Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Data-Driven Identification of Attack-free Sensors in Networked Control Systems (2312.04845v1)

Published 8 Dec 2023 in eess.SY, cs.SY, and math.OC

Abstract: This paper proposes a data-driven framework to identify the attack-free sensors in a networked control system when some of the sensors are corrupted by an adversary. An operator with access to offline input-output attack-free trajectories of the plant is considered. Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online. We also provide necessary conditions, based on the properties of the plant, under which the algorithm is feasible. An extension of the algorithm is presented to identify the sensors completely online against certain classes of attacks. The efficacy of our algorithm is depicted through numerical examples.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (33)
  1. Attack detection and identification for automatic generation control systems. IEEE Transactions on Power Systems, 33(5):4760–4774, 2018.
  2. Linear systems, volume 8. Springer, 1997.
  3. Time-delay attacks in network systems. Cyber-Physical Systems Security, pages 157–174, 2018.
  4. Data-driven control via petersen’s lemma. Automatica, 145:110537, 2022.
  5. Observability of linear systems under adversarial attacks. In 2015 American Control Conference (ACC), pages 2439–2444. IEEE, 2015.
  6. Formulas for data-driven control: Stabilization, optimality, and robustness. IEEE Transactions on Automatic Control, 65(3):909–924, 2019.
  7. Designing experiments for data-driven control of nonlinear systems. IFAC-PapersOnLine, 54(9):285–290, 2021.
  8. Learning controllers from data via approximate nonlinearity cancellation. IEEE Transactions on Automatic Control, 2023.
  9. A systems and control perspective of CPS security. Annual reviews in control, 47:394–411, 2019.
  10. Florian Dörfler. Data-driven control: Part two of two: Hot take: Why not go with models? IEEE Control Systems Magazine, 43(6):27–31, 2023.
  11. On the impact of cyber attacks on data integrity in storage-based transient stability control. IEEE Transactions on Industrial Informatics, 13(6):3322–3333, 2017.
  12. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. on Automatic control, 59(6):1454–1467, 2014.
  13. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4):1–36, 2018.
  14. Stability analysis of primary plug-and-play and secondary leader-based controllers for dc microgrid clusters. IEEE Transactions on Power Systems, 34(3):1780–1800, 2018.
  15. Co-design for resilience and performance. IEEE Transactions on Control of Network Systems, pages 1–12, 2022. 10.1109/TCNS.2022.3229774.
  16. Stability robustness of networked control systems with respect to packet loss. Automatica, 43(7):1243–1248, 2007.
  17. Distributed data recovery against false data injection attacks in DC microgrids. In 2022 IEEE Intl. Conf. on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pages 265–270. IEEE, 2022.
  18. Teja Kedar Vadde Hulgesh. Evaluation of cyber-attacks in networked control systems, 2023.
  19. ICS security testbed with delay attack case study. In MILCOM 2016-2016 IEEE Military Communications Conference, pages 283–288. IEEE, 2016.
  20. Attack detection for cyber-physical systems: A zonotopic approach. IEEE Transactions on Automatic Control, 2023.
  21. Data-driven control based on the behavioral approach: From theory to applications in power systems. IEEE Control Syst., 2022.
  22. Online convex optimization for data-driven control of dynamical systems. IEEE Open Journal of Control Systems, 1:180–193, 2022.
  23. Alessio Russo. Analysis and detectability of offline data poisoning attacks on linear dynamical systems. In Learning for Dynamics and Control Conference, pages 1086–1098. PMLR, 2023.
  24. Poisoning attacks against data-driven control methods. In 2021 American Control Conference (ACC), pages 3234–3241. IEEE, 2021.
  25. Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach. Physical Communication, 47:101394, 2021.
  26. On data-driven control: Informativity of noisy input-output data with cross-covariance bounds. IEEE Control Systems Letters, 6:2192–2197, 2021.
  27. A secure control framework for resource-limited adversaries. Automatica, 51:135–148, 2015.
  28. Data-driven unknown-input observers and state estimation. IEEE Control Systems Letters, 6:1424–1429, 2021.
  29. Data informativity: a new perspective on data-driven analysis and control. IEEE Transactions on Automatic Control, 65(11):4753–4768, 2020.
  30. The informativity approach: To data-driven analysis and control. IEEE Control Systems Magazine, 43(6):32–66, 2023.
  31. Neural network control policy verification with persistent adversarial perturbation. In International Conference on Machine Learning, pages 10050–10059. PMLR, 2020.
  32. On-line identification of delay attacks in networked servo control. IFAC-PapersOnLine, 56(2):977–983, 2023. 22nd IFAC World Congress.
  33. Liang Wu. Equivalence of SS-based MPC and ARX-based MPC. arXiv preprint arXiv:2209.00107, 2022.
Citations (1)

Summary

We haven't generated a summary for this paper yet.