Document Type
Article
Publication Date
2021
Department
Engineering
Keywords
actuators, overlay networks, redundancy, estimation, cyber-physical systems, control systems, safety
Abstract
Cyber-physical systems, which are ubiquitous in modern critical infrastructure, oftentimes rely on sending actuation commands and sensor measurements over a network, subjecting this information to potential man-in-the-middle attacks. These attacks can take the form of denial of service attacks or integrity attacks. Previous approaches at ensuring the resiliency of the overall control system against these types of attacks have leveraged functional redundancy in the system, including resilient estimation and reconfigurable control. However, these approaches are only able to ensure resiliency up to a particular subset of the actuator commands and sensor measurements being compromised. In contrast, we introduce a resiliency mechanism in this paper that can ensure safety for the overall system when all the actuator commands and sensor measurements are compromised. In addition, this approach does not require the implementation of any detection algorithm. We leverage communication redundancy in the number of pathways across the network to guarantee safety when up to a certain percentage of those pathways are compromised. The conditions under which safety is guaranteed are presented along with the resiliency mechanism itself, and our results are illustrated via simulation.
Source Publication Title
2021 American Control Conference
Publisher
IEEE
First Page
4553
DOI
10.23919/ACC50511.2021.9482668
Recommended Citation
Griffioen, P., Romagnoli, R., Krogh, B. H., & Sinopoli, B. (2021). Resilient Control in the Presence of Man-in-the-Middle Attacks. 2021 American Control Conference, 4553. https://doi.org/10.23919/ACC50511.2021.9482668
Comments
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.