Toward Secure and Reliable Networked Control Systems
2011
Abstract
Akademisk avhandling som med tillstånd av Kungl Tekniska högskolan framlägges till offentlig granskning för avläggande av teknologie licentiatexamen i reglerteknik fredagen den 9 december 2011, klockan 09:00 i sal L1, Kungliga Tekniska högskolan, Drottning Kristinas väg 30, Stockholm.
References (80)
- A. Abur and A.G. Exposito. Power System State Estimation: Theory and Imple- mentation. Marcel-Dekker, 2004.
- M. Aldeen and F. Crusca. Observer-based fault detection and identification scheme for power systems. IEE Proceedings -Generation, Transmission and Distribution, 153(1):71-79, January 2006.
- S. Amin, A.A. Cárdenas, and S.S. Sastry. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control, pages 31-45. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, April 2009.
- S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen. Stealthy deception attacks on water scada systems. In Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pages 161-170, New York, NY, USA, 2010. ACM.
- P. M. Anderson and R. G. Farmer. Series compensation of power systems. PBLSH. Inc, California, USA, 1996.
- J. Baillieul and P. J. Antsaklis. Control and Communication Challenges in Net- worked Real-Time Systems. Proceedings of the IEEE, 95(1):9-28, January 2007. ISSN 0018-9219. doi: 10.1109/JPROC.2006.887290.
- N. Balu, T. Bertram, A. Bose, V. Brandwajn, G. Cauley, D. Curtice, A. Fouad, L. Fink, M.G. Lauby, B.F. Wollenberg, and J.N. Wrubel. On-line power system security analysis. Proceedings of the IEEE, 80(2):262-282, feb 1992.
- P. Barooah and J.P. Hespanha. Graph effective resistance and distributed control: Spectral properties and applications. In Decision and Control, 2006 45th IEEE Conference on, pages 3479-3485. IEEE, 2007.
- M. Basseville and I. V. Nikiforov. Detection of abrupt changes: theory and appli- cation. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1993.
- M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
- G. Björkman. The VIKING project-torwards more secure SCADA systems. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
- R. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye. Detecting false data injection attacks on DC state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
- S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004.
- A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. Challenges for securing cyber physical systems. In Workshop on Future Directions in Cyber- physical Systems Security. DHS, July 2009.
- A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 355-366, New York, NY, USA, 2011. ACM. ISBN 978-1-4503-0564-8.
- A. A. Cárdenas, S. Amin, and S. S. Sastry. Secure control: Towards sur- vivable cyber-physical systems. In First International Workshop on Cyber- Physical Systems (WCPS2008), pages 495-500, Beijing, China, June 2008a. URL http://www.truststc.org/pubs/345.html.
- A.A. Cárdenas, S. Amin, and S.S. Sastry. Research challenges for the security of control systems. In Proc. 3rd USENIX Workshop on Hot topics in security, July 2008b. CBSNews. Cyber war: Sabotaging the system. CBSNews, November 8th 2009.
- J. Chen and R. J. Patton. Robust Model-Based Fault Diagnosis for Dynamic Sys- tems. Kluwer Academic Publishers, 1999.
- J. Chen, R. J. Patton, and H. Zhang. Design of unknown input observers and robust fault detection filters. International Journal of Control, 63(1):85-105, 1996.
- Y. Chompoobutrgool, L. Vanfretti, and M. Ghandhari. Survey on power system stabilizers control and their prospective applications for power system damping using synchrophasor-based wide-area systems. European Transactions on Elec- trical Power, 2011.
- E. Chow and A. Willsky. Analytical redundancy and the design of robust failure detection systems. Automatic Control, IEEE Transactions on, 29(7):603-614, jul 1984.
- W. H. Chung, J. L. Speyer, and R. H. Chen. A decentralized fault detection filter. Journal of Dynamic Systems, Measurement, and Control, 123(2):237-247, 2001.
- W.H. Chung and J.L. Speyer. A game theoretic fault detection filter. Automatic Control, IEEE Transactions on, 43(2):143-161, feb 1998.
- G. Dán and H. Sandberg. Stealth attacks and protection schemes for state estima- tors in power systems. In Proc. of IEEE SmartGridComm, October 2010.
- M. A. Demetriou. Using unknown input observers for robust adaptive fault detec- tion in vector second-order systems. Mechanical systems and signal processing, 19(2):291-309, 2005. ISSN 0888-3270.
- S. X. Ding. Model-based Fault Diagnosis Techniques: Design Schemes. Springer Verlag, 2008.
- S. X. Ding, P. Zhang, Ch. Chihaia, W. Li, Y. Wang, and E. L. Ding. Advanced design scheme for fault tolerant distributed networked control systems. In Pro- ceedings of the 17th IFAC World Congress, pages 13569 -13574, Seoul, Korea, July 2008.
- R.K. Douglas and J.l. Speyer. Robust fault detection filter design. In American Control Conference, 1995. Proceedings of the, volume 1, pages 91-96, jun 1995.
- P. Esfahani, M. Vrakopoulou, K. Margellos, J. Lygeros, and G. Andersson. Cyber attack in a two-area power system: Impact identification using reachability. In American Control Conference, 2010, pages 962-967, jul 2010.
- N. Falliere, L. Murchu, and E. Chien. W32.Stuxnet dossier, February 2011. FERC. Final report on price manipulation in western markets, March 2003. Avail- able at: http://www.ferc.gov/industries/electric/indus-act/wec.asp.
- P. M. Frank and X. Ding. Survey of robust residual generation and evaluation methods in observer-based fault detection systems. Journal of process control, 7 (6):403-424, 1997.
- A. Galántai. Subspaces, angles and pairs of orthogonal projections. Linear and Multilinear Algebra, 56(3):227-260, June 2006.
- A. Giani, S. Sastry, K. H. Johansson, and H. Sandberg. The VIKING project: an initiative on resilient control of power networks. In Proc. 2nd Int. Symp. on Resilient Control Systems, pages 31-35, Idaho Falls, ID, USA, August 2009.
- A. Giani, E. Bitar, M. McQueen, P. Khargonekar, K. Poolla, and M. Garcia. Smart grid data integrity attacks: Characterizations and countermeasures. In Proceed- ings of the IEEE SmartGridComm, October 2011. To appear.
- S. Gorman. Electricity grid in U.S. penetrated by spies. The Wall Street Journal, page A1, April 8th 2009.
- F. Grandoni. A note on the complexity of minimum dominat- ing set. J. Discrete Algorithms, 4(2):209-214, July 2006. URL http://dblp.uni-trier.de/db/journals/jda/jda4.html#Grandoni06.
- R. B. L. Guedes, F. Silva, L. F. C. Alberto, and N. G. Bretas. Large disturbance voltage stability assessment using extended Lyapunov function and considering voltage dependent active loads. In Power Engineering Society General Meeting, 2005. IEEE, pages 1760-1767. IEEE, 2005.
- A. Gupta, C. Langbort, and T. Başar. Optimal control in the presence of an intelligent jammer with limited actions. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 1096-1101, dec 2010.
- J.P. Hespanha, P. Naghshtabrizi, and Yonggang Xu. A survey of recent results in networked control systems. Proceedings of the IEEE, 95(1):138-162, jan 2007.
- I. Hwang, S. Kim, Y. Kim, and C. E. Seah. A survey of fault detection, isolation, and reconfiguration methods. Control Systems Technology, IEEE Transactions on, 18(3):636-653, may 2010.
- R. Isermann. Model-based fault detection and diagnosis: status and applications. In Proceedings of the 16th IFAC Symposium on Automatic Control in Aerospace, pages 71-85, St. Petersburg, Russia, June 2004.
- L. Jia, R. J. Thomas, and L. Tong. Malicious data attack on real-time electricity market. In Proc. of IEEE ICASSP, May 2011.
- O. Kosut, L. Jia, R. Thomas, and L. Tong. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In Proc. of IEEE SmartGridComm, October 2010.
- P. Kundur. Power System Stability and Control. McGraw-Hill Professional, 1994.
- Wen-Hsiung E. Liu, Felix F. Wu, and Shau-Ming Lun. Estimation of parameter errors from measurement residuals in state estimation. IEEE Transactions on Power Systems, (1), February 1992.
- Y. Liu, M. K. Reiter, and P. Ning. False data injection attacks against state estimation in electric power grids. In Proc. 16th ACM Conf. on Computer and Communications Security, pages 21-32, New York, NY, USA, 2009.
- J. Machowski, J. W. Bialek, and J. R. Bumby. Power System Dynamics: Stability and Control. John Wiley & Sons, 2008.
- J. Meserve. Sources: Staged cyber attack reveals vul- nerability in power grid. CNN, 2007. Available at http://edition.cnn.com/2007/US/09/26/power.at.risk/index.html.
- L. Mili, Th. Van Cutsem, and M. Ribbens-Pavella. Bad data identification methods in power system state estimation -a comparative study. In IEEE Trans. Power App. Syst., November 1985.
- Y. Mo and B. Sinopoli. Secure control against replay attack. In Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, pages 911-918, October 2009.
- A. Monticelli. State Estimation in Electric Power Systems: A Generalized Ap- proach. Kluwer Academic Publishers, 1999.
- R. J. Muirhead. Aspects of Multivariate Statistical Theory. John Wiley & Sons, 1982.
- F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable net- works: A system theoretic approach. IEEE Transactions on Automatic Control, 2010. Submitted, available online at http://www.fabiopas.it/papers/FP-AB-FB- 10a.pdf.
- F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable net- works: A system theoretic approach. Automatic Control, IEEE Transactions on, PP(99):1, 2011.
- R. J. Patton and J. Chen. Observer-based fault detection and isolation: robustness and applications. Control Engineering Practice, 5(5):671-682, 1997.
- A.G. Phadke and R.M. de Moraes. The wide world of wide-area measurement. Power and Energy Magazine, IEEE, 6(5):52 -65, sep-oct 2008. ISSN 1540-7977.
- T. Rid. Cyber war will not take place. Journal of Strategic Studies, 2011. doi: 10.1080/01402390.2011.608939.
- C.G. Rieger. Notional examples and benchmark aspects of a resilient control system. In Resilient Control Systems (ISRCS), 3rd International Symposium on, pages 64-71, aug 2010. doi: 10.1109/ISRCS.2010.5603123.
- T. Samad and A.M. Annaswamy, editors. The Impact of Control Technology. IEEE Control Systems Society, 2011. Available at http://www.ieeecss.org/general/impact-control-technology.
- T. Samad, P. McLaughlin, and J. Lu. System architecture for process automation: Review and trends. Journal of Process Control, 17(3):191-201, 2007. Special Issue ADCHEM 2006 Symposium.
- H. Sandberg, A. Teixeira, and K. H. Johansson. On security indices for state estimators in power networks. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
- E. Scholtz and B.C. Lesieutre. Graphical observer design suitable for large-scale DAE power systems. In Proceedings of the 47th IEEE Conference on Decision and Control, pages 2955-2960, Cancun, December 2008.
- F. C. Schweppe and J. Wildes. Power system static-state estimation, part I: Exact model. IEEE Transactions on Power Apparatus and Systems, 89(1):120-125, January 1970.
- M. Shahidehpour, F. Tinney, and Y. Fu. Impact of security on power systems operation. Proceedings of the IEEE, 93(11):2013-2025, nov 2005a.
- M. Shahidehpour, W. F. Tinney, and Y. Fu. Impact of security on power systems operation. Proceedings of the IEEE, 93(11):2013-2025, November 2005b.
- I. Shames, A. Teixeira, H. Sandberg, and K. H. Johansson. Distributed fault de- tection and isolation with imprecise network models. In American Control Con- ference, 2012. Submitted.
- D. D. Siljak. Decentralized control of complex systems. Academic Press, 1991.
- R. Smith. A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the 18th IFAC World Congress, Milano, Italy, August-September 2011.
- K. C. Sou, H. Sandberg, and K. H. Johansson. Electric power network security analysis via minimum cut relaxation. In Proceedings of the 50th IEEE Conference on Decision and Control, December 2011. To appear.
- S. Sundaram and C.N. Hadjicostis. Distributed function calculation via linear it- erative strategies in the presence of malicious agents. Automatic Control, IEEE Transactions on, 56(7):1495-1508, july 2011.
- S. Sundaram, M. Pajic, C.N. Hadjicostis, R. Mangharam, and G.J. Pappas. The wireless control network: Monitoring for malicious behavior. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 5979-5984, dec 2010. SvK. Map of sweden's national grid.
- Symantec. W32.Duqu: The precursor to the next stuxnet, November 2011.
- U.S.-Canada PSOTF. Final report on the August 14th blackout in the United States and Canada. Technical report, U.S.-Canada Power System Outage Task Force, April 2004.
- F. F. Wu. Power system state estimation: a survey. Int. J. Elec. Power and Energy Systems, April 1990.
- F. F. Wu and W.E. Liu. Detection of topology errors by state estimation. IEEE Trans. Power Syst., (1), February 1989.
- F.F. Wu, K. Moslehi, and A. Bose. Power system control centers: Past, present, and future. Proceedings of the IEEE, 93(11):1890-1908, nov 2005. ISSN 0018-9219.
- L. Xie, Y. Mo, and B. Sinopoli. False data injection attacks in electricity markets. In First IEEE International Conference on Smart Grid Communications, October 2010.
- Y. Yuan, Z. Li, and K. Ren. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2(2):382-390, June 2011.
- W. Zhang, Q. Yang, and Y. Geng. A survey of anomaly detection methods in networks. In International Symposium on Computer Network and Multimedia Technology, 2009.
- R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas. MATPOWER's extensible optimal power flow architecture. In Power and Energy Society General Meeting, pages 1-7. IEEE, July 2009.