Vous êtes sur la page 1sur 13

1

Sensor Switching Control Under Attacks Detectable


by Finite Sample Dynamic Watermarking Tests
Pedro Hespanhol, Matthew Porter, Ram Vasudevan, and Anil Aswani
arXiv:1909.00014v1 [math.OC] 30 Aug 2019

Abstract—Control system security is enhanced by the ability is a disturbance only known to the controller. Then it uses
to detect malicious attacks on sensor measurements. Dynamic consistency tests to detect attacks by checking for correlation
watermarking can detect such attacks on linear time-invariant between sensor measurements and the private excitation. The
(LTI) systems. However, existing theory focuses on attack detec-
tion and not on the use of watermarking in conjunction with goal is to be able to detect all sensor attacks whose magnitude
attack mitigation strategies. In this paper, we study the problem exceeds some prespecified amount.
of switching between two sets of sensors: One set of sensors has
high accuracy but is vulnerable to attack, while the second set of
sensors has low accuracy but cannot be attacked. The problem is A. Asymptotic Results for Dynamic Watermarking
to design a sensor switching strategy based on attack detection
by dynamic watermarking. This requires new theory because Research on dynamic watermarking can be divided into two
existing results are not adequate to control or bound the behavior main areas of contribution: The first is the development of
of sensor switching strategies that use finite data. To overcome statistical hypothesis testing that tries to detect corrupted mea-
this, we develop new finite sample hypothesis tests for dynamic
watermarking in the case of bounded disturbances, using the
surements by observing correlations between sensor outputs
modern theory of concentration of measure for random matrices. and the dynamic watermark [17], [20], [18], [16], [21]. This set
Our resulting switching strategy is validated with a simulation of techniques apply to general LTI systems, but cannot ensure
analysis in an autonomous driving setting, which demonstrates the zero-average-power property for general attack models.
the strong performance of our proposed policy. The second line of work [22], [23] considers general attack
Index Terms—Dynamic watermarking, observer switching con- models and develop tests able to ensure that only attacks which
trol, finite sample tests add a zero-average-power signal to the sensor measurements
can remain undetected, but constrain their analysis to LTI
I. I NTRODUCTION systems with specific structure on their dynamics.
More recently, The work done in [24] and [25] attempts to
T HE secure and resilient control of cyber-physical systems
(CPS) requires safe operation in the face of malicious
attacks that can occur on either the physical layer (e.g.,
bridge this gap by providing statistical guarantees for complex
types of attacks for general LTI systems. While both papers
sensors and actuators) or the cyber layer (e.g., communica- address a general MIMO LTI system, the set of assumptions
tion and computation capabilities)[1]. Real-life incidents like are somewhat different: the former assumes open-loop stability
the Maroochy-Shire incident [2], the Stuxnet worm [3], and of the LTI system, and the latter restricts the attack form.
others [4] illustrate the importance of concerns about CPS In particular, in [25], the tests provided are able to detect
security. One approach to secure control has been to focus on if a general MIMO LTI system is under a fairly general
cybersecurity of CPS [5], [6], [7], [8], but this does not fully type of attack. In particular, it considers additive attacks that
exploit the physical aspects of CPS. An alternative is attack can dampen/amplify the system measurements, can replay the
identification and detection considering the interplay between system from a different initial condition, or can do both. This
the cyber and physical parts of CPS [9], [4], [10], [11]. Many form of attack, while arguably simple, encompasses many of
of these techniques are static (i.e., do not consider system the types of attacks reported in real-life incidents (e.g., replay
dynamics) [12] or passive (i.e., do not actively control system attacks [3]) as well as compensate for external disturbances not
to identify malicious nodes and sensors) [13], [14], [15]. accounted by the system model (e.g., wind when represented
In contrast, dynamic watermarking is an active defense via internal model principle [25]).
technique that injects perturbations into the system control in We proceed to briefly summarize the results of [25], as it is
order to detect attacks [16], [17], [18], [19]. More specifically, the foundation for this current paper. Consider a MIMO LTI
this method applies a private excitation to the system, which system with partial observations

This work was supported by the UC Berkeley Center for Long-Term xn+1 = Axn + Bun + wn
Cybersecurity, and by a grant from Ford Motor Company via the Ford-UM (1)
yn = Cxn + zn + vn
Alliance under award N022977.
Pedro Hespanhol and Anil Aswani are with the Department of In-
dustrial Engineering and Operations Research, University of California, for some measurement noise zn , system disturbance wn , and
Berkeley, CA 94720, USA pedrohespanhol@berkeley.edu, attack vector vn . Suppose (A, B) is stabilizable, (A, C) is
aaswani@berkeley.edu detectable. Typically, dynamic watermarking approaches will
Matthew Porter and Ram Vasudevan are with the Department of Me-
chanical Engineering, University of Michigan, Ann Arbor, MI 48109, USA add an additive signal to the control input un = Kxn + en ,
matthepo@umich.edu, ramv@umich.edu where K is some feedback matrix and en is our watermarking
2

signal that is unknown to the attacker. Now let k ′ = min{k ≥ which to the best of our knowledge has not been done before.
0 | C(A + BK)k B 6= 0}. If we define the test vectors Namely, we provide statistical tests that provide finite-time
guarantees on attack detection, instead of relying of asymptotic
ψn⊤ = (C x̂n − yn )⊤ e⊤
 
n−k′ −1 , (2)
behavior of sums of random matrices. We also relate the
and the following holds [25]: magnitude of an attack to our test power, by describing the
PN −1

CΣ∆ C ⊤ + ΣZ 0
 inherent trade-off between the test capability of triggering true
1
as-limN N n=0 ψn ψn⊤ = (3) detection, and the magnitude of the attacks that are allowed to
0 ΣE
remain undetected in the long run. The finite sample analysis
for some specific matrices Σ∆ , ΣE , ΣZ , then all attack vectors of dynamic watermarking requires the use of random matrix
vn following a particular model [25] are constrained in power concentration inequalities, which are useful in analyzing the
PN −1 matrices involved in the evolution of LTI system dynamics.
as-limN N1 n=0 vn⊤ vn = 0. (4)
The second major contribution of this paper is to provide finite
Though these tests only provide asymptotic guarantees, that sample concentration-based tests, which allow us to detect
is enough to construct a statistical version of the test, similar attacks and allow switching decisions based on such tests
to [22] where a hypothesis test is constructed by thresholding to correctly report attack detections infinitely often. Namely,
the negative log-likelihood. It follows that under a Gaussianity if there is no attack, we develop a finite sample test that
assumption for process and sensor noise, the matrix in (3) falsely reports attacks only a finite number of times. This is
follows a well-behaved Wishart distribution. While that ap- a crucial feature because it also implies that in the long-run
proach allows us to construct hypothesis tests using known the switching rule based on such a test is correctly selecting
distributions, the dependency of subsequent samples make which observer is active infinitely often.
finite sums display more complex behavior. Then it is up
to the designer of the watermark to specify a threshold that C. Outline
controls the false error rate. In this framework a rejection of the
In Sect. II, we define our notation for this paper. We also
hypothesis test corresponds to detection of an attack, while an
present the random matrix concentration inequalities that we
acceptance corresponds to the lack of detection of an attack.
use to perform our finite sample analysis. Next, in Sect. III we
This notation emphasizes the fact that achieving a specified
present our general LTI framework with switching observers.
false error rate requires changing the threshold.
Then, we apply the concentration inequalities to the LTI setting
in Sect. IV in order to obtain appropriate concentration for
B. Intelligent Transportation Systems and Observer Switching
the matrices involved. In Sect. V and Sect. VI, we present
Though the design and analysis of intelligent transportation the finite sample consistency tests and a simple threshold that
systems (ITS) has drawn renewed interest [23], [26], [27], [28], relates the attack magnitude to the power of our test. Next,
[29], [30], [31], there has been less work on secure control of in Sect. VI we provide some numerical results demonstrating
ITRS. One recent work considered the use of dynamic water- our approach on an autonomous vehicle application.
marking to detect sensor attacks in a network of autonomous
vehicles coordinated by a supervisory controller[23], while II. P RELIMINARIES
[32] considered a platoon of vehicles where attacks happen not In this section, we define all relevant notation concerning
only on the sensors but also on the communication channel. the random matrix analysis done throughout the paper. We also
A particular feature of ITS is the possibility of redundancy define the key concepts of Stein’s Method [36], [37] applied
in sensing. For instance, one can use a highly accurate satellite- to matrices and the relevant matrix concentration inequalities
based sensor (susceptible to external attack) and an on-board that will be used. This method turns out to be key to our
infrared sensor (not susceptible to external attack) in order to finite sample analysis of dynamic watermarking, as it involves
obtain spatial data. Then, one way of safeguarding a system analyzing sums of inter-temporal dependent matrices.
susceptible to attacks is to switch from the high accuracy
sensor to the on-board sensor when an attack is detected A. Notation
[33]. This approach naturally leads to systems with distributed
We use the symbol k·k for the spectral norm of a matrix,
observers with dynamic switching decision rules [34], [35].
which is the largest singular value of a general matrix. The
In this scenario, it is crucial to design hypothesis tests that
space of d × d Hermitian real-valued matrices is denoted
are able to detect attacks while having a decision rule that
by Hd . Moreover, the symbols λmax (A), λmin (A) are re-
correctly selects which observer is to be used. Because control
spectively the maximum and the minimum eigenvalues of
switching occurs at finite instances in time, the previous
an Hermitian matrix A ∈ Hd . The symbol  refers to the
asymptotic results of dynamic watermarking cannot be used
semidefinite partial order, namely A  B if and only if B − A
for this purpose. The reason, which is subtle, is that hypothesis
is positive semi-definite (p.s.d). For a matrix A, we let (A)ij
tests based on characterization of asymptotic distributions will
denote the (ij)-th element of A. We let tr(·) do the denote the
not have the correct theoretical properties in order to ensure
trace operator.
proper control of the false alarm rate. Consequently, new finite
We also define a master probability space (Ω, F , P ) and a
sample hypothesis tests need to be constructed.
filtration {Fk } contained in the master sigma algebra:
The first contribution of this paper it to provide finite-
time guarantees on attack detection via dynamic watermarking, Fk ⊂ Fk+1 and Fk ⊂ F , ∀k ≥ 0. (5)
3

where σ 2 = 12 k Pk2 + Q2k )k.


P
Given such filtration we also define the conditional expectation k
Ek [·]. We also let ǫ denote a Radamacher random variable, that
Next we present a version of the McDiarmid inequality for
takes values in {−1, 1} with equal probability. The random
self-reproducing random matrices.
matrix concentration inequalities involved in this work are
derived based on the method of exchangeable pairs based on Proposition 2. [37] Let z = (Z1 , ..., Zn ) be a random vector
the Stein’s Method [36]. Let Z and Z ′ be random vectors taking values in a space Z, and, for each index k, let Zk′
taking values in a space Rd . We say that (Z, Z ′ ) is an and Zk be conditionally i.i.d. given (Zj )j6=k . Suppose that
exchangeable pair if it has the same distribution as (Z ′ , Z). H : Z → Hd is a function that satisfies the self-reproducing
Next, we define a matrix Stein pair: property
Definition 1. Let Z and Z ′ be an exchangeable pair of random n
vectors taking values in a space Z, and let ψ : Z → Hd be a
X
(H(z) − E[H(z)|(Zj )j6=k ]) = s · (H(z) − E[H(z)]) a.s.
measurable function. Define the random Hermitian matrices k=1
(11)
X = ψ(Z) and X ′ = ψ(Z ′ ). (6) for a parameter s > 0, as well as the bounded difference
We say that (X, X ′ ) is a matrix Stein pair if there is a constant property
β ∈ (0, 1] for which E[X − X ′ |Z] = βX a.s.. ′
E[(H(z) − H(Z1 , ..., Zk , ..., Zn ))2 |z]  Pk2 (12)
Note it follows from the above definition that E[X] = 0.
Also, β is called the scale factor of the pair (X, X ′ ). for each index k a.s., where Pk is a deterministic matrix in
Lastly, we present the concept of dilations, which are used Hd . Then, for all t ≥ 0,
to derive our results. A symmetric dilation of a real-valued 2
rectangular matrix B is P{λmax (H(z) − E[H(z)]) ≥ t} ≤ d · e−st /L
(13)
 
0 B Pn
for L = k=1 Pk2 .
D(B) = (7)
B⊤ 0
Now we provide an essential property that is called sym-
Note that D(B) is always symmetric, and it satisfies the
metrization, which is a generalization for summation of the
following useful property: symmetrization property presented in [37] for a single matrix:
BB ⊤
 
0
D(B)2 = (8) Lemma 1. Let {Xi }ni=1 be a sequence of random Hermitian
B⊤B 0
matrices with E[Xi ] = 0. Then
Moreover, observe that the norm of the symmetric dilation h  Pn i h  Pn i
has a useful relationship with the norm of the original matrix E tr e i=1 Xi ≤ E tr e2 i=1 ǫi Xi (14)
λmax (D(B)) = kD(B)k = kBk. We will construct bounds
for symmetric matrices and then we will extend those bounds where {ǫi }ni=1 are i.i.d. Radamacher random variables.
to non-symmetric matrices by using dilations.
Proof. First, we construct a sequence of copies {Xi′ }ni=1
independent from {Xi }ni=1 , and let E′ denote the expectation
B. Matrix Concentration Inequalities
with respect to {Xi′ }ni=1 . So we have
In order for us to develop finite sample tests we require
matrix concentration inequalities. The random matrices in- h  Pn i h  Pn ′ ′
i
E tr e i=1 Xi = E tr e i=1 Xi −E [Xi ] ≤
volved in this paper are not independent in the general case. h  Pn i h  Pn i
We first present a version of matrix Hoeffding inequality for ′ ′
E tr e i=1 Xi −Xi = E tr e i=1 ǫi (Xi −Xi ) (15)
conditionally independent sums of random matrices, that is
random matrices that become independent after conditioning where we have sequentially used Jensen’s inequality and then
on another matrix. This theorem, and the following theorems the symmetry of (Xi −Xi′ ). Now we finish the proof by noting
about concentrations, were first introduced by [37], as gener-
alizations of the (respective) independent cases. h  Pn i h  Pn ′
i
E tr e i=1 Xi ≤ E tr e i=1 ǫi (Xi −Xi ) ≤
Proposition 1. [37] Consider a finite sequence (Yk )(k≥1) of h  Pn Pn ′
i
random matrices in Hd that are conditionally independent E tr e i=1 ǫi Xi e− i=1 ǫi Xi ≤
given an auxiliary random matrix Z and finite sequences   P
n
1/2  Pn  
′ 1/2
(Pk )k≥1 and (Qk )k≥1 of deterministic matrices in Hd . Assume E tr e2 i=1 ǫi Xi tr e−2 i=1 ǫi Xi =
that h  Pn i
E tr e2 i=1 ǫi Xi (16)
E[Yk |Z] = 0, Yk2  Pk2 , E[Yk2 |(Yj )j6=k ]  Q2k a.s.∀k, (9)
then for all t ≥ 0 we have where we have sequentially used the Golden-Thompson in-
! ! equality, the Cauchy-Schwartz inequality two times, and the
P λmax
X
Yk ≥t
2
≤ d · e−t /2σ2
(10) fact that both factors are identically distributed. (See [38] for
k=0
the definition of those properties.)
4

Moreover, let x̃⊤ = x⊤ x′⊤ , and define:


 
III. LTI S YSTEM WITH S WITCHING
B ⊤ = B ⊤ B ⊤ , D⊤ = I 0 , and
   
We consider a MIMO LTI system that allows the controller
to switch between two sets of sensors, and we will assume (20)
 
A BK
that both the measurement and process noise have stochastic A(α) = .
−L(α)C(α) A + BK + L(α)C(α)
distributions with a bounded support. Namely, we will assume
that the noise vectors have bounded norm almost surely. Then the closed-loop system with private excitation is given
by:
x̃n+1 = A(αn )x̃n + Ben + Dwn + L(αn )(zn (αn ) + αn vn ).
A. LTI Formulation (21)
′ ′
Consider a MIMO LTI system with partial observations and If we define the observation error δ = x − x, then with the
change of variables x̌⊤ = x⊤ δ ′⊤ we have the dynamics
 
switching in the sensing
x̌n+1 = A(αn )x̌n +Ben +Dwn +L(αn )(zn (α)+αvn ) (22)
xn+1 = Axn + Bun + wn
(17)
yn = C(αn )xn + zn (αn ) + αn vn where we further define the following matrices
B ⊤ = B ⊤ 0 , D⊤ = I −I , L(α) = L(α),
   
where x ∈ Rp , u ∈ Rq , y, z, v ∈ Rm , and αn ∈ {0, 1}. The
(23)
 
wn represents zero mean i.i.d. process noise with covariance A + BK BK
and A(α) = .
ΣW . Moreover, we have 0 A + L(α)C(α)

Cn = C(αn ) = αn C1 + (1 − αn )C2 Recall that A(α) is Schur stable whenever A + BK and A +


(18) L(α)C(α) are both Schur stable.
zn (αn ) = αn ζn + (1 − αn )ηn There is one technical point that needs to be addressed
where ζn and ηn represent zero mean i.i.d. measurement noise before proceeding: Since there is switching between observers,
with covariance matrices Σζ  Ση , respectively. Note that the closed-loop system will not necessarily be stable even
αn ∈ {0, 1} should be interpreted as the switching control though A + BK and A + L(α)C(α) are both Schur stable.
action that selects between the observability matrices C1 or One approach to resolving this issue is limiting the rate of
C2 . The vn is as an additive measurement disturbance added switching, as follows:
by an attacker, which can only affect the observations made Proposition 3. let P be the solution of the Lyapunov equation
when the mode α = 1 is selected. The idea of this model is
that C1 corresponds to a more accurate set of sensors than A(1)P A(1)⊤ − P = −I, (24)
C2 , but conversely that some subset of sensors within C1 are where I is the identity matrix. Let τ be the smallest positive
susceptible to an attack whereas the set of all sensors within integer such that
C2 are not susceptible to an attack. We further assume the
process noise is independent of the measurement noise, that A(0)τ P (A(0)τ )⊤ − P ≤ −I. (25)
is wn for n ≥ 0 is independent of ζn , ηn for n ≥ 0. Lastly we
Then the the closed-loop system is stable under switching
assume both measurement and disturbance noises are bounded
policies where: whenever we switch from α = 1 to α = 0 we
in magnitude. Namely, we assume that both measurement
maintain α = 0 for at least τ time steps before any possible
noise and systems disturbances are given by i.i.d. bounded
switching occurs to α = 1.
random vectors: kwk k ≤ Kw and kzk k ≤ Kz , ∀k ≥ 0.
If (A, B) is stabilizable and both (A, C1 ) and (A, C2 ) are Lastly, we note that such a τ exists because A(0) is Schur
detectable, then an output-feedback controller can be designed stable.
when vn ≡ 0 using an observer and the separation principle.
Let K be a constant state-feedback gain matrix such that IV. M ATRIX I NEQUALITIES FOR G ENERAL LTI S YSTEMS
A + BK is Schur stable, and let Li be a constant observer We will now apply the abstract concentration inequalities
gain matrix such that A + Li Ci is Schur stable for i ∈ {1, 2}. presented in Sect. II to our LTI setting with switching. We
The idea of dynamic watermarking in this context will be will begin our analysis consider that the system is under no
to superimpose a private (and random) excitation signal en attack. Under no attack we would like to keep using the most
known in value to the controller but unknown in value to accurate sensor – that is keeping our switching control αn ≡ 1
the attacker. As a result, we will apply the control input for all n ≥ 0. However, as it is usually observed for any
un = Kx′n + en , where x′n is the observer-estimated state kind of tests based on random quantities, we are susceptible
and en are i.i.d. random vectors on a bounded support, such to commit what is commonly known as false positive or type I
that kek k ≤ Ke , ∀k ≥ 0, with zero mean and constant variance errors. Hence our goal is to provide finite sample tests based on
ΣE fixed by the controller. Let matrix concentration of measure such that type I errors happen
only a finite number of times throughout the evolution of the
L(α) = αL1 + (1 − α)L2
system. This would imply that those tests report correctly that
Ln = L(αn ) (19) there is no attack infinitely often. To that end, we will utilize

L(α) = 0 −L(α)⊤
 
two observers: The first observer obtain system measurements
5

from the switched system, using C(αn ); The second observer Under our key assumption that both measurement noise and
never switches and keeps measuring the system using the systems disturbances are given by i.i.d. bounded random
vulnerable sensor, using C1 . The finite-time statistical tests and vectors we have that
the concentration inequalities analysis presented in this section n−1
X
are referring to quantities associated with the second observer. kδn k ≤ D̄k Kw + L̄k Kz , (36)
For ease of notation and presentation we drop the subscript of k=0
the analysis define C = C1 and L = L1 . Moreover, for the and that
second observer we define: x̂n and δn to denote the estimate
state and observation error: kCδn − zn k ≤
n−1
x̂n+1 = (A + BK)x̂n + LC(x̂n − xn ) + Ben − Lzn (26) Kz +
X
C D̄k Kw + C L̄k Kz = K̄n . (37)
and δn = x̂n − xn . Then by the same type of variable k=0

substitution: So we have (Cδn − zn )(Cδn − zn )⊤  K̄n2 I.


δn+1 = (A + LC)δn − wn + −Lzn (27) Now consider the matrix (3) that was used in the intro-
duction to define the asymptotic tests. But now, instead of
We will start by bounding the vector Cδn − zn :
letting n go to infinity, we keep it finite and then analyze the
Theorem 1. Let δn = x̂n −xn . Assume that both measurement finite summation of matrices. Let k ′ = min{k ≥ 0 | C(A +
noise and systems disturbances are given by i.i.d. bounded BK)k B 6= 0}. The existence of such k ′ is guaranteed (see
random vectors: kwk k ≤ Kw and kzk k ≤ Kz , ∀k ≥ 0. Then [25]). Moreover, define
when vn ≡ 0 for all n ≥ 0 we have
ψn⊤ = (C x̂n − yn )⊤ e⊤
 
n−k′ −1 . (38)
kCδn − zn k ≤ K̄n (28) Then we have:
Pn−1
where K̄n = Kz + k=0 C D̄k Kw + C L̄k Kz and N −1
1 X
ψn ψn⊤ =
(Cδn − zn )(Cδn − zn )⊤  K̄n2 I. (29) N n=0
"P #
N −1 PN −1
Moreover, it follows that 1 n=0 (C x̂n − yn )(C x̂n − yn )
⊤ ⊤
n=0 (C x̂n − yn )en−k′ −1
P N −1 ⊤
P N −1 ⊤
N n=0 en−k′ −1 (C x̂n − yn ) n=0 en−k′ −1 en−k′ −1
E[(Cδn − zn )(Cδn − zn )⊤ ] =
(39)
n−1
!
X (30) It suits our purposes to make sure that the above matrix is
C D̄k Σw D̄k⊤ + L̄k Σz L̄⊤
k C ⊤ + Σz
k=0 centered (that is have zero expected value). In order to achieve
this, we construct the matrix
where
D̄k = −(A + LC)n−1−k N −1
1 X
N −1
1 X
n−1−k ⊤
(31) Ψn = ψn ψn⊤ −
L̄k = −(A + LC) L . N n=0 N n=0
Proof. Recall our definition of δn (Eq. 27) we can write: 1 PN −1
 

n=0 E[(Cδn − zn )(Cδn − zn ) ] 0
n−1 N 0 N Σe
(40)
X
δn = (A+LC)n δ0 − (A+LC)n−1−k (Iwk +L⊤ zk ). (32)
k=0
Note that it follows that: E[Ψn ] = 0, ∀n ≥ 0, since C x̂n −
yn = Cδn − zn . We wish to control the singular values of
Assuming δ0 = 0, we have that
the above matrix. We will do so by analyzing each individual
n−1
X block. To ease the notation we define
δn = D̄k wk + L̄k zk . (33) N −1
k=0
1 X
ΦN = Ψn (41)
Now, we can define the following: N n=0

Cδn δn⊤ C ⊤ = and we define each submatrix


N −1
n−1
! n−1
!⊤
(1) 1 X
X X (34) ΦN = (C x̂n − yn )(C x̂n − yn )⊤ −
C D̄k wk + L̄k zk D̄k wk + L̄k zk C ⊤, N n=0
k=0 k=0 N −1
1 X
and obtain the expectation directly: E[(C x̂n − yn )(C x̂n − yn )⊤ ] (42)
N n=0

E[(Cδn − zn )(Cδn − zn ) ] = N −1
n−1
! (2) 1 X
X (35) ΦN = (C x̂n − yn )e⊤
n−k′ −1 (43)
C D̄k Σw D̄k⊤ + L̄k Σz L̄⊤
k C ⊤ + Σz . N n=0
k=0 N −1
(3) 1 X
Since zn and δn are independent for all n. Moreover, both ΦN = (en−k′ −1 e⊤
n−k′ −1 − Σe ) (44)
N n=0
system disturbances and measurement noise are independent.
6

such that " # where dn = (Cδn − zn ). If vn ≡ 0 for all n ≥ 0, then the


(1) (2)
ΦN ΦN function H(e) satisfies the bounded differences property
ΦN = (2) (3) . (45)
(ΦN )⊤ ΦN E[(H(e) − H(e′ ))2 |e]  P̄n2 (53)
(1)
Our next step is to bound the norm of ΦN . ′
for P̄n2 = max{Pn2 , Pn2 }I with positive constants Pn2 , Pn2 :

Theorem 2. If vn ≡ 0 for all n ≥ 0, then the following ′


Pn2 = kE[Q′n |e]k ≤ K̄n2 (Ke2 + kΣE k) (54)
concentration inequality holds for all N ≥ 1 and all t:
Pn2 = Ke2 + tr(ΣE ×
! 
(55)

(1) 2 2 (1)
P ΦN ≥ t ≤ m · e−N t /cN (46)
n−1
!

X
⊤ ⊤ ⊤
C D̄k Σw D̄k + L̄k Σz L̄k C + Σz (56)

P 
(1) N −1
where cN = 8 k=0 K̄k4 I . k=1


Proof. Let qn = dn e⊤ ⊤
n−k′ −1 − dn en−k′ −1 and observe that
Proof. We start by defining the matrix Yn as
2 
Yn = (Cδn − zn )(Cδn − zn )⊤ − E[(Cδn − zn )(Cδn − zn )⊤ ].

0 qn
E[(H(e) − H(e′ ))2 |e] = E |e =
(47) qn⊤ 0
Now define a vector of independent i.i.d. Radamacher random
  
Qn 0
variables {ǫn }N −1 E |e (57)
n=0 . We use the symmetrization property to 0 Q′n
write
where we have defined
N −1 N −1
(1) 1 X 2 X
′ ′
ΦN ≤ Yn ≤ ǫn Yn . (48) Qn = dn e⊤ ⊤ ⊤ ⊤
n−k′ −1 en−k′ −1 dn + dn en−k′ −1 en−k′ −1 dn

N N ′ ′ (58)
n=0 n=0
Q′n = en−k′ −1 d⊤ ⊤ ⊤ ⊤
n dn en−k′ −1 + en−k′ −1 dn dn en−k′ −1
Now we define a filtration Z = (Yn )n≥1 where Wn =
Now we have
ǫn Yn , n ≥ 1. Then we see that each summand Wn is condi-
tionally independent given Z, because the Radamacher random E[Qn |e] =
variables are all i.i.d. This allows us to use the Hoeffding ′ ′

Bound for conditionally independent sums to obtain E[dn e⊤ ⊤ ⊤ ⊤


n−k′ −1 en−k′ −1 dn + dn en−k′ −1 en−k′ −1 dn |e] =

N −1 ! (e⊤ ⊤
n−k′ −1 en−k′ −1 )E[dn dn |e]+
1 X ′ ′
⊤ ⊤
P Yn ≥ t ≤ E[en−k ′ −1 en−k′ −1 |e]E[dn dn |e] (59)

N
n=0
N −1 ! Recalling that kek k ≤ Ke ∀k ≥ 0 and (35), it follows that
2 X 2 2 2
P ǫn Yn ≥ t ≤ d · e−N t /8σ (49)

kE[Qn |e]k ≤ Ke2 + tr(ΣE ×

N
n=0
n−1
!
P
 X
N −1
for σ 2 = k=0 K̄k4 I . The first inequality follows from C D̄k Σw D̄k⊤ + L̄k Σz L̄⊤ C ⊤ + Σz = Pn2 . (60)

k

applying the Laplace transform method and using the property k=1
h  Pn i h  Pn i Moreover, it follows that
E tr e i=1 Xi ≤ E tr e2 i=1 ǫi Xi . (50)
kE[Q′n |e]k =
We also used the fact Wk2  K̄k4 I for all k, and the fact that ′ ′

en−k′ −1 d⊤ ⊤ ⊤ ⊤
n dn en−k′ −1 + en−k′ −1 dn dn en−k′ −1
1 = (E[(d⊤ ⊤
n dn )|e])en−k′ −1 en−k′ −1 +
X 
X 4 2 4
K̄k I + E[Wk |(Wj )j6=k ] ≤ K̄k I (51)

2
′ ′
k

k
(E[d⊤ ⊤
n dn |e])E[en−k′ −1 en−k′ −1 |e] (61)

since E[Wk2 |(Wj )j6=k ] = E[Yk2 |(Wj )j6=k ]  K̄k4 I. So we get


(2) ′
Next, we provide a bound on the norm of ΦN . But before kE[Q′n |e]k ≤ K̄n2 (Ke2 + kΣE k) = Pn2 (62)
that we need the following proposition:
Hence it follows that
Proposition 4. Let e = (e1 , ..., ek , ..., en ) be a sequence of
E[(H(e) − H(e′ ))2 |e] ≤ max{Pn2 , Pn′ 2 }

random vectors taking values in a space Z. Now construct (63)
an exchangeable pair e′ = (e1 , ..., e′k , ..., en ) where ek and e′k So it follows that
are conditionally i.i.d. given (ej )j6=k and k is an independent
coordinate drawn uniformly from {1, ..., n}. We define E[(H(e) − H(e′ ))2 |e]  P̄n2 (64)
" # ′
where P̄n2 = max{Pn2 , Pn2 }I.
PN −1
0 n=0 (dn )e⊤
n−k ′ −1
H(e) = PN −1 ⊤
n=0 en−k′ −1 (dn ) 0 Now we are ready to provide our theorem.
(52)
7

Theorem 3. If vn ≡ 0 for all n ≥ 0, then the following Theorem 4. The following concentration inequality holds for
concentration inequality holds for all N ≥ 1 and all t: all N ≥ 1 and all t:
 !  !
2 2 (2)
(3)
(2) (3) 2 2
P ΦN ≥ t ≤ (m + p) · e−N t /cN (65) P ΦN ≥ t ≤ 2q · e−N t /cN (73)
P
(2)
P
where cN = N −1 2 ′
2 2 2 (3) N −1
P̄k for P̄k = max{Pk , Pk }I, where where cN = k=0 (K̄e2 I − Σe )2 + E[(en e⊤ 4 2

k=0 n ) ] − Σe .

Pk2 = Ke2 + tr(ΣE ×



Proof. We wish to provide a bound on the norm of
n−1
!
N −1
1 X
X
C D̄k Σw D̄k⊤ + L̄k Σz L̄⊤ C ⊤ + Σz (66) (3)
(en−k′ −1 e⊤

k ΦN = n−k′ −1 − Σe ) (74)

k=1
N n=0
Pk′2 = K̄n2 (Ke2 + kΣE k).
Define Ēn = en−k′ −1 e⊤
n−k′ −1 − Σe . We apply the Hoeffding
Proof. We wish to provide bounds on the operator norm of bound for the independent sum to obtain
N −1
1 X 1 NX−1
!
(2)
(Cδn − zn )e⊤

ΦN = n−k′ −1 (67) P
2 2
Ēn ≥ t ≤ d · e−N t /2σ
2
(75)
N n=0 N
n=0
To achieve that, we will use the concept of matrix Stein P
N −1 2
pairs as defined previously. Let E = (e1 , ..., ek , ..., en ) be a for σ 2 = 21 k=0 K̄e2 I − Σe + E[(en e⊤ n )4
] − Σ 2
e , since
sequence of random vectors taking values in a space Z. Now
N −1
construct an exchangeable pair E ′ = (e1 , ..., e′k , ..., en ) where X 2
Ēn2  K̄e2 I − Σe (76)
ek and e′k are conditionally i.i.d. given (ej )j6=k and k is an
k=0
independent coordinate drawn uniformly from {1, ..., n}. We
and by the definition of expectation we have that E Ēn2 =
 
define H(e) as in Proposition 4:
" PN −1 # E[(en−k′ −1 e⊤ 4 2
n−k′ −1 ) ] − Σe .

0 n=0 b n e n−k −1′
H(e) = PN −1 ⊤
(68)
n=0 en−k′ −1 bn 0
V. F INITE S AMPLE T ESTS FOR G ENERAL LTI S YSTEMS
where bn = Cδn − zn . Since E(H(e)) = 0, this means H(e) In this section, we provide our finite sample tests based
satisfies the self-reproducing property on dynamic watermarking for general LTI Systems with
N
X switching. In the previous section, we obtained concentration
H(e) − E[H(e)|(ej )j6=(n−k′ −1) ] = H(e) (69) inequalities for each of the submatrices of ΦN (45). Note Φ3
n=1 is the private excitation matrix we get to design, and so it is
for the choice of parameter s = 1 (see (11) for the definition in our power to choose the dynamic watermark to display a
of s), since for all n ∈ {1, ..., N } we have desired concentration behavior.
We are now ready to state the main theorem of this work,
H(e) − E[H(e)|(ej )j6=(n−k′ −1) ] = which basically characterizes the behavior of a switching rule

0 (Cδn − zn )e⊤
 based on the finite-time concentration inequalities. Our switch-
n−k′ −1 (70)
en−k′ −1 (Cδn − zn )⊤ 0 ing rule is constructed by thresholding the block submatrices
(1) (2)
ΦN and ΦN using the measurements of the second observer
Next, we use Proposition 4 to state that H(e) also satisfies the ((26) and (27)) and applying the switch on the first observer
bounded differences property. So we have once those thresholds are violated, and the we switch back
E[(H(e) − H(e′ )2 |e]  P̄n2 (71) on violations disappear. Let S be a positive constant such that
(1) (2) (3)

max{cN , cN , cN } ≤ N S; such an S exists when (A+BK)
for P̄n2 = max{Pn2 , Pn2 }I. Hence, we apply the McDiarmid and (A + Ln Cn ) are Schur stable provided that the switching
inequality to the dilation H(e) ∈ Hm+p to obtain rule satisfies the condition specified in Proposition 3.
Theorem 5. Recall the closed-loop MIMO LTI system (17)
!
1
P N H(e) ≥ t =
with αn being our switching control action that chooses be-
tween ptwo different observation matrices. Define the threshold
(1) (2)
N −1 !
1 X

tN = (1 + ρ)S log N/N , where ρ > 0. Let ΦN and ΦN
P (Cδn − zn )en−k′ −1 ≥ t ≤

N be defined using the measurements from Eq. 26 and Eq. 27.
n=0
2 2
Let αN be the switching decision rule with
(m + p) · e−N t /L
(72) • we choose
the switching
input αN = 0 when we have
P (1) (2)
for L = N
−1 2
P̄ ΦN < tN or ΦN < tN
k=0 k .
• we switch from αN −1 = 0 to αN = 1 when
α N −i = 0
(3) (1) (2)
Now we focus on bounding the last submatrix ΦN . for i ∈ {1, . . . , τ } and ΦN ≥ tN and ΦN ≥ tN .
8

Moreover, let EN for all n ≥ 1 denote the event note that the having a second observer to compute the finite
"
[
# tests is the key to ensure that the concentration inequalities
(1) (2) are consistent with the obtained measurements. While the first
EN = ΦN > tN ΦN > tN (77)
observer measurements with switching plays the role in the
Then if vN ≡ 0 for all N ≥ 0, we have that control synthesis. Lastly,
we observe that we do not need
(3)
to enforce the test on Φ3 since this submatrix is only
P(lim sup EN ) = 0. (78) composed of the watermaking signal, and the attacks do not
N →∞
have the power to affect the watermarking imposed by the
That is, under no attacks our switching rule incorrectly
controller.
switches the system only a finite number of times.
Proof. Recall that we previously proved the following matrix VI. ATTACK M AGNITUDE T HRESHOLDING
concentration inequalities for each submatrix: The previous section gives a finite sample test that works
properly when there is no attack. Our goal here is to determine
 !
2 2 (1)
(1)
P ΦN ≥ tN ≤ m · e−N tN /cN (79) the trade-off between our test’s statistical power and the attack
! magnitude. Namely, we are interested in how the right-hand

(2) 2 2 (2) side of our finite sample tests are related to the magnitude of
P ΦN ≥ tN ≤ (m + p) · e−N tN /cN
(80) the attack vectors. To do so, we consider the first observation
matrix under an attack yn = Cxn + zn + vn , where vn is
(1) (2) an additive attack. We first consider attacks that are small
for the constants cN and cN . Summing over all N , we have
∞  ! Z ∞ perturbations and then consider more complex attacks of the
X
(j) 1 form explored in [25] . Note we have again omitted the
P Φk ≥ tk ≤ (m + p) 1+ρ
dk < ∞. (81)
1 k subscript of the observation matrix for clarity. Namely, in the
k=1
next two subsections we will consider two attack forms.
Hence the Borel-Cantelli Lemma implies that for the event
" #
(j)

(j) A. Perturbation Attacks
EN = ΦN ≥ tN (82)
The first attack we analyze is when vn consists of a small
perturbation that could be determinstic and/or stochastic. To
we have
begin our analysis, let δ̄n be the measurement error when the
(j)
P(lim sup EN ) = 0, ∀j = {1, 2, 3}. (83) system is under attack, and observe that
N →∞
δ̄n+1 = (A + LC)δ̄n − Dwn − L⊤ zn − L⊤ vn . (88)
Now, if we define the event
"
[
# Expanding this expression gives that
(1) (2)
EN = Φn > tn Φn > tn , N ≥ 1, (84) n−1
X
δ̄n = (A+LC)n δ̄0 − (A+LC)n−1−k (Iwk −L⊤ zk −L⊤ vk )
then it follows that k=0
  (89)
2 2
[ (j)
X 
(j)
 where δ̄0 = δ0 = 0. So we can rewrite the above as
P(EN ) ≤ P  EN  ≤ P EN , N ≥ 1. (85)
n−1 n−1
j=1 j=1 X X
δ̄n = D̄k wk + L̄k zk + L̄k vk = δn + L̄k vk . (90)
So summing once more for all N gives k=0 k=0
Pn−1
∞ ∞ X
2   Next we define Vn = C k=0 L̄k vk −vn , and observe that the
(j)
X X
P(Ek ) ≤ P EN < quantity Vn is determined by the attacker since it depends upon
k=1 k=1 j=1 the values of vk . Qualitatively, we note that the magnitude of

1 Vn is related to the attack magnitude, since if there is no attack
Z
2(m + p) dk < ∞. (86)
1 k 1+ρ then Vn ≡ 0 for all n.
We obtain by applying Borel-Cantelli lemma that Theorem 6. Consider the closed-loop MIMO LTI system (17)
  with αn , tN , En as defined in Theorem 5, and suppose the
P lim sup EN = 0, (87) attacker chooses the perturbation attack described above. If
N →∞
the attack values vk are such that there exists a positive
which is the desired result. constant G with
The result of this theorem implies that if there is no attack N −1
1 X G
to the system, the operator norm of the matrices involved can kVk k ≤ . (91)
N N
have “large” deviations only a finite number of times, hence k=0

we obtain that a switching rule based on tests derived from the then we have that P(lim supn→∞ En ) = 0. That is, under a
concentration inequalities defined previously will only trigger perturbation attack with the above specifications the attack is
attack alerts only a finite number of times. In addition, we detected only a finite number of times.
9


(1) (1)
Proof. We begin by considering and so the Borel-Cantelli lemma implies that ΦN ≥ tN
only finitely many times. Our next step considers
N −1
(1) 1 X
ΦN = (C x̂n − yn )(C x̂n − yn )⊤ − N −1
1 X
N n=0 (2)
ΦN = (C x̂n − yn )e⊤
n−k′ −1 =
N −1
N n=0
1 X
E[(C x̂n − yn )(C x̂n − yn )⊤ ] = N −1
1 X
N n=0 (C δ̄n − zn − vn )e⊤
n−k′ −1 =
N −1
N n=0
1 X
(C δ̄n − zn − vn )(C δ̄n − zn − vn )⊤ − N −1
1 X
N n=0 (Cδn − zn )e⊤
(92) n−k′ −1 + Hn (97)
N −1
N n=0
1 X
E[(C x̂n − yn )(C x̂n − yn )⊤ ] = where
N n=0 N −1
1 X
1
N −1 HN = Vn e⊤
n−k′ −1 . (98)
N n=0
X
(Cδn − zn )(Cδn − zn )⊤ + Dn + Dn⊤ + Mn −
N n=0
N −1
Now using Theorem 3, we have that
1 X
E[(C x̂n − yn )(C x̂n − yn )⊤ ].
(2)
N n=0 P( ΦN ≥ tN ) ≤
 N −1 
where δn is the measurement error under no attack, and 1 X
P k (Cδn − zn )e⊤
n−k −1
′ k ≥ t N − kH N k ≤
N n=0
N −1 −N 2 (tN −kHN k)2
1 X
Dn = (Cδn − zn )Vn⊤ 2m e c
(2)
N . (99)
N n=0
N −1
(93)
1 X Next observe that
Mn = Vn Vn⊤ . N −1
N n=0 Ke X Ke G
kHN k ≤ kVN k ≤ . (100)
N N
k=0
Now using Theorem 2, we have that
Combining this with the above implies that

(1) ∞
P( ΦN ≥ tN ) ≤ X
(2)
P( Φk ≥ tk ) < ∞, (101)
 N −1
1 X k=1
P k (Cδn − zn )(Cδn − zn )⊤ −
N n=0

(2)
and so the Borel-Cantelli lemma implies that ΦN ≥ tN
N −1 only finitely many times. The remainder of the proof follows
1 X
E[(C x̂n − yn )(C x̂n − yn )⊤ ]k ≥ tN + similarly to that of the last steps of Theorem 5.
N n=0

Our analysis in this subsection is capable of only providing a
− 2 kDN k − kMN k ≤ simple relation between the power of our detection scheme and
−N 2 (tN −2kDN k−kMN k)2 the magnitude of Vn . An analysis that translates to the bounds
me c
(1)
N . (94) of each individual vn is more involved because it depends
explicitly on the structure/behavior of the matrix (A + LC).
Next observe that
B. Replay Attacks
N −1 N −1
2K̄N X 1 X 2 The second attack we analyze is when
2 D̄N + kMN k ≤ kVn k + kVn k ≤
N n=0
N n=0 vn = Cξn + ζn − (Cxn + zn ) (102)
2K̄N G G2
+ . (95) where ξn+1 = (A + BK)ξn + ωn and ωn is a bounded
N N
disturbance. This is a replay attack [3], since it subtracts the
Since (A + LC) is Schur stable, then from the definition of real sensor measurements and substitutes these with a replay
K̄N we immediately get that there exists a positive constant of the dynamics starting from a different initial condition. In
S̄ such that K̄N ≤ S̄ for all N ≥ 1. Combining this with the fact, we will perform our analysis for a more general attack
above implies that
vn = Cξn + ζn − γ · (Cxn + zn ), (103)

where γ ∈ R. This attack also allows for dampening or

X (1) (1)
P( Φk ≥ tk ) < ∞, (96)
k=1
amplifying the true sensor measurements (Cxn + zn ).
10

50 400

40
300

30
200
20

100
10

0 0
-1 -0.8 -0.6 -0.4 -0.2 0 -1 -0.98 -0.96 -0.94 -0.92 -0.9

400 1000

800
300

600
200
400

100
200

0 0
-1 -0.98 -0.96 -0.94 -0.92 -0.9 -1 -0.98 -0.96 -0.94 -0.92 -0.9

Fig. 1. Caption

Theorem 7. Consider the closed-loop MIMO LTI system (17) is based off of the standard model for lane keeping and speed
with αn , tN , En as defined in Theorem 5, and suppose the control [39]. In this model the state vector takes the form
attacker chooses the attack (103). If the attack is not trivial xT = [ψ y s γ v] and input vector uT = [r a], where ψ
(i.e., a trivial attack has vn ≡ 0 for all n ≥ 0), then we have is heading error, y is lateral error, s is trajectory distance,
that P(lim supn→∞ ¬En ) = 0. That is, under the attack with γ is vehicle angle, v is vehicle velocity, r is steering, and
the above specifications the attack is not detected only a finite a is acceleration. Linearizing about a straight trajectory at a
number of times. velocity of 10 m/s and step size of 0.05 seconds gives us an
LTI system:
Proof. Suppose γ 6= 0. Then the proof of Theorem 1 in
(2)
[25] shows that limN →∞ ΦN exists almost surely and is not 
1 0 0 10 1
0
  1
0

(2) 400
equal to 0. This means that P(lim supn→∞ ¬EN ) = 0. Now  1 1 0 1 0  1 0 
2 40  2400
consider the case γ = 0. Then the proof of Theorem 1 in 1 1 
 
(1)
A= 0 0 1 0 2
B =  0
800  (104)
[25] shows that limN →∞ ΦN exists almost surely and is not
  1
0 0 0 1 0  0 
(1) 20
equal to 0. This means that P(lim supn→∞ ¬EN ) = 0. The 1
0 0 0 0 1 0 20
remainder of the proof by repeating the last steps of Theorem
(1) (2)
5 for the two cases, after noting that ¬EN = ¬EN ∨ ¬EN with C1 = C2 = [I, 0] ∈ R3×5 . The process noise and
by De Morgan’s laws. watermark take the form of uniform random variables such that
w ∈ [−2.5 × 10−4 , 2.5 × 10−4 ]5 and e ∈ [−2, 2]2 . Similarly
This result is stronger than Theorem 6 in that it says
the measurement noise for each sensor is also estimated as
all replay attacks, and more generally attacks of the form
uniform random variables where ζ ∈ [−1 × 10−2, 1 × 10−2 ]3
(103), will not be detected by the finite sample tests only
and η ∈ [−2 × 10−2 , 2 × 10−2 ]3 . For this example we can
a finite number of times. In fact, this result is analagous to
think of the ζ measurements as localization using visual or
the zero-average-power results (4) of past work on dynamic
lidar based localization with high definition mapping, and η
watermarking for LTI systems with general structure [25],
as GPS localization. Finally controller and observer gains K
since this result says that only (trivial) replay attacks with
and L1 = L2 were chosen to stabilize the closed loop system.
zero-average-power cannot be detected.
For this system it was found that
VII. E XPERIMENTAL R ESULTS
c(1)
n ≤ 6.7502 × 10
−5
n (105)
To further demonstrate the effectiveness of this method,
we return to the lane keeping example used in [25] which c(2)
n ≤ 0.0968n. (106)
11

10 -1

10 -2

10 -3

10 -4

10 -5
0 5 10 15 20 25 30 35 40 45 50

10 -1

10 -2

10 -3

10 -4
0 5 10 15 20 25 30 35 40 45 50

(1) (2)
Fig. 2. Switching Decision Values Based on the Submatrices kΦn k and kΦn k in Simulation of Autonomous Vehicle

Using the threshold structure defined in Theorem 5 results in both with and without the switching policy. Figure 2 shows
(1) (2)
q the value of kΦn k and kΦn k for both normal operation
τn(1) = (1 + ρ(1) )(6.7502 × 10−5 ) log(n)/n (107) and under each of the attacks when the switching policy
q is not being used. The plot shows that for both attack 1
τn(2) = (1 + ρ(2) )(0.968) log(n)/n. (108) and attack 2 the switching policy will result in an almost
While the finite switching guarantee given by Theorem 5 only immediate and consistent transfer from the attacked sensor
applies for ρ(1) , ρ(2) > 0, due to the conservative nature of to the protected sensor. Furthermore, when the system is
(1) (2)
the bounds in (105)-(106) in addition to the desire to also un-attacked the values of kΦn k and kΦn k remain below
maintain a sufficiently quick detection we instead heuristically the switching threshold. Figure 3 compares the performance
tune these values to find the desired balance. of the lane keeping algorithm for each attack with respect
For our analysis of this system, we once again consider the to the un-attacked performance both with and without the
two forms of attack discussed in Section VI. The perturbation switching policy. This plot shows that for both attacks the
attack takes the form of random noise pulled from a uniform switching policy is able to transfer to the protected sensor
distribution such that vn ∈ [−0.150.15]3 The replay attack is before significant deviation can occur. This switch allows the
described in (102) where ξ0 = 0 and ζ and ω are uniformly vehicles performance to gracefully degrade while avoiding
distributed such that ζ ∈ [−2.5 × 10−4 , 2.5 × 10−4 ]3 and total failure.
ω ∈ [−2.5 × 10−4 , 2.5 × 10−4 ]5 .
Each attacked system, along with an un-attacked system VIII. C ONCLUSION
were simulated 1000 times for 10,000 discrete time steps.
While the perturbation attack is detected and switching occurs This paper constructed a dynamic watermarking approach
almost immediately for ρ(1) , ρ(2) < 1, the replay attack can for detecting malicious sensor attacks for general LTI systems,
take a much longer time to be detected. Figure 1 shows the and the two main contributions were: to extend dynamic water-
average time to detection for each of our switching conditions marking to general LTI systems under a specific attack model
in addition to the number of trials that result in switching for that is more general than replay attacks, and to show that
the un-attacked case plotted against the corresponding value of modeling is important for designing watermarking techniques
ρ(1) or ρ(2) . While the number of switching simulations for the by demonstrating how persistent disturbances can negatively
un-attacked system under switching condition 2 appear to be affect the accuracy of dynamic watermarking. Our approach to
quite large even when the average time to detect is relatively resolve this issue was to incorporate a model of the persistent
large, it is important to note that many of the unwanted disturbance via the internal model principle. Future work
switches occur in the first four discrete steps which can be includes generalizing the attack models that can be detected
mitigated in practice by ignoring the first four values. by our approach. An additional direction for future work is to
Choosing values of ρ(1) = ρ(2) = −0.98, each attack study the problem of robust controller design in the regime of
was again simulated this time for 1000 discrete time steps when an attack is detected.
12

0.5

-0.5

-1
0 5 10 15 20 25 30 35 40 45 50

0.5

-0.5

-1
0 5 10 15 20 25 30 35 40 45 50

Fig. 3. Performance Comparison of Simulated Autonomous Vehicle Lane Keeping Under Attack with and without Switching Policy

R EFERENCES [18] Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks on


scada systems,” IEEE CST, vol. 22, no. 4, pp. 1396–1407, 2014.
[1] Q. Shafi, “Cyber physical systems security: A brief survey,” in 2012 [19] A. J. Gallo, M. S. Turan, F. Boem, G. Ferrari-Trecate, and T. Parisini,
12th International Conference on Computational Science and Its Appli- “Distributed watermarking for secure control of microgrids under replay
cations. IEEE, 2012, pp. 146–150. attacks,” IFAC-PapersOnLine, vol. 51, no. 23, pp. 182–187, 2018.
[2] M. Abrams and J. Weiss, “Malicious control system cyber security attack [20] Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, “False data injection
case study–Maroochy water services, australia,” MITRE, 2008. attacks against state estimation in wireless sensor networks,” in Proc. of
[3] R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” IEEE Security IEEE CDC, 2010, pp. 5967–5972.
& Privacy, vol. 9, no. 3, pp. 49–51, 2011. [21] Y. Mo, S. Weerakkody, and B. Sinopoli, “Physical authentication of con-
[4] A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the trol systems: Designing watermarked control inputs to detect counterfeit
security of control systems.” in HotSec, 2008. sensor outputs,” IEEE Control Systems, vol. 35, no. 1, pp. 93–109, 2015.
[5] B. Parno, M. Luk, E. Gaustad, and A. Perrig, “Secure sensor network [22] B. Satchidanandan and P. Kumar, “Dynamic watermarking: Active
routing: A clean-slate approach,” in ACM CoNEXT, 2006. defense of networked cyber-physical systems,” Proc. of IEEE, 2016.
[6] V. Kumar, J. Srivastava, and A. Lazarevic, Managing cyber threats: [23] W.-H. Ko, B. Satchidanandan, and P. Kumar, “Theory and imple-
issues, approaches, and challenges. Springer, 2006, vol. 5. mentation of dynamic watermarking for cybersecurity of advanced
[7] W. Wang and Z. Lu, “Cyber security in the smart grid: Survey and transportation systems,” in Proc. of IEEE CNS, 2016, pp. 416–420.
challenges,” Computer Networks, vol. 57, no. 5, pp. 1344–1371, 2013. [24] B. Satchidanandan and P. Kumar, “On minimal tests of sensor veracity
[8] K.-D. Kim and P. R. Kumar, “Cyber–physical systems: A perspective at for dynamic watermarking-based defense of cyber-physical systems,”
the centennial,” Proc. of IEEE, vol. 100, pp. 1287–1308, 2012. in Communication Systems and Networks (COMSNETS), 2017 9th
[9] S. Amin, A. A. Cárdenas, and S. S. Sastry, “Safe and secure networked International Conference on. IEEE, 2017, pp. 23–30.
control systems under denial-of-service attacks,” in International Work- [25] P. Hespanhol, M. Porter, R. Vasudevan, and A. Aswani, “Dynamic
shop on Hybrid Systems: Computation and Control. Springer, 2009, watermarking for general lti systems,” in IEEE Conference on Decision
pp. 31–45. and Control (CDC), 2017, pp. 1834–1839.
[10] A. A. Cardenas, S. Amin, and S. Sastry, “Secure control: Towards [26] H. Gonzalez and E. Polak, “On the perpetual collision-free rhc of fleets
survivable cyber-physical systems,” in ICDCS, 2008, pp. 495–500. of vehicles,” Journal of optimization theory and applications, vol. 145,
[11] F. Pasqualetti, F. Dörfler, and F. Bullo, “Attack detection and identi- no. 1, pp. 76–92, 2010.
fication in cyber-physical systems,” IEEE Transactions on Automatic [27] A. Aswani and C. Tomlin, “Game-theoretic routing of gps-assisted
Control, vol. 58, no. 11, pp. 2715–2729, 2013. vehicles for energy efficiency,” in ACC, 2011, pp. 3375–3380.
[12] A. Gomez-Exposito and A. Abur, Power system state estimation: theory [28] W. Zhang, M. Kamgarpour, D. Sun, and C. J. Tomlin, “A hierarchical
and implementation. CRC press, 2004. flight planning framework for air traffic management,” Proceedings of
[13] C.-Z. Bai, F. Pasqualetti, and V. Gupta, “Security in stochastic control the IEEE, vol. 100, no. 1, pp. 179–194, 2012.
systems: Fundamental limitations and performance bounds,” in Ameri- [29] R. Vasudevan, V. Shia, Y. Gao, R. Cervera-Navarro, R. Bajcsy, and
can Control Conference (ACC), 2015. IEEE, 2015, pp. 195–200. F. Borrelli, “Safe semi-autonomous control with enhanced driver mod-
[14] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for eling,” in ACC, 2012, pp. 2896–2903.
cyber-physical systems under adversarial attacks,” IEEE Transactions on [30] S. Mohan and R. Vasudevan, “Convex computation of the reachable set
Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014. for hybrid systems with parametric uncertainty,” in Proc. of ACC, 2016,
[15] ——, “Secure state-estimation for dynamical systems under active pp. 5141–5147.
adversaries,” in Allerton Conference. IEEE, 2011, pp. 337–344. [31] G. Como, E. Lovisari, and K. Savla, “Convexity and robustness of
[16] S. Weerakkody, Y. Mo, and B. Sinopoli, “Detecting integrity attacks on dynamic network traffic assignment for control of freeway networks,”
control systems using robust physical watermarking,” in Proc. of IEEE IFAC-PapersOnLine, vol. 49, no. 3, pp. 335–340, 2016.
CDC, 2014, pp. 3757–3764. [32] P. Hespanhol, M. Porter, R. Vasudevan, and A. Aswani, “Statistical
[17] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in watermarking for networked control systems,” in American Control
Allerton Conference. IEEE, 2009, pp. 911–918. Conference (ACC), 2018, pp. 5467–5472.
13

[33] A. Mitra and S. Sundaram, “Secure distributed observers for a class of


linear time invariant systems in the presence of byzantine adversaries,”
in Decision and Control (CDC), 2016 IEEE 55th Conference on. IEEE,
2016, pp. 2709–2714.
[34] J. Bernat and S. Stepien, “Multi-modelling as new estimation schema
for high-gain observers,” International Journal of Control, vol. 88, no. 6,
pp. 1209–1222, 2015.
[35] A. Mitra and S. Sundaram, “Distributed observers for lti systems,” IEEE
Transactions on Automatic Control, 2018.
[36] C. Stein et al., “A bound for the error in the normal approximation to the
distribution of a sum of dependent random variables,” in Proceedings
of the Sixth Berkeley Symposium on Mathematical Statistics and Prob-
ability, Volume 2: Probability Theory. The Regents of the University
of California, 1972.
[37] L. Mackey, M. I. Jordan, R. Y. Chen, B. Farrell, J. A. Tropp et al.,
“Matrix concentration inequalities via the method of exchangeable
pairs,” The Annals of Probability, vol. 42, no. 3, pp. 906–945, 2014.
[38] R. Bhatia, Matrix analysis. Springer Science & Business Media, 2013,
vol. 169.
[39] V. Turri, A. Carvalho, H. Tseng, K. Johansson, and F. Borrelli, “Linear
model predictive control for lane keeping and obstacle avoidance on low
curvature roads,” in Proc. of IEEE ITSC, 2013, pp. 378–383.

Vous aimerez peut-être aussi