You are on page 1of 12

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY 1

Detecting Integrity Attacks on SCADA Systems


Yilin Mo, Member, IEEE, Rohan Chabukswar, Student Member, IEEE,
and Bruno Sinopoli, Member, IEEE

Abstract— Ensuring security of systems based on supervisory of telecommunication systems, or a disruption of ATC at a
control and data acquisition is a major challenge. The goal of major hub, could all be executed as antecedents of a full-
this paper is to develop the model-based techniques capable of fledged invasion. Such threats have been predicted for a long
detecting integrity attacks on the sensors of a control system.
In this paper, the effect of integrity attacks on the control systems time [4]. CPS infrastructures vital to the normal operation of a
is analyzed and countermeasures capable of exposing such attacks society are safety critical, and any attack on one, or a coordi-
are proposed. The main contributions of this paper, beyond nated attack on two or more of them, can significantly hamper
the novelty of the problem formulation, lies in enumerating the the economy and endanger human lives. Unscrupulous entities
conditions of the feasibility of the replay attack, and suggesting can also use such attacks to affect market pricing for making
countermeasures that optimize the probability of detection by
conceding control performance. The methodologies are shown illegal profits. The secure design of CPS is thus of paramount
and the theoretical results are validated using several sets of importance.
simulations. A conventional security measure is employing encrypted
Index Terms— Control, cyber-physical systems (CPS), secure, communications, but cryptographic keys can be broken or
supervisory control and data acquisition (SCADA). stolen, or the attacker could directly attack the physical
elements of the system, without hijacking communications.
Such attacks are feasible when sensors and actuators are
I. I NTRODUCTION distributed in remote locations. Therefore, system knowledge
and cybersecurity are essential to ensure secure operation of
C YBER-PHYSICAL systems (CPS) are systems with tight
coordination between the computational and physical
elements [1]. Such systems often employ distributed networks
CPS.

of embedded sensors and actuators that interact with the


A. Previous Work
physical environment, and are monitored and controlled by
a supervisory control and data acquisition (SCADA) system. The importance of security of CPS has been stressed by the
CPS are observed in multifarious applications such as smart research community in [5] and [6] among others. Cardenas
grids, process control systems, air traffic control (ATC), med- et al. [7] discuss the cyber-physical impact of denial-of-
ical monitoring, and so on. service (DoS) attacks, which interrupt information flow from
A recent concern in distributed control system security is the sensors, actuators, and the control system, and deception
that an attacker could gain access to a set of sensing and attacks that compromise the integrity of data packets. DoS
actuation devices and modify their software or environment to attacks and a feedback control design resilient to them are
launch a coordinated attack against the system infrastructure. further discussed in [8]. The authors are of the opinion that a
The Stuxnet worm, specially designed to reprogram certain deception attack is more subtle, and in principle more difficult
industrial centrifuges and make them fail in a way that was to detect, than a DoS attack. As this issue has not been
virtually undetectable [2], is an example of digital warfare [3]. adequately addressed in the literature, a methodology to detect
This worm has brought to light serious security susceptibilities a specific kind of deception attack is proposed in this paper.
in industrial control systems. In view of the omnipresent threat A substantial amount of research has been carried out
of organized terrorism, a power grid failure, a local breakdown in analyzing, detecting, and failure-handling CPS. Sinop-
oli et al. [9], [10] studied the effect of random packet drops on
Manuscript received October 29, 2012; revised May 6, 2013; accepted controller and estimator performance. Several failure-detection
August 11, 2013. Manuscript received in final form September 3, 2013. schemes in dynamic systems are reviewed in [11]. Some CPS
This work was supported in part by CyLab with Carnegie Mellon under
Grant DAAD19-02-1-0389 from the Army Research Office, in part by the scenarios, e.g., those proposed in [12], are capable of using
Northrop Grumman Information Technology, Inc., Cybersecurity Consortium results from robust control, where the authors concentrate
grant NGIT2009100109, and in part by the National Science Foundation under on designing the controllers for systems with unknown or
Grant 0955111. Recommended by Associate Editor L. Xie.
Y. Mo was with the Department of Electrical and Computer Engineering, uncertain parameters. While these works assume that failures
Carnegie Mellon University, Pittsburgh, PA 15213 USA. He is now with are either random or benign, a shrewd attacker, such as is
the Department of Control and Dynamical Systems, California Institute of considered in this paper, can carefully construct an attack
Technology, Pasadena, CA 91125 USA (e-mail: yilinmo@caltech.edu).
R. Chabukswar and B. Sinopoli are with the Department of Electrical and strategy to deceive detectors and make robust controllers fail.
Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 Alpcan and Başar [13] applied game theoretic principles
USA (e-mail: rchabuks@ece.cmu.edu; brunos@ece.cmu.edu). formally to intrusion detection for developing a decision
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. and control framework. Their work considers the treatment
Digital Object Identifier 10.1109/TCST.2013.2280899 of intrusion-detection sensors, not on the actual scheme of
1063-6536 © 2013 IEEE
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

detection that each sensor employs. Controllability and observ- recorded normal operations at the nuclear plant, which it then
ability of linear systems has been analyzed using graph theory played back to the operators to feign normal operation while
in [14], which provide methods for reaching consensus in the spinning the centrifuges beyond rated values [28].
presence of malicious agents. The proposed methods are com- The main contributions of this paper, beyond the novelty of
binatorial in nature, and computationally expensive. Robust the problem formulation, lies in enumerating the conditions of
estimation using sensors in untrusted environments has been the feasibility of the replay attack, and suggesting countermea-
investigated in [15], and again in [16], where Lazons et al. pro- sures that optimize the probability of detection by conceding
pose robust localization algorithms, which concentrate on the control performance.
location information of the sensors, not the sensor data itself. This paper is organized as follows. In Section II, the
Pasqualetti et al. [17], [18] consider intentional malicious problem formulation is provided by revisiting and adapting the
data attack, and address the problem of distributed monitoring Kalman filter, the linear quadratic Gaussian (LQG) controller,
and intrusion detection. Distributed formation control in the and the χ 2 failure detector. The threat model is also defined,
presence of attackers is studied in [19], where a distributed and its effect on the control schemes of Section II is analyzed.
control algorithm using online adaptation is proposed. These In Section III, the class of systems incapable of detecting such
scenarios, unlike the present work consider a noiseless process attacks is identified. In Section IV, three countermeasures for
and environment. detecting such attacks are provided, based on adding a zero-
Giani et al. [20] address the problem of secure and mean Gaussian authentication signal to the optimal control.
resilient power transmission and distribution, and point out A way to design the authentication signal to minimize the
several potential threats in modern power systems. A com- performance loss while guaranteeing a certain probability of
prehensive survey of the current results in networked control detection is also provided. The methods validated by carrying
systems has been carried out in [21]. Dán and Sandberg out several simulations detailed in Section V. Section VI
[22] analyze stealth attacks on power system state estima- concludes this paper, with some directions for future work. The
tors, and use a static system formulation unlike this paper. appendix contains some proofs that would otherwise interrupt
Sandberg et al. [23] study the analysis of large scale power the flow of this paper.
networks of using proposed security indices. Secure state
estimation and control of systems under attack is further II. P ROBLEM F ORMULATION
investigated in [24] and [25]. The security of power networks, This section presents the problem formulation by deriving
however, focuses on static systems, contrary to the fundamen- the Kalman filter, the LQG controller, and χ 2 -detector for the
tal formulation of a linear time-invariant (LTI) system analyzed case under study. The notation developed below is used for
in this paper. the remainder of this paper.
This paper builds on the previous theoretical results of the Consider an LTI system:
authors, [26], [27]. Mo and Sinopoli [26] proposed the original
problem and attack strategy, and introduced the concept of x k+1 = Ax k + Bu k + wk (1)
noisy control, with some simulations on a model of a moving where x k ∈ Rn is the vector of state variables at time k,
vehicle. The subsequent work [27] provided a way to optimize u k ∈ R p is the control input, wk ∈ Rn is the process noise
the noisy control in multiinput, multioutput systems, and at time k, and x 0 is the initial state. We assume that wk , x 0
introduced noisy control for a cross-correlator detector, with are independent Gaussian random variables, x 0 ∼ N (x̄ 0 , ),
simulations on a chemical plant and a microgrid. In this wk ∼ N (0, Q).
paper, the results of the above are extended, with some new A sensor network monitors the system in
results regarding the form of the optimized control signal. The (1). The observation equation can be written as
simulations have been consolidated into the chemical plant, for follows:
better comparison of the application of different techniques yk = C x k + v k (2)
and their performances.
where yk ∈ Rm is a vector of sensor measurements and v k ∼
N (0, R) is the measurement noise independent of x 0 and wk .
B. Outline It is assumed that the system operator wants to minimize
The goal of this paper is to develop the model-based the following infinite-horizon LQG cost:
techniques capable of detecting integrity attacks on the sensors T −1 
of a control system. It is assumed that the attacker wishes 1  T 
J = min lim E xk W xk + u k U u k
T
(3)
to disrupt the operation of a control system in steady state, T →∞ T
k=0
to which end the attacker hijacks the sensors, observes, and
where W, U are positive semidefinite matrices and u k is
records their readings for a certain amount of time, and
measurable with respect to y0 , y1 , . . . , yk , i.e., u k is a function
repeats them afterward to camouflage his attack. Such an
of the previous observations. The separation principle holds in
attack is common and natural, especially if the attacker does
this case and the optimal solution of (3) is a combination of
not know the dynamics of the system, but is aware that the
Kalman filter and LQG controller. The Kalman filter provides
systems is expected to be in steady state during the attack.
the optimal state estimate x̂ k|k :
This deception, proposed a year before Stuxnet came to light
[26], was exactly what the worm used to hide its activities—It x̂ 0|−1 = x̄ 0 , P0|−1 =  (4)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

MO et al.: DETECTING INTEGRITY ATTACKS ON SCADA SYSTEMS 3

x̂ k+1|k = A x̂ k + Bu k , Pk+1|k = A Pk A T + Q III. F EASIBILITY OF ATTACK


 −1
K k = Pk|k−1 C T C Pk|k−1 C T + R In this section, it is assumed that a malicious third party
  wants to break the control system described in Section II. An
x̂ k = x̂ k|k−1 + K k yk − C x̂ k|k−1
attack model similar to the replay attack in computer security
Pk = Pk|k−1 − K k C Pk|k−1 . (5) is defined and the feasibility of such kind of attacks on the
Although the Kalman filter uses a time-varying gain K k , this control system is analyzed. The analysis is then generalized
gain will converge if the system is detectable. In practice, the to other classes of control systems.
Kalman gain usually converges in a few steps. Hence, P and The attacker is assumed to have the capability to
K can be defined as follows: 1) inject an external control input u ak into the system.
   −1 2) (conservatively) read all the sensor readings and modify
P = lim Pk|k−1 , K = PC T C PC T + R . (6)
k→∞ them arbitrarily. The readings modified by the attacker
As the control systems usually run for a long time, the are denoted by yk .
system can be assumed to be at steady state. The initial Given these capabilities, the attacker is assumed to imple-
condition  = P reduces the Kalman filter to a fixed gain ment an attack strategy, which can be divided into two stages.
estimator: 1) The attacker records a sufficient number of yk s without
x̂ 0|−1 = x̄ 0 , x̂ k+1|k = A x̂ k + Bu k giving any input to the system.
  2) The attacker gives a sequence of desired control input
x̂ k = x̂ k|k−1 + K yk − C x̂ k|k−1 . (7)
while replaying the previous recorded yk s.
The LQG controller is a fixed gain linear controller based Remark 1: The attack on the sensors can be done by
on the optimal state estimation x̂ k : breaking the cryptography algorithm. Another way to perform
 −1 T an attack, which is thought to be much harder to defend,
u k = u ∗k = − B T S B + U B S A x̂ k (8)
is to use physical attacks. For example, the readings of a
where u ∗k is the optimal control input and S satisfies the Riccati temperature sensor can be manipulated if the attacker puts
equation a heater near the sensor.
 −1 T Remark 2: When the system is under attack, the controller
S = AT S A + W − AT S B B T S B + U B S A. (9)
cannot perform closed-loop control, as the sensory information
  −1 T is not available. Therefore, control performance of the system
Let L = − B T S B + U B S A, then u ∗k = L x̂ k . The
optimal value of objective function in this case is cannot be guaranteed during replay attack. The only way to
    
counter such an attack is to detect it happening.
J = trace S Q + trace A T S A + W − S P − K C P . Remark 3: In the attacking stage, the goal of the attacker is
(10) to make the fake readings yk s look like normal yk s. Replaying
the previous yk s is just the easiest way to achieve this goal.
A. χ 2 Failure Detector There are other methods, such as machine learning or system
identification, to generate a fake sequence of readings. To
The χ 2 detector [29], [30] is widely employed in control
provide a unified framework, yk s can be thought as the output
systems, and uses characteristics of Kalman filter residues:
of the following virtual system under normal operation:
Theorem 1: For the LTI system defined in (1) with Kalman

filter and LQG controller, the Kalman filter resides yi −C x̂ i|i−1 x k+1 = Ax k + Bu k + wk , yk = C x k + v k (13)

of are Gaussian independent identically distributed (i.i.d.) with x̂ k+1|k = A x̂ k + Bu k (14)
zero mean and covariance P = C PC T + R.  
  

Proof: The proof is given in [29]. x̂ k+1 = x̂ k+1|k + K yk+1 − C x̂ k+1|k (15)
Let u k = L x̂ k (16)
 
k
 T   with initial conditions x 0 and x̂ 0|−1
 . For the replay attack,
gk = yi − C x̂ i|i−1 P −1 yi − C x̂ i|i−1 (11)
suppose that the attacker records the sequence yk s from time t
i=k−T +1
onward. The virtual system, then, is just a time shifted version
where T is the window size. With Theorem 1, it is known of the real system, with x k = x t +k , x̂ k|k
 = x̂  
t +k|t +k . wk and v k
that when the system is operating normally, gk has a χ 2 will still be independent of each other and of wk and v k , since
distribution with mT degrees of freedom,1 implying lower the original process and sensor noises are white Gaussian.
probability of a larger gk . The χ 2 detector at time k is: Remark 4: While the attacker can only record the readings
H0 for a finite time before the attack, in general this recording will
gk ≶ v (12) be long enough to cause damage to the system. In addition,
H1 if the attacker does find the recording to be too short, the
recorded measurements can be looped to form a longer replay,
where η is the threshold, chosen for a specific false alarm because the system is in steady state. Thus, for the sake of
probability. H1 denotes a triggered alarm. simplicity, we assume the length of recording to be infinite.
1 The concept of degrees of freedom is a component of the definition of the Theorem 2: Consider the system and detector of Section II,
χ 2 distribution. Please refer to Scharf and C. See [31] for more details. and an attacker running the virtual system given by (13).
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

Let αk and βk be, respectively, the false alarm and detection applicable to a large class of systems, with a slightly stronger

rates of the system at time k. If A = (A + B L) (I − K C) is condition. Suppose the state of the estimator at time k is sk
stable and it evolves according to

lim βk = αk . (17) sk+1 = f (sk , yk ). (24)


k→∞ Let the seminorm of f be defined as
Conversely, if A is unstable  f (s, y) − f (s + s, y)

f= sup . (25)
lim βk = 1. (18) s =0,y,s s
k→∞
Proof: Suppose the system is under attack, the estimation Suppose that the defender is using the following criterion to
of the Kalman filter x̂ k|k−1 can be rewritten as: perform intrusion detection:
x̂ k+1|k = A x̂ k + Bu k H0
= (A + B L) x̂ k g(sk , yk ) gk ≶ v (26)
 
H1
= (A + B L) x̂ k|k−1 + K yk − C x̂ k|k−1
= (A + B L) (I − K C) x̂ k|k−1 + (A + B L) K yk . (19) where g is an arbitrary continuous function and η is a threshold
value for g.

For the virtual system, the same equation holds true for x̂ k|k−1 Theorem 3: If  f  ≤ 1, then
     
x̂ k+1|k = (A + B L) (I − K C) x̂ k|k−1 + (A + B L) K yk . (20) lim g sk , yk − g sk , yk = 0 (27)
k→∞
Thus2   where skis the state variable of the virtual system. The
 
x̂ k|k−1 − x̂ k|k−1 = A k x̂ 0|−1 − x̂ 0|−1 . (21) detection rate βk at time k converges to
 
Let x̂ 0|−1 − x̂ 0|−1 = ζ . Now, the residue can be written as: lim βk − αk = 0 (28)
k→∞
 
yk − C x̂ k|k−1 = yk − C x̂ k|k−1

− CA k ζ (22) where αk is the false alarm rate of the virtual system at
time k.
and
Proof: Because of space limit, only an outline of the proof

k  T   is given. Initially,  f  ≤ 1 will ensure that sk converges to sk .
gk = yi − C x̂ k|k−1

P −1 yi − C x̂ k|k−1

By the continuity of g, g(sk , yk ) converges to g(sk , yk ). The
i=k−T +1
 T −1 detection rate of the system and the false alarm rate of the
+ 2 yi − C x̂ k|k−1

P CA i ζ virtual system are given by
     
+ ζ T A i C T P −1 CA i ζ . βk = Prob g sk , yk > η
T
(23) (29)
    
αk = Prob g sk , yk > η . (30)
By the definition of virtual system, it is known that yk −
 follows the exact distribution as yk − C x̂ k|k−1 . Hence,
C x̂ k|k−1 Hence, βk converges to αk .
if A is stable, the second and third terms in (23) will converge Remark 6: If Theorem 3 is applied to the LTI system under
to 0. Thus, yk − C x̂ k|k−1 will converge to the same distribution consideration, the case of LQG controller, Kalman filter, and
as yk − C x̂ k|k−1 , and the detection rate (β) given by χ 2 χ 2 detector then becomes just a special case, where the state
detector will converge to the false alarm rate (α). sk of the estimator at time k is yk−T +1 , yk−T +2 , . . . , yk
If, on the other hand, A is unstable, the attacker cannot and x̂ k−T +1|k−T , x̂ k−T +2|k−T +1 , . . . , x̂ k|k−1 . The function
replay yk for long, because gk will soon become unbounded, f is given by (4) and g is given by (12). The condition for
implying βk → 1. In this case, the system is resilient to resiliency thus derived is that the largest singular value of A
the replay attack, as the detector will be able to detect the is less than one. This is a more restrictive condition than the
attack. one derived in Theorem 2.
Remark 5: During the transient period when the attack Remark 7: For linear systems, the stability of A implies
starts, the value of gk in the above formulation will jump that the detection rate converges to the false alarm rate. If A
to a high value. It is, however, not very difficult for a is unstable, the detection rate goes to one. For the larger class
sophisticated attacker to reduce this jump in values, even of systems,  f  ≤ 1 is a sufficient condition for the detection
remove it completely, by designing the start of the attack rate converging to the false alarm rate.
more carefully than in the above formulation. For example, an
attacker could ramp up the introduction of false measurements IV. C OUNTERMEASURES AGAINST ATTACKS
with time, or he could wait till the initial part of the recording
A. Using Unstable A
is close to the current measurements. Reliance on the transient
jump in gk is not a wise move. The result of Theorem 2, is that if A , is unstable, then gk
It turns out the feasibility result derived for a special goes to infinity exponentially fast, triggering the detector. One
estimator, controller, and detector implementation is actually possible way to counter the replay attack is to redesign the
control system, i.e., using nonoptimal estimation and control
2 For simplicity, here the time the attack begins is considered as time 0. gain matrices K and L, so that A becomes unstable while
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

MO et al.: DETECTING INTEGRITY ATTACKS ON SCADA SYSTEMS 5

maintaining the stability of the system. However, since K and


L are not optimal in the LQG sense, the cost increase.
The LQG cost for using nonoptimal K and L is now
characterized. It is known that
x k+1 = Ax k + Bu k + wk = Ax k + B L x̂ k + wk (31)
and
x̂ k+1|k = A x̂ k + Bu k = (A + B L) x̂ k
 
x̂ k+1 = x̂ k+1|k + K yk+1 − C x̂ k+1|k
= (I − K C) (A + B L) x̂ k + K yk+1
    
= I − K C A + B L x̂ k + K C x k+1 + v k+1 Fig. 1. System diagram.
= K C Ax k + (A + B L − K C A) x̂ k
+ K Cwk + K v k+1 . (32) Taking the limit on both sides,

Equations (31) and (32) can be written in matrix form as Q̂ = Â Q̂ Â T + R̂.


follows: Therefore, the LQG cost is given by
    
x k+1 A BL xk
= J = trace
W 0
Q̂ .
x̂ k+1 KCA A + BL − KCA x̂ k 0 LT U L
 
I 0
+ wk + v . (33)
KC K k+1
Remark 8: There might not be enough freedom to redesign
Let  be defined as the control, which is required for this countermeasure to be
 implemented. The inclusion of this method is, however, not
 A BL
 = . (34) just for the sake of completeness—as gk increases exponen-
KCA A + BL − KCA
tially, this method therefore provides the highest asymptotic
Let R̂ be covariance matrix of final terms of (33) probability of detection, in the case that it is feasible.
  It is, however, likely that the design constraints do not allow
 I   0  
R̂ = Q I CT K T + R 0 KT . (35) A to be unstable, due to constraints on operating costs, safety
KC K
parameters, etc. In such cases, two other countermeasures are
The LQG cost for nonoptimal K and L can now be derived, proposed to detect the replay attacks in the following section.
which is given by the following theorem.
Theorem 4: The LQG cost of using an arbitrary estimation B. Noisy Control
and control gain K and L is
  The main problem of the combination of a LQG controller
W 0 and a Kalman filter is that the whole control system is fairly
J = trace Q̂ (36)
0 LT U L static, which renders it vulnerable to a replay attack. To detect
such a replay attack, one methodology is to redesign the
where Q̂ is the solution of the following Lyapunov equation:
control signal as
Q̂ = Â Q̂ Â T + R̂. (37) u k = u ∗k + u k (42)
Proof: Since a fixed gain controller and estimator is used
where u ∗k is the optimal LQG control signal and the sequence
J = lim x kT W x k + u kT U u k (38) u k is drawn from an i.i.d. Gaussian distribution with zero
k→∞ mean and covariance Q, and independent of u ∗k . Fig. 1 shows
which can then be written in matrix form as the system diagram, including the attacker and the noisy
 
 T T W 0 xk control.
J = lim x k u k The sequence u k acts as a time-stamped authentication
k→∞ 0 U uk
   signal. It is chosen to be zero mean so as not to introduce any
W 0 xk  T T 
= lim trace xk u k bias into the system. The presence of this extra authentication
k→∞ 0 U uk
  signal will cause the controller to not be optimal—to decrease
W 0 xk the vulnerability of the system to the attack, the control
= lim trace Cov . (39)
k→∞ 0 LT U L uk performance must be sacrificed. Theorem 5 characterizes the
Let  dependence of the loss of LQG performance on the strength
 xk of the authentication signal.
Q̂ = lim Cov . (40)
k→∞ uk Theorem 5: The LQG performance after adding u k is
By (33) given by  

  J  = J + trace U + B T S B Q . (43)
x k+1 xk   
Cov = ÂCov  T + R̂. (41) J
u k+1 uk Proof: The proof is given in Appendix I.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

Remark 9: As the LQG performance is still bounded, the Hence


system is stable.  
1) χ 2 Detector: Theorem 6 shows the effectiveness of the lim Cov yk − C x̂ k|k−1 = P + 2CU C T (53)
k→∞
detector using the noisy-control scheme.
Theorem 6: In the absence of an attack and
 T  
 T  
E yk − C x̂ k|k−1 P −1 yk − C x̂ k|k−1 = m. (44) lim E yk − C x̂ k|k−1 P −1 yk − C x̂ k|k−1
k→∞
 
Under attack    −1
 T   = trace lim Cov yk − C x̂ k|k−1 × P
lim E yk − C x̂ k|k−1 P −1 yk − C x̂ k|k−1
k→∞
 
k→∞
  = m + 2 · trace C T P −1 CU . (54)
= m + 2 · trace C T P −1 CU (45)
  
gk Corollary 1: In the absence of an attack, the expectation of
where U is the solution to the following Lyapunov the χ 2 detector is
equation: E [gk ] = mT . (55)
T T
U − BQ B = A U A . (46)
Proof: Equation (44) can be easily proved using Under attack, the asymptotic expectation becomes
Theorem 1. x̂ k+1|k can be rewritten as  
lim E [gk ] = mT + 2 · trace C T P −1 CU T . (56)
k→∞
x̂ k+1|k = A x̂ k|k−1 + (A + B L) K yk + Bu k . (47) The difference in the expectations of gk with and without
attack proves that the detection rate does not converge to the
Similarly, for the virtual system
false alarm rate.
 
x̂ k+1|k = A x̂ k|k−1 + (A + B L) K yk + Bu k . (48) In a SISO system, there is only one way to insert the random
signal, and only one way to observe it. Thus, to achieve a
Thus certain detection rate, a certain performance loss would have to

 
 be accepted. In MIMO systems, the authentication signal can
x̂ k|k−1 − x̂ k|k−1 = A k x̂ 0|−1 − x̂ 0|−1
be inserted on one input or on many, with different strengths,

k−1
  independent or not. Similarly, the responsiveness of the system
+ A k−i−1 B u i − u i . (49) to the signal can be checked for one output or many. The
i=0
authentication signal u k can be optimized such that the
Hence detection requirements are met while minimizing the effect
  on controller performance. As the authentication signal has to
yk − C x̂ k|k−1 = yk − C x̂ k|k−1
 
− CA k x̂ 0|−1 − x̂ 0|−1
be zero mean, the design hinges on the covariance matrix Q.

k−1
  Let the optimal value of Q, based on the design requirements,
−C A k−i−1 B u i − u i . (50) be denoted by Q ∗ .
i=0 The optimization problem can be setup in two ways. Ini-
The first term in (50) has the same distribution as yk −C x̂ k|k−1 , tially, the LQG performance loss (J ) can be constrained to
and the second term converges to zero when A is stable. One be less than some design parameters , and the increase (gk )
can observe that u i is independent of yk − C x̂ k|k−1
 of the in the expected value of the quadratic residues in case of an
virtual system. In addition, for the virtual system, yk −C x̂ k|k−1
 attack maximized. In this case, the optimal Q ∗ is the solution

is independent of u i . Hence to the optimization problem
   
lim Cov yk − C x̂ k|k−1 max trace C T P −1 CU
k→∞ Q


    s.t. U − BQ B T = A U A T
= lim Cov yk 
− C x̂ k|k−1 + Cov CA i Bu i
k→∞
i=0 Q 
0 

 trace U + B T S B Q ≤ .
  (57)
+ Cov CA i Bu i
i=0 Theorem 7: There exists an optimal Q ∗ for (57) of the

  T following form:
= P +2 CA i BQ B T A i C T . (51)
i=0 Q ∗ = αωω T (58)
By the definition of U from Theorem 5, the Lyapunov where α > 0 is a scalar and ω is a vector such that ω T ω = 1.
equation (46) can be solved to yield U as Proof: Suppose that Q ∗ is the optimal solution of (57)

  t and U ∗ is the solution of
U = A i BQ B T A i . (52)
i=0 U ∗ − BQ ∗ B T = A U ∗ A T . (59)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

MO et al.: DETECTING INTEGRITY ATTACKS ON SCADA SYSTEMS 7

Because Q ∗ is positive semidefinite, it is known that independent random noise generators required is equal to the
⎛ ⎞ rank of Q ∗ . Naïvely, one would have to use one independent
λ1 0 · · · 0
⎜ 0 λ2 · · · random noise generator per system input, to protect all of
⎜ 0⎟ ⎟ T
Q∗ = ⎜ . . . .. ⎟ (60) them. Irrespective of the number of system inputs, the rank
⎝ .. .. . . .⎠ of Q ∗ is, however, always one, which means that a single
0 0 · · · λp random noise generator will suffice for a system with any
   number of inputs.


Remark 11: Ideally, if there is a design constraint on the
where
 λi ≥ 0s  are the eigenvalues of Q and = LQG cost, one would try to optimize the detection rate.
ω1 , ω2 , . . . , ω p is an orthonormal matrix, such that ωi ∈ R p . It, however, can be shown that under attack gk follows a
Thus, Q ∗ can be written as the sum of p rank 1 matrices generalized χ 2 distribution, and no analytical form for the

p detection rate can be accrued. Thus, only the maximization of
Q∗ = λi ωi ωiT . (61) the expectation in the case of an attack is attempted, with the
i=1 intuition that the detection rate in such a case will be close to
Let Qi be defined as the maximum possible.
 Remark 12: It can be observed from Theorems 5 and 6
Qi = αi ωi ωiT (62) that the increase (J ) in LQG cost and increase (gk ) in the
where αi > 0 is chosen such that expectation of the quadratic residues are linear functions of the
 
noise covariance matrix Q. Thus, the optimization problem
trace U + B T S B Qi = . (63) is a semidefinite programming problem, and hence can be
solved efficiently. Furthermore, it can be observed that if the
In addition, let Ui be defined as the solution of the following
constraints are changed from to α , the optimal Q ∗ will
Lyapunov equation:
be changed to αQ.
Ui − BQi B T = A Ui A T . (64) Another way of optimizing is to constrain the increase (gk )
in the expected values of the quadratic residues to be above a
It is clear that the optimal Q∗
must satisfy
 
fixed value , thereby guaranteeing a certain rate of detection,
trace U + B T S B Q ∗ = . (65) and the performance loss (J ) can be minimized. The optimal
Q ∗ is now the solution to the optimization problem
Therefore, as

p
λi  

Q∗ = Qi (66) min trace U + B T S B Q


αi Q
i=1
s.t. U − BQ B T = A U A T
it can be observed that Q 0
 
 
= trace U + B T S B Q ∗ trace C T P −1 CU ≥ . (71)
 p
λi  

= trace U + B T S B Qi Remark 13: The solutions of the two optimization problems


αi given in 57 and 71 will be scalar multiples of each other,
i=1
p
λi thus solving either optimization problem guarantees same
= (67) performance. An intuitive way to observe this, is that Q ∗
αi
i=1 measures the sensitivity of the system output to the different
which proves that inputs, thus making it a system property.

p
λi The results of Remarks 12 and 13 can be applied to decouple
= 1. (68) the design of the signal into two steps. Because there is a
αi
i=1 linear relationship between the performance loss or increase
Furthermore, it is easy to observe that since Lyapunov equation in residues to the amplitude of the signal, the form of the Q ∗
is linear can first be ascertained. The norm of Q ∗ can then be designed
p
λi in the second step, considering either the detector performance
U∗= Ui . (69)
αi or the controller performance. These design steps are further
i=1
shown in Section V-D.
Hence 2) Cross Correlator: Implementing the χ 2 detector requires
  λi
p
   the implementation of a Kalman estimator. In some systems, a
trace C T P −1 CU ∗ = trace C T P −1 CUi . (70) Kalman estimator, however, might not be feasible, because of
αi
i=1 noise characteristics or system observability. The noisy-control
Thus, Q ∗ is a convex combination of p feasible Qi s. Because countermeasure, however, can still be applied, to virtually any
Q ∗ is optimal, we know that for any λi > 0, the corresponding controller and detector, as long as a virtual system
 can be
Qi must also be optimal, which finishes the proof. implemented. We add a signal u k ∼ N 0, σ 2 . The effect
Remark 10: The fact that Q ∗ has rank 1, has a direct of the control input on the virtual system can be calculated
bearing on the computation requirement. The number of and the outputs are compared. The system of the previous
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

section, with a Kalman estimator and an LQG control, can be maximized. In this case, the optimal Q ∗ is the solution to the
used as an example to show this countermeasure. The system optimization problem
evolution equation is  
    max trace ĈR Ĉ T
x k+1 A BL xk B Q
= + u k ÂR Â T + B̂Q B̂ T = R
x̂ k+1 KCA A + BL − KCA x̂ k B s.t.
     
Q 0
 Â
 B̂  

I 0 trace U + B T S B Q ≤ . (80)
+ wk + v (72)
KC K k+1 Second, the increase (gk ) in the expected values of
and the measurement equation is the quadratic residues can be constrained to be above a
 fixed value , thereby guaranteeing a certain rate of detec-
  xk
yk = C 0 + vk . (73) tion, and the performance loss (J ) can be minimized.
   x̂ k The optimal Q ∗ is now the solution to the optimization

problem
Note that  is the same, as defined in (34). For the virtual  

min trace U + B T S B Q
system, the system evolution equation is Q
    
x k+1 xk  I  0 s.t. ÂR Â T + B̂Q B̂ T = R
 = Â + B̂u + w + v (74)
x̂ k+1 x̂ k k KC k K k+1 Q 0
 
and the measurement equation is trace ĈR Ĉ T ≥ . (81)

x Theorem 8: There exists and optimal Q∗ for (80) of the
yk = Ĉ k + v k . (75)
x̂ k following form:
Q∗ = αωω T (82)
It is assumed that x 0 ∼ N (x̄ 0 , ), x 0 ∼ N (x̄ 0 , ), u ∼
N (0, Q), wk ∼ N (0, Q), wk ∼ N (0, Q), v k ∼ N (0, R), where α > 0 is a scalar and ω is a vector with ω T ω = 1.
and v k ∼ N (0, R) are all independent of each other. Let Proof: The proof is very similar to that of Theorem 7,
the detector run another virtual system, which is connected hence is omitted.
directly to the controller and cannot be attacked by the attacker Remark 14: Like the χ 2 detector, only the maximization of
      the expectation is attempted. The optimization problems are
x k+1 xk I  0
 = Â  + B̂u k + wk + v  (76) linear and generate optimal Q ∗ s, which are multiples of each
x̂ k+1 x̂ k KC K k+1
other.
and the measurement equation is
 
x V. S IMULATION
yk = Ĉ k + v k . (77)
x̂ k In this section, some simulation results pertaining to the
 
Consider the detector variable gk = y T y 
= trace y  y T . detection of replay attacks on one system using different
It can be proved that in the absence of a replay attack countermeasures is given. For the system, a simplified version

of the Tennessee Eastman control challenge oroblem [32] is
E y  y T = ĈR Ĉ T (78) used. Ricker [33] derived an LTI dynamic model of the plant
in its base state, and a corresponding robust controller. The
where R is the solution of the following Lyapunov
system is given as a transfer function of four outputs and
equation:
inputs3
ÂR Â T + B̂Q B̂ T = R. (79) ⎛ ⎞ ⎛ ⎞⎛ ⎞
F4 g11 0 0 g14 u1
If the attacker replays the outputs y or if he is running ⎜ P ⎟ ⎜g21 0 g23 0 ⎟ ⎜u 2 ⎟
another virtual system, the u  generated by the attacker will y=⎜ ⎟ ⎜ ⎟⎜ ⎟
⎝ y A3 ⎠ = Gu = ⎝ 0 g32 0 0 ⎠ ⎝u 3 ⎠ . (83)
be independent of the u used in the controller’s virtual
VL 0 0 0 g44 u4
system. In case of either form of attack, R becomes zero,
causing E[y  y T ] to drop to zero as well. We can thus detect The attacker is considered to know the readings of all4 the
the absence of the authentication signal in the output and sensors, with the ability to hijack and modify them, but not the
hence, the attack. dynamics of the system. The only known fact is that the system
Similar to the χ 2 detector, in the case of MIMO systems, is expected to be in a steady state for the duration of the attack.
the covariance matrix Q can be optimized, such that the Of the 30 min for which the system is simulated, the attacker
detection requirements are met while minimizing the effect records the sensor readings for the first 15 min, and replays
on controller performance. Just like the previous case, the them to the controller for the next 15 min. The attack consists
optimization problem can be setup in two ways. First, the 3 For detailed values of the transfer functions, see [33].
LQG performance loss (J ) can be constrained to be less 4 The requirement of control over all sensors can be weakened if the system
than some design parameters , and the increase (gk ) in the can be decomposed into several weakly coupled subsystems, compromising
expected value of the correlator output in case of an attack sensors for one subsystem may be sufficient.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

MO et al.: DETECTING INTEGRITY ATTACKS ON SCADA SYSTEMS 9

Fig. 2. gk as a function of time during normal operation and a replay Fig. 3. gk as a function of time during normal operation, and a replay
attack. This shows that the detector (with threshold at 99% shown) fails attack, using a controller with unstable A . This shows that the detector (with
to detect the fall in gk due to an attack. (a) Normal operation. (b) Replay threshold at 99% shown) is able to detect the fall in gk due to an attack.
attack. (a) Normal operation. (b) Replay attack.

for varying the control inputs of the plant, to try and evolve it
into a potentially dangerous state. As no information from the
system is conveyed to the controller, the system becomes open
loop, without guarantees on the control performance. The only
way to obtain the system back into the controlled state is to
detect and mitigate the attack.

A. Feasibility of Attack
For the chemical plant, a W and U were chosen such that
A is stable. A χ 2 detector with a window size of 10 samples
(1 min) is used. Fig. 2(a) shows the value of gk for a χ 2
detector, for the duration of 30 min, when no attack is present.
Fig. 2(b) shows the value of gk when an attack occurs after
the first 15 min. It can be observed that there is no appreciable
statistical difference in gk when an attack is present, making
detection impossible.
Thus, executing the attack without being detected is feasible.

B. Unstable A
Fig. 4. gk as a function of time during normal operation and a replay attack.
It is assumed that the design parameters are flexible enough This shows that the detector (with threshold at 99% shown) is able to detect
to allow A to be unstable. K and L are generated randomly the fall in gk due to an attack. (a) Normal operation. (b) Replay attack.
such that they form a good estimator-controller pair, such that
A is unstable. A χ 2 detector with a window size of 10 samples
(1 min) is used. Fig. 3 shows the value of gk in normal
operation and when an attack occurs after the first 15 min.
It can be observed that the instability in A causes a change a window size of 10 samples (1 min) is implemented. In this
in gk when an attack is present, which can be detected. case, the authentication signal is not optimized. The expected
increase in LQG cost is 10% of the optimal LQG cost. In this
case, Fig. 4(a) shows the value of gk for a χ 2 detector, for
C. χ 2 Detector, Nonoptimal the duration of 30 min, when no attack is present. Fig. 4(b)
For this simulation, the estimator and controller are reverted shows the value of gk when an attack occurs after the first
to the original case of Section V-A. The countermeasure of 15 min. It can be observed that there is some differences in
noisy control is now used for the system. A χ 2 detector with the statistical distribution of gk with and without an attack.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

Fig. 6. ROC curves for detector, when is 2% (dark solid line), 4% (thin
solid line), 6% (dashed line), 8% (dotted line), and 10% (dashed-dotted line).
Detection up to 1 s after attack is considered.
Fig. 5. gk as a function of time during normal operation and a replay attack.
This shows that the detector (with threshold at 99% shown) is able to detect
the fall in gk due to an attack. (a) Normal operation. (b) Replay attack.

D. χ 2 Detector, Optimal
This simulation is similar to the one in Section V-C,
except that the authentication signal is optimized such that the
expected increase in LQG cost is 10% of the optimal LQG
cost. In this case, Fig. 5(a) shows the value of gk for a χ 2
detector, for the duration of 30 min, when no attack is present.
Fig. 5(b) shows the value of gk when an attack occurs after the
first 15 min. It can be observed there is a significant difference
in the statistical distribution of gk with and without an attack.
The results of this simulation over that of Section V-C show
the importance of optimizing the form of Q.
In the next set of simulations, Q is scaled by 0.2, 0.4, 0.6,
0.8, and 1, which corresponds to setting to 2%, 4%, 6%, 8%,
and 10%, respectively. A sample set of 500 simulations was
carried out to calculate the receiver operating characteristic
(ROC) curves for each signal strength. These curves are shown Fig. 7. gk as a function of time during normal operation and a replay attack.
This shows that the detector is able to detect the fall in gk due to an attack.
in Fig. 6. In this case, probability of detection 1 min after the (a) Normal operation. (b) Replay attack.
onset of the attack has been considered. It is easy to observe
that the performance of the detector improves with increase
in Q ∗ , so an appropriate signal strength can be designed VI. C ONCLUSION
considering the tradeoff between the required ROC curves and In this paper, a replay attack model on CPS was defined
allowed performance loss. and the performance of the control system under the attack
was analyzed. It was noted that for some control systems,
the classical estimation-control-failure detection strategy is not
E. Cross-Correlator Detector, Optimal resilient to a replay attack. For such a system, a technique
In this simulation, we use a cross-correlator detector with using a noisy control authentication signal was provided to
a window size of 30 samples (3 min) and the authentication improve detection at the expense of control performance. The
signal is optimized such that the expected increase in LQG relationships between the performance loss, detection rate, and
cost is 20% of the optimal LQG cost. The expected value the strength of the authentication signal were characterized.
of the correlator output gk is 30.996. Fig. 7(a) shows the A methodology for optimizing the signal was also provided,
correlator output, for the duration of 30 min, when no attack is based on the tradeoff between the desired detection perfor-
present. Fig. 7(b) shows the correlator output when an attack mance and allowable control performance loss. Three different
occurs after the first 15 min. It can be observed that gk drops sets of simulations were carried out to verify the theoretical
significantly when an attack is in progress. results and show the optimization of the control signal.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

MO et al.: DETECTING INTEGRITY ATTACKS ON SCADA SYSTEMS 11

In a real-world scenario, several engineering considerations satisfies (93). Now, suppose that Vk+1 satisfies (93). Then, by
could be employed to improve the proposed designs. For (90)
example, the authentication signal can be introduced into the 
system at random intervals instead of continuously, thus only Vk (x k ) = min E x kT W x k + u kT U u k + Vk+1 (x k+1 ) Fk
 T  
affecting the performance for some time. Future work will con- = min E x kT W x k + u ∗k + u k U u ∗k + u k
centrate on extending these techniques to more sophisticated

attack models and to distributed control systems. + x k+1
T
Sk+1 x k+1 + ck+1 Fk . (94)

A PPENDIX I As it is known that u ∗k is measurable to Fk and u k is


P ROOF OF T HEOREM 5 independent of Fk
 T  
Because of space constraints, only the basic outlines of the E u ∗k + u k U u ∗k + u k = u ∗k T U u ∗k + trace (U Q) .
proof are given below. Let the sigma-algebra generated by (95)
yk , yk−1 , . . . , y0 , u k−1 , u k−2 . . . , u 0 be defined as Fk . x k+1 can be rewritten as
For the proof of Theorem 5, Lemmas 1–3 are required.
Lemma 1: The following equations hold for the Kalman x k+1 = Ax k + Bu ∗k + Bu k + wk . (96)
filter: 
As u k and wk are independent of Ax k + Bu ∗k
x̂ k|k = E x k Fk (84)  T     
E x k+1 Sk+1 x k+1 Fk = E x kT A T Sk+1 Ax k Fk
and 
T 
Pk|k = E ek|k ek|k Fk (85) + 2u ∗k T B T Sk+1 A x̂ k|k + u ∗k T B T Sk+1 Bu ∗k
   
+ trace Sk+1 Q + trace B T Sk+1 BQ . (97)
where ek|k = x k − x̂ k|k .
Lemma 2: The following equation holds: By (95) and (97)
     ∗T  
E x kT S x k Fk = trace S Pk|k + x̂ k|k
T
S x̂ k|k (86) Vk x k = min∗
u k U + B T Sk+1 B u ∗k
uk

 
where S is any positive semidefinite matrix. + 2u ∗k T B T Sk+1 A x̂ k|k + trace Sk+1 Q
Now define   

 N−1  + E x kT W + A T Sk+1 A x k Fk


  
 


JN = min E x iT W x i + u iT U u i . (87) + E ck+1 Fk + trace B T S B + U Q .
i=0 (98)
By the definition of J , we know that Hence, the optimal u ∗k
is given by
JN  −1 T
J  = lim . (88) u ∗k = − U + B T Sk+1 B B Sk+1 A x̂ k|k (99)
N→∞ N
For fixed N and
 N−1     −1 T
   Vk x k = x̂ k|k
T
A T Sk+1 B B T Sk+1 B + U B Sk+1 A x̂ k|k
Vk (x k ) = min E x iT W x i + u iT U u i Fk (89) T  

T 
+ E x k W + A Sk+1 A x k Fk + ck+1
k=i    

and VN (x N ) = 0. By definition, it is known that E [V0 ] = + trace Sk+1 Q + trace B T S B + U Q


    

JN . In addition, from dynamic programming, Vk satisfies the = E x kT Sk x k Fk + trace B T S B + U Q


following backward recursive equation:  

+ trace W + A T Sk+1 A x̂ k|k Pk|k + ck+1


  
Vk (x k ) = min E x T
W x k + u T
U u k + Vk+1 (x k+1 ) Fk . + trace Sk+1 Q
∗ uk
k k
  
(90) = E x T Sk x k Fk + ck
k (100)
Let which completes the induction step and the proof.
 −1
 T T T T Proof of Theorem 5 follows.
Sk−1 = A Sk A + W − A Sk B B SK B + U B Sk A
Proof: Since
(91)
 
 T Jn = E (V0 ) (101)
ck−1 = ck + trace W + A Sk A − Sk−1 Pk−1|k−1  N−1 
     
+ trace (Sk Q) + trace B T Sk B + U Q (92) = E x 0T S0 x 0 + trace B T Sk+1 B + U Q
k=0
with SN = 0 and c N = 0.  N−1 
 
Lemma 3: Vk (x k ) is given by + trace W + A Sk+1 A − Sk Pk|k
T
 k=0
Vk (x k ) = E x kT Sk x k Fk +ck , k = N, N −1, . . . , 0. (93)  N−1 

Proof: Equation (93) will be proved using backward + trace Sk+1 Q (102)
induction. The induction hypothesis with VN = 0 trivially k=0
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY

JN
J = (103) [24] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure state-estimation for
N   
dynamical systems under active adversaries,” in Proc. 49th Annu.
= trace W + A T S A − S P − K C P Allerton Conf. Commun., Control, Comput., Sep. 2011, pp. 337–344.
   
[25] H. Fawzi, P. Tabuada, and S. Diggavi, Secure Estimation and Control for
+ trace S Q + trace B T S B + U Q Cyber-Physical Systems Under Adversarial Attacks. Ithaca, NY, USA:
 
Cornell Univ. Press, May 2012.
= J + trace B T S B + U Q . (104) [26] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in
Proc. 47th Annu. Allerton Conf. Commun., Control, Comput., Oct. 2009,
pp. 911–918.
[27] R. Chabukswar, Y. Mo, and B. Sinopoli, “Detecting integrity attacks on
R EFERENCES SCADA systems,” in Proc. 18th World Congr. IFAC, Mar. 2011, pp. 1–6.
[28] W. J. Broad, J. Markoff, and D. E. Sanger, “Israeli test on worm called
[1] E. A. Lee, “Cyber physical systems: Design challenges,” in Proc. 11th crucial in Iran nuclear delay,” New York Times, vol. 160, no. 55287, p. 1,
IEEE ISORC, May 2008, pp. 363–369. Jan. 2011.
[2] J. Markoff, “A silent attack, but not a subtle one,” New York Times, [29] R. K. Mehra and J. Peschon, “An innovations approach to fault detec-
vol. 160, no. 55176, pp. 1–6, Sep. 2010. tion and diagnosis in dynamic systems,” Automatica, vol. 7, no. 5,
[3] D. E. Sanger, “Obama order sped up wave of cyberattacks against Iran,” pp. 637–640, Sep. 1971.
New York Times, vol. 161, no. 55789, Jun. 2012. [30] P. E. Greenwood and M. S. Nikulin, A Guide to Chi-Squared Testing.
[4] J. Carlin. (1997, May). A Farewell to Arms [Online]. Available: New York, NY, USA: Wiley, Apr. 1996.
http://www.wired.com/wired/archive/5.05/netizen.html [31] L. L. Scharf and C. Demeure, Statistical Signal Processing: Detec-
[5] E. J. Byres and J. Lowe, “The myths and facts behind cyber security tion, Estimation and Time Series Analysis. Reading, MA, USA:
risks for industrial control systems,” in Proc. VDE Congr., vol. 116. Addison-Wesley, 1991.
Oct. 2004, pp. 1–6. [32] J. J. Downs and E. F. Vogel, “A plant-wide industrial process control
[6] A. A. Cárdenas, S. Amin, and S. S. Sastry, “Research challenges for problem,” Comput. Chem. Eng., vol. 17, no. 3, pp. 245–255, Jan. 1993.
the security of control systems,” in Proc. 3rd Conf. Hot Topics Sec., [33] N. L. Ricker, “Model predictive control of a continuous, nonlinear,
Mar. 2008, pp. 1–6. two-phase reactor,” J. Process Control, vol. 3, no. 2, pp. 109–123,
[7] A. A. Cárdenas, S. Amin, and S. S. Sastry, “Secure control: Towards Sep. 1995.
survivable cyber-physical systems,” in Proc. 28th ICDCS, Jun. 2008,
pp. 495–500.
[8] S. Amin, A. A. Cárdenas, and S. S. Sastry, “Safe and secure networked
control systems under denial-of-service attacks,” in Proc. 12th Int. Conf. Yilin Mo (M’13) received the Bachelor of Engi-
Hybrid Syst. Comput. Control, 2009, pp. 31–45. neering degree from the Department of Automation,
[9] B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and Tsinghua University, Beijing, China, in 2007, and
S. S. Sastry, “Kalman filtering with intermittent observations,” IEEE the Ph.D. degree in electrical and computer engineer-
Trans. Autom. Control, vol. 49, no. 9, pp. 1453–1464, Sep. 2004. ing from Carnegie Mellon University, Pittsburgh,
[10] L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, PA, USA, in 2012.
“Foundations of control and estimation over lossy networks,” Proc. He is a Post-Doctoral Researcher with the Depart-
IEEE, vol. 95, no. 1, pp. 163–187, Jan. 2007. ment of Control and Dynamical Systems, California
[11] A. S. Willsky, “A survey of design methods for failure detection in Institute of Technology, Pasadena, CA, USA. His
dynamic systems,” Automatica, vol. 12, no. 6, pp. 601–611, Nov. 1975. current research interests include secure control sys-
[12] R. F. Stengel and L. R. Ray, “Stochastic robustness of linear time- tems and networked control systems with applica-
invariant control systems,” IEEE Trans. Autom. Control, vol. 36, no. 1, tions in sensor networks.
pp. 82–87, Jan. 1991.
[13] T. Alpcan and T. Başar, “A game theoretic approach to decision and
analysis in network intrusion detection,” in Proc. 42nd IEEE Conf.
Rohan Chabukswar (S’10) received the Bachelor
Decision Control, vol. 3. Dec. 2003, pp. 2595–2600.
[14] S. Sundaram and C. N. Hadjicostis, “Structural controllability and of Technology degree in engineering physics from
observability of linear systems over finite fields with applications to the Indian Institute of Technology Bombay, Mumbai,
multi-agent systems,” IEEE Trans. Autom. Control, vol. 58, no. 1, India, in 2008, and the Master of Science degree in
pp. 60–73, Jan. 2013. electrical and computer engineering from Carnegie
[15] L. Lazos and R. Poovendran, “SeRLoc: Robust localization for wireless Mellon University, Pittsburgh, PA, USA, where he
sensor networks,” ACM Trans. Sensor Netw., vol. 1, no. 1, pp. 73–100, is currently pursuing the Ph.D. degree.
His current research interests include cyber-
Aug. 2005.
[16] L. Lazos, R. Poovendran, and S. Čapkun, “ROPE: Robust position physical systems security and secure control systems
estimation in wireless sensor networks,” in Proc. 4th Int. Symp. Inf. with applications to smart grids.
Process. Sensor Netw., 2005, pp. 1–8.
[17] F. Pasqualetti, A. Bicchi, and F. Bullo, “Distributed intrusion detection
for secure consensus computations,” in Proc. 46th IEEE Conf. Decision
Control, Dec. 2007, pp. 5594–5599. Bruno Sinopoli (M’05) received the Dr.Eng. degree
[18] F. Pasqualetti, F. Dörfler, and F. Bullo, “Cyber-physical security via geo- from the University of Padova, Padova, Italy, in
metric control: Distributed monitoring and malicious attacks,” in Proc. 1998, and the M.S. and Ph.D. degrees in electrical
IEEE Conf. Decision Control, Dec. 2012, pp. 1–8. engineering from the University of California at
[19] M. Zhu and S. Martínez, “Attack-resilient distributed formation control Berkeley, Berkeley, CA, USA, in 2003 and 2005,
via online adaptation,” in Proc. 50th IEEE CDC-ECC, Dec. 2011, respectively.
pp. 6624–6629. He joined the faculty at Carnegie Mellon Univer-
[20] A. Giani, S. S. Sastry, K. H. Johansson, and H. Sandberg, “The VIKING sity, Pittsburgh, PA, USA, where he is an Associate
project: An initiative on resilient control of power networks,” in Proc. Professor with the Department of Electrical and
2nd ISRCS, Aug. 2009, pp. 31–35. Computer Engineering with courtesy appointments
[21] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results in mechanical engineering and in the Robotics Insti-
in networked control systems,” Proc. IEEE, vol. 95, no. 1, pp. 138–162, tute. His current research interests include networked embedded control
Jan. 2007. systems, distributed estimation and control with applications to wireless
[22] G. Dán and H. Sandberg, “Stealth attacks and protection schemes for sensor-actuator networks and cyber-physical systems security.
state estimators in power systems,” in Proc. 1st IEEE Int. Conf. Smart Dr. Sinopoli received the 2006 Eli Jury Award for Outstanding Research
Grid Commun., Oct. 2010, pp. 214–219. Achievement in the areas of systems, communications, control and signal
[23] H. Sandberg, A. Teixeira, and K. H. Johansson, “On security indices processing at U.C. Berkeley, the 2010 George Tallman Ladd Research Award
for state estimators in power networks,” in Proc. 1st Workshop Secure from Carnegie Mellon University, and the National Science Foundation Career
Control Syst., Cyber Phys. Syst., Apr. 2010, pp. 1–6. Award in 2010.

You might also like