A graph theoretic characterization of perfect attackability and detection in Distributed Control Systems

  • Sean Weerakkody
  • , Xiaofei Liu
  • , Sang H. Son
  • , Bruno Sinopoli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

This paper is concerned with the analysis and design of secure distributed control systems (DCS) in the face of integrity attacks on sensors and controllers by external attackers or insiders. In general a DCS consists of many heterogenous components and agents including sensors, actuators, and controllers. Due to its distributed nature, some agents may start misbehaving to disrupt the system. This paper first reviews necessary and sufficient conditions for deterministic detection of integrity attacks carried out by any number of malicious agents, based on the concept of left invertibility of structural control systems. It then develops a notion equivalent to structural left invertibility in terms of vertex separators of a graph, which allows a designer to efficiently determine if a network is perfectly attackable. This tool is then leveraged to design minimal communication networks for DCSs, which ensure that an adversary cannot generate undetectable attacks. Numerical examples are included to illustrate these results.

Original languageEnglish
Title of host publication2016 American Control Conference, ACC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1171-1178
Number of pages8
ISBN (Electronic)9781467386821
DOIs
StatePublished - 28 Jul 2016
Event2016 American Control Conference, ACC 2016 - Boston, United States
Duration: 6 Jul 20168 Jul 2016

Publication series

NameProceedings of the American Control Conference
Volume2016-July
ISSN (Print)0743-1619

Conference

Conference2016 American Control Conference, ACC 2016
Country/TerritoryUnited States
CityBoston
Period6/07/168/07/16

Bibliographical note

Publisher Copyright:
© 2016 American Automatic Control Council (AACC).

Fingerprint

Dive into the research topics of 'A graph theoretic characterization of perfect attackability and detection in Distributed Control Systems'. Together they form a unique fingerprint.

Cite this