnLine
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 46 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf