Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking

@article{Salimi2019SequentialDO,
  title={Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking},
  author={Somayeh Salimi and Subhrakanti Dey and Anders Ahl{\'e}n},
  journal={2019 18th European Control Conference (ECC)},
  year={2019},
  pages={883-890}
}
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a deception attack in a scalar linear control system where the sensor measurements can be replaced by an arbitrary stationary signal generated by an attacker. By adding a random watermarking signal to the control action, the controller designs a sequential test based on a Cumulative Sum (CUSUM) method that accumulates the log-likelihood ratio of the joint distribution of the residue and the… 
Quickest Detection of Deception Attacks in Networked Control Systems with Physical Watermarking
In this paper, we propose and analyze an attack detection scheme for securing the physical layer of a networked control system against attacks where the adversary replaces the true observations with
Novel Information-theoretic Game-theoretical Insights to Broadcasting in Internet-of-UAVs
TLDR
A federated-learning based Blahut-Arimoto algorithm is proposed while a 2D dissipativity-theoretic continuous-Mean-Field-Game (MFG) is proposed with regard to (w.r.t.) a joint probability-distributionfunction of the population distribution − relating to a continuous-control-law.

References

SHOWING 1-10 OF 15 REFERENCES
Statistical Watermarking for Networked Control Systems
TLDR
A statistical watermarking test that can detect both sensor and communication attacks in closed-loop LTI systems with subcontrollers is derived and two approaches to design such a controller using Heymann's lemma and a multi-input generalization of Heymann' lemma are provided.
A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems
TLDR
This paper considers the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input, and proposes efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs.
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
TLDR
A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems
TLDR
A general technique is addressed by which the actuators can detect the actions of malicious sensors in the system and disable closed-loop control based on their information, called watermarking, which employs the technique of actuators injecting private excitation into the system, which will reveal malicious tampering with signals.
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems
TLDR
An abstract theoretical framework is proposed to study data injection/modification attacks on Markov modeled dynamical systems from the perspective of an adversary and is applied to a practical problem in data networks where a router tries to hide the path of traffic flow from timing analysis by an active adversary who can modify the timing of an incoming packet stream.
Asymptotically Optimal Quickest Change Detection in Distributed Sensor Systems
Abstract In the standard formulation of the quickest change-point detection problem, a sequence of observations, whose distribution changes at some unknown point in time, is available to a decision
Control-Theoretic Methods for Cyber-Physical Security
Cyber-physical systems integrate physical processes, computational resources, and communication capabilities. Cyber-physical systems have permeated modern society becoming prevalent in many domains
Asymptotically optimal pointwise and minimax quickest change-point detection for dependent data
We consider the quickest change-point detection problem in pointwise and minimax settings for general dependent data models. Two new classes of sequential detection procedures associated with the
Secure Control Systems: A Quantitative Risk Management Approach
Critical infrastructures must continuously operate safely and reliably, despite a variety of potential system disturbances. Given their strict operating requirements, such systems are automated and
Secure Control: Towards Survivable Cyber-Physical Systems
TLDR
This position paper identifies and defines the problem of secure control, investigates the defenses that information security and control theory can provide, and proposes a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.
...
1
2
...