skip to main content
rapid-communication

Almost sure detection of the presence of malicious components in cyber–physical systems

Published: 01 September 2024 Publication History

Abstract

This article studies a fundamental problem of security of cyber–physical systems (CPSs): that of detecting, almost surely, the presence of malicious components in the CPS. We assume that some of the actuators may be malicious while all sensors are honest. We introduce a novel idea of separability of state trajectories generated by CPSs in two situations: those under the nominal no-attack situation and those under the influence of an attacker. We establish its connection to the security of CPSs, particularly in detecting the presence of malicious actuators (if any) in them. As primary contributions, we establish necessary and sufficient conditions for the aforementioned detection in CPSs modeled as Markov decision processes (MDPs). Moreover, we focus on the mechanism of perturbing the pre-determined control policies of the honest agents in CPSs modeled as stochastic linear systems, by injecting a certain class of random process called private excitation; sufficient conditions for detectability and non-detectability of the presence of malicious actuators, assuming that the policies are randomized history-dependent and randomized Markovian, are established. Several technical aspects of our results are discussed extensively.

References

[1]
Arapostathis A., Borkar V.S., Fernández-Gaucherand E., Ghosh M.K., Marcus S.I., Discrete-time controlled Markov processes with average cost criterion: a survey, SIAM Journal on Control and Optimization 31 (2) (1993) 282–344.
[2]
Das S., Dey P., Chatterjee D., On the detection of the presence of malicious components in cyber-physical systems in the almost-sure sense, 2023, arXiv preprint arXiv:2306.12516.
[3]
Furstenberg H., Disjointness in ergodic theory, minimal sets, and a problem in Diophantine approximation, Mathematical Systems Theory 1 (1967) 1–49.
[4]
Giraldo J., Urbina D., Cardenas A., Valente J., Faisal M., Ruths J., et al., A survey of physics-based attack detection in cyber-physical systems, ACM Computing Surveys 51 (4) (2018) 1–36.
[5]
Goyal R., Somarakis C., Noorani E., Rane S., Co-design of watermarking and robust control for security in cyber-physical systems, 2022, arXiv preprint arXiv:2209.06267.
[6]
Hernandez-Lerma O., Lasserre J.B., Discrete-Time Markov Control Processes: Basic Optimality Criteria, Springer Science & Business Media, 2012, pp. xi–222.
[7]
Hespanhol P., Porter M., Vasudevan R., Aswani A., Dynamic watermarking for general LTI systems, in: 2017 IEEE 56th Annual Conference on Decision and Control, 2017, pp. 1834–1839.
[8]
Hespanhol P., Porter M., Vasudevan R., Aswani A., Statistical watermarking for networked control systems, in: 2018 Annual American Control Conference, 2018, pp. 5467–5472.
[9]
Horn R.A., Johnson C.R., Matrix Analysis, Cambridge University Press, 2012.
[10]
Hosseini M., Tanaka T., Gupta V., Designing optimal watermark signal for a stealthy attacker, in: 2016 European Control Conference, IEEE, 2016, pp. 2258–2262.
[11]
Khojasteh M.J., Khina A., Franceschetti M., Javidi T., Learning-based attacks in cyber-physical systems, IEEE Transactions on Control of Network Systems 8 (1) (2020) 437–449.
[12]
Kushner D., The real story of Stuxnet, IEEE Spectrum 50 (3) (2013) 48–53.
[13]
Lev N., Peled R., Peres Y., Separating signal from noise, Proceedings of the London Mathematical Society 110 (4) (2015) 883–931.
[14]
Liu H., Mo Y., Johansson K.H., Active detection against replay attack: A survey on watermark design for cyber-physical systems, in: Safety, Security and Privacy for Cyber-Physical Systems, Springer, 2021, pp. 145–171.
[15]
Liu H., Yan J., Mo Y., Johansson K.H., An on-line design of physical watermarks, in: 2018 IEEE Conference on Decision and Control, 2018, pp. 440–445.
[16]
Mo Y., Chabukswar R., Sinopoli B., Detecting integrity attacks on SCADA systems, IEEE Transactions on Control Systems Technology 22 (4) (2013) 1396–1407.
[17]
Mo Y., Garone E., Casavola A., Sinopoli B., False data injection attacks against state estimation in wireless sensor networks, in: 49th IEEE Conference on Decision and Control, 2010, pp. 5967–5972.
[18]
Mo Y., Sinopoli B., Secure control against replay attacks, in: 2009 47th Annual Allerton Conference on Communication, Control, and Computing, IEEE, 2009, pp. 911–918.
[19]
Rahimian M.A., Aghdam A.G., Structural controllability of multi-agent networks: Robustness against simultaneous failures, Automatica 49 (11) (2013) 3149–3157.
[20]
Rudin W.W., Principles of Mathematical Analysis, 2nd ed., McGraw-Hill Book Co., New York, 1964, p. ix+270.
[21]
Sandberg H., Gupta V., Johansson K.H., Secure networked control systems, Annual Review of Control, Robotics, and Autonomous Systems 5 (2022) 445–464.
[22]
Satchidanandan B., Kumar P.R., Dynamic watermarking: Active defense of networked cyber–physical systems, Proceedings of the IEEE 105 (2) (2016) 219–240.
[23]
Satchidanandan B., Kumar P.R., On the design of security-guaranteeing dynamic watermarks, IEEE Control Systems Letters 4 (2) (2019) 307–312.
[24]
Sayfayn N., Madnick S., Cybersafety analysis of the Maroochy shire sewage spill (preliminary draft), MIT Press, 2017, pp. 1–29.
[25]
Shiryaev A.N., Probability. 1, 3rd ed., Springer-Verlag, New York, 2016, p. xvii+486.
[26]
Shiryaev A.N., Probability. 2, 3rd ed., Springer-Verlag, New York, 2019, p. x+348.
[27]
Stroock D.W., Probability Theory: An Analytic View, 2nd ed., Cambridge University Press, 2011, p. xxii+527.
[28]
Tang J., Song J., Gupta A., A dynamic watermarking algorithm for finite Markov decision problems, 2021, arXiv preprint arXiv:2111.04952.
[29]
Toulas B., Hackers breach US water facility via exposed Unitronics PLCs, Bleepingcomputer (2023).
[30]
Venkitasubramaniam P., Privacy in stochastic control: a markov decision process perspective, in: 2013 51st Annual Allerton Conference on Communication, Control, and Computing, 2013, pp. 381–388.
[31]
Zhai L., Vamvoudakis K.G., Hugues J., Switching watermarking-based detection scheme against replay attacks, in: 2021 60th IEEE Conference on Decision and Control, 2021, pp. 4200–4205.
[32]
Zhang J., Pan L., Han Q.-L., Chen C., Wen S., Xiang Y., Deep learning based attack detection for cyber-physical system cybersecurity: A survey, IEEE/CAA Journal of Automatica Sinica 9 (3) (2021) 377–391.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Automatica (Journal of IFAC)
Automatica (Journal of IFAC)  Volume 167, Issue C
Sep 2024
553 pages

Publisher

Pergamon Press, Inc.

United States

Publication History

Published: 01 September 2024

Author Tags

  1. Cyber–physical system
  2. Dynamic watermark
  3. Cyber security
  4. Randomized policy

Qualifiers

  • Rapid-communication

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media