Robust Sensor Design Against Multiple Attackers with Misaligned Control Objectives

01/30/2019
by   Muhammed O. Sayin, et al.
0

We introduce a robust sensor design framework to provide defense against attackers that can bypass/hijack the existing defense mechanisms. For effective control, such attackers would still need to have access to the state of the system because of the presence of plant noise. We design "affine" sensor outputs to control their perception of the system so that their adversarial intentions would not be fulfilled or even inadvertently end up having a positive impact. The specific model we adopt is a Gauss-Markov process driven by a controller with a "private" malicious/benign quadratic control objective. We seek to defend against the worst possible distribution over the controllers' objectives in a robust way. Under the solution concept of game-theoretic hierarchical equilibrium, we obtain a semi-definite programming problem equivalent to the problem faced by the sensor against a controller with an arbitrary, but known control objective even when the sensor has noisy measurements. Based on this equivalence relationship, we provide an algorithm to compute the optimal affine sensor outputs. Finally, we analyze the ensuing performance numerically for various.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/04/2019

Deception-As-Defense Framework for Cyber-Physical Systems

We introduce deceptive signaling framework as a new defense measure agai...
research
03/01/2020

Optimal Oscillation Damping Control of cable-Suspended Aerial Manipulator with a Single IMU Sensor

This paper presents a design of oscillation damping control for the cabl...
research
12/02/2020

Anytime Control with Markovian Computation and Communication Resources

We investigate a novel anytime algorithm for wireless networked control ...
research
04/01/2023

Safe Perception-Based Control under Stochastic Sensor Uncertainty using Conformal Prediction

We consider perception-based control using state estimates that are obta...
research
07/29/2023

Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

For industrial control systems (ICS), many existing defense solutions fo...
research
04/30/2019

Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

Abuse of zero-permission sensors on-board mobile and wearable devices to...
research
07/22/2019

Maya: Falsifying Power Sidechannels with Operating System Support

The security of computers is at risk because of information leaking thro...

Please sign up or login with your details

Forgot password? Click here to reset