Academia.eduAcademia.edu

Outline

Toward Secure and Reliable Networked Control Systems

2011

Abstract

Akademisk avhandling som med tillstånd av Kungl Tekniska högskolan framlägges till offentlig granskning för avläggande av teknologie licentiatexamen i reglerteknik fredagen den 9 december 2011, klockan 09:00 i sal L1, Kungliga Tekniska högskolan, Drottning Kristinas väg 30, Stockholm.

References (80)

  1. A. Abur and A.G. Exposito. Power System State Estimation: Theory and Imple- mentation. Marcel-Dekker, 2004.
  2. M. Aldeen and F. Crusca. Observer-based fault detection and identification scheme for power systems. IEE Proceedings -Generation, Transmission and Distribution, 153(1):71-79, January 2006.
  3. S. Amin, A.A. Cárdenas, and S.S. Sastry. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control, pages 31-45. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, April 2009.
  4. S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen. Stealthy deception attacks on water scada systems. In Proceedings of the 13th ACM international conference on Hybrid systems: computation and control, HSCC '10, pages 161-170, New York, NY, USA, 2010. ACM.
  5. P. M. Anderson and R. G. Farmer. Series compensation of power systems. PBLSH. Inc, California, USA, 1996.
  6. J. Baillieul and P. J. Antsaklis. Control and Communication Challenges in Net- worked Real-Time Systems. Proceedings of the IEEE, 95(1):9-28, January 2007. ISSN 0018-9219. doi: 10.1109/JPROC.2006.887290.
  7. N. Balu, T. Bertram, A. Bose, V. Brandwajn, G. Cauley, D. Curtice, A. Fouad, L. Fink, M.G. Lauby, B.F. Wollenberg, and J.N. Wrubel. On-line power system security analysis. Proceedings of the IEEE, 80(2):262-282, feb 1992.
  8. P. Barooah and J.P. Hespanha. Graph effective resistance and distributed control: Spectral properties and applications. In Decision and Control, 2006 45th IEEE Conference on, pages 3479-3485. IEEE, 2007.
  9. M. Basseville and I. V. Nikiforov. Detection of abrupt changes: theory and appli- cation. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1993.
  10. M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
  11. G. Björkman. The VIKING project-torwards more secure SCADA systems. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
  12. R. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye. Detecting false data injection attacks on DC state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
  13. S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004.
  14. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry. Challenges for securing cyber physical systems. In Workshop on Future Directions in Cyber- physical Systems Security. DHS, July 2009.
  15. A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 355-366, New York, NY, USA, 2011. ACM. ISBN 978-1-4503-0564-8.
  16. A. A. Cárdenas, S. Amin, and S. S. Sastry. Secure control: Towards sur- vivable cyber-physical systems. In First International Workshop on Cyber- Physical Systems (WCPS2008), pages 495-500, Beijing, China, June 2008a. URL http://www.truststc.org/pubs/345.html.
  17. A.A. Cárdenas, S. Amin, and S.S. Sastry. Research challenges for the security of control systems. In Proc. 3rd USENIX Workshop on Hot topics in security, July 2008b. CBSNews. Cyber war: Sabotaging the system. CBSNews, November 8th 2009.
  18. J. Chen and R. J. Patton. Robust Model-Based Fault Diagnosis for Dynamic Sys- tems. Kluwer Academic Publishers, 1999.
  19. J. Chen, R. J. Patton, and H. Zhang. Design of unknown input observers and robust fault detection filters. International Journal of Control, 63(1):85-105, 1996.
  20. Y. Chompoobutrgool, L. Vanfretti, and M. Ghandhari. Survey on power system stabilizers control and their prospective applications for power system damping using synchrophasor-based wide-area systems. European Transactions on Elec- trical Power, 2011.
  21. E. Chow and A. Willsky. Analytical redundancy and the design of robust failure detection systems. Automatic Control, IEEE Transactions on, 29(7):603-614, jul 1984.
  22. W. H. Chung, J. L. Speyer, and R. H. Chen. A decentralized fault detection filter. Journal of Dynamic Systems, Measurement, and Control, 123(2):237-247, 2001.
  23. W.H. Chung and J.L. Speyer. A game theoretic fault detection filter. Automatic Control, IEEE Transactions on, 43(2):143-161, feb 1998.
  24. G. Dán and H. Sandberg. Stealth attacks and protection schemes for state estima- tors in power systems. In Proc. of IEEE SmartGridComm, October 2010.
  25. M. A. Demetriou. Using unknown input observers for robust adaptive fault detec- tion in vector second-order systems. Mechanical systems and signal processing, 19(2):291-309, 2005. ISSN 0888-3270.
  26. S. X. Ding. Model-based Fault Diagnosis Techniques: Design Schemes. Springer Verlag, 2008.
  27. S. X. Ding, P. Zhang, Ch. Chihaia, W. Li, Y. Wang, and E. L. Ding. Advanced design scheme for fault tolerant distributed networked control systems. In Pro- ceedings of the 17th IFAC World Congress, pages 13569 -13574, Seoul, Korea, July 2008.
  28. R.K. Douglas and J.l. Speyer. Robust fault detection filter design. In American Control Conference, 1995. Proceedings of the, volume 1, pages 91-96, jun 1995.
  29. P. Esfahani, M. Vrakopoulou, K. Margellos, J. Lygeros, and G. Andersson. Cyber attack in a two-area power system: Impact identification using reachability. In American Control Conference, 2010, pages 962-967, jul 2010.
  30. N. Falliere, L. Murchu, and E. Chien. W32.Stuxnet dossier, February 2011. FERC. Final report on price manipulation in western markets, March 2003. Avail- able at: http://www.ferc.gov/industries/electric/indus-act/wec.asp.
  31. P. M. Frank and X. Ding. Survey of robust residual generation and evaluation methods in observer-based fault detection systems. Journal of process control, 7 (6):403-424, 1997.
  32. A. Galántai. Subspaces, angles and pairs of orthogonal projections. Linear and Multilinear Algebra, 56(3):227-260, June 2006.
  33. A. Giani, S. Sastry, K. H. Johansson, and H. Sandberg. The VIKING project: an initiative on resilient control of power networks. In Proc. 2nd Int. Symp. on Resilient Control Systems, pages 31-35, Idaho Falls, ID, USA, August 2009.
  34. A. Giani, E. Bitar, M. McQueen, P. Khargonekar, K. Poolla, and M. Garcia. Smart grid data integrity attacks: Characterizations and countermeasures. In Proceed- ings of the IEEE SmartGridComm, October 2011. To appear.
  35. S. Gorman. Electricity grid in U.S. penetrated by spies. The Wall Street Journal, page A1, April 8th 2009.
  36. F. Grandoni. A note on the complexity of minimum dominat- ing set. J. Discrete Algorithms, 4(2):209-214, July 2006. URL http://dblp.uni-trier.de/db/journals/jda/jda4.html#Grandoni06.
  37. R. B. L. Guedes, F. Silva, L. F. C. Alberto, and N. G. Bretas. Large disturbance voltage stability assessment using extended Lyapunov function and considering voltage dependent active loads. In Power Engineering Society General Meeting, 2005. IEEE, pages 1760-1767. IEEE, 2005.
  38. A. Gupta, C. Langbort, and T. Başar. Optimal control in the presence of an intelligent jammer with limited actions. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 1096-1101, dec 2010.
  39. J.P. Hespanha, P. Naghshtabrizi, and Yonggang Xu. A survey of recent results in networked control systems. Proceedings of the IEEE, 95(1):138-162, jan 2007.
  40. I. Hwang, S. Kim, Y. Kim, and C. E. Seah. A survey of fault detection, isolation, and reconfiguration methods. Control Systems Technology, IEEE Transactions on, 18(3):636-653, may 2010.
  41. R. Isermann. Model-based fault detection and diagnosis: status and applications. In Proceedings of the 16th IFAC Symposium on Automatic Control in Aerospace, pages 71-85, St. Petersburg, Russia, June 2004.
  42. L. Jia, R. J. Thomas, and L. Tong. Malicious data attack on real-time electricity market. In Proc. of IEEE ICASSP, May 2011.
  43. O. Kosut, L. Jia, R. Thomas, and L. Tong. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In Proc. of IEEE SmartGridComm, October 2010.
  44. P. Kundur. Power System Stability and Control. McGraw-Hill Professional, 1994.
  45. Wen-Hsiung E. Liu, Felix F. Wu, and Shau-Ming Lun. Estimation of parameter errors from measurement residuals in state estimation. IEEE Transactions on Power Systems, (1), February 1992.
  46. Y. Liu, M. K. Reiter, and P. Ning. False data injection attacks against state estimation in electric power grids. In Proc. 16th ACM Conf. on Computer and Communications Security, pages 21-32, New York, NY, USA, 2009.
  47. J. Machowski, J. W. Bialek, and J. R. Bumby. Power System Dynamics: Stability and Control. John Wiley & Sons, 2008.
  48. J. Meserve. Sources: Staged cyber attack reveals vul- nerability in power grid. CNN, 2007. Available at http://edition.cnn.com/2007/US/09/26/power.at.risk/index.html.
  49. L. Mili, Th. Van Cutsem, and M. Ribbens-Pavella. Bad data identification methods in power system state estimation -a comparative study. In IEEE Trans. Power App. Syst., November 1985.
  50. Y. Mo and B. Sinopoli. Secure control against replay attack. In Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on, pages 911-918, October 2009.
  51. A. Monticelli. State Estimation in Electric Power Systems: A Generalized Ap- proach. Kluwer Academic Publishers, 1999.
  52. R. J. Muirhead. Aspects of Multivariate Statistical Theory. John Wiley & Sons, 1982.
  53. F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable net- works: A system theoretic approach. IEEE Transactions on Automatic Control, 2010. Submitted, available online at http://www.fabiopas.it/papers/FP-AB-FB- 10a.pdf.
  54. F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable net- works: A system theoretic approach. Automatic Control, IEEE Transactions on, PP(99):1, 2011.
  55. R. J. Patton and J. Chen. Observer-based fault detection and isolation: robustness and applications. Control Engineering Practice, 5(5):671-682, 1997.
  56. A.G. Phadke and R.M. de Moraes. The wide world of wide-area measurement. Power and Energy Magazine, IEEE, 6(5):52 -65, sep-oct 2008. ISSN 1540-7977.
  57. T. Rid. Cyber war will not take place. Journal of Strategic Studies, 2011. doi: 10.1080/01402390.2011.608939.
  58. C.G. Rieger. Notional examples and benchmark aspects of a resilient control system. In Resilient Control Systems (ISRCS), 3rd International Symposium on, pages 64-71, aug 2010. doi: 10.1109/ISRCS.2010.5603123.
  59. T. Samad and A.M. Annaswamy, editors. The Impact of Control Technology. IEEE Control Systems Society, 2011. Available at http://www.ieeecss.org/general/impact-control-technology.
  60. T. Samad, P. McLaughlin, and J. Lu. System architecture for process automation: Review and trends. Journal of Process Control, 17(3):191-201, 2007. Special Issue ADCHEM 2006 Symposium.
  61. H. Sandberg, A. Teixeira, and K. H. Johansson. On security indices for state estimators in power networks. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, April 2010.
  62. E. Scholtz and B.C. Lesieutre. Graphical observer design suitable for large-scale DAE power systems. In Proceedings of the 47th IEEE Conference on Decision and Control, pages 2955-2960, Cancun, December 2008.
  63. F. C. Schweppe and J. Wildes. Power system static-state estimation, part I: Exact model. IEEE Transactions on Power Apparatus and Systems, 89(1):120-125, January 1970.
  64. M. Shahidehpour, F. Tinney, and Y. Fu. Impact of security on power systems operation. Proceedings of the IEEE, 93(11):2013-2025, nov 2005a.
  65. M. Shahidehpour, W. F. Tinney, and Y. Fu. Impact of security on power systems operation. Proceedings of the IEEE, 93(11):2013-2025, November 2005b.
  66. I. Shames, A. Teixeira, H. Sandberg, and K. H. Johansson. Distributed fault de- tection and isolation with imprecise network models. In American Control Con- ference, 2012. Submitted.
  67. D. D. Siljak. Decentralized control of complex systems. Academic Press, 1991.
  68. R. Smith. A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the 18th IFAC World Congress, Milano, Italy, August-September 2011.
  69. K. C. Sou, H. Sandberg, and K. H. Johansson. Electric power network security analysis via minimum cut relaxation. In Proceedings of the 50th IEEE Conference on Decision and Control, December 2011. To appear.
  70. S. Sundaram and C.N. Hadjicostis. Distributed function calculation via linear it- erative strategies in the presence of malicious agents. Automatic Control, IEEE Transactions on, 56(7):1495-1508, july 2011.
  71. S. Sundaram, M. Pajic, C.N. Hadjicostis, R. Mangharam, and G.J. Pappas. The wireless control network: Monitoring for malicious behavior. In Decision and Control (CDC), 2010 49th IEEE Conference on, pages 5979-5984, dec 2010. SvK. Map of sweden's national grid.
  72. Symantec. W32.Duqu: The precursor to the next stuxnet, November 2011.
  73. U.S.-Canada PSOTF. Final report on the August 14th blackout in the United States and Canada. Technical report, U.S.-Canada Power System Outage Task Force, April 2004.
  74. F. F. Wu. Power system state estimation: a survey. Int. J. Elec. Power and Energy Systems, April 1990.
  75. F. F. Wu and W.E. Liu. Detection of topology errors by state estimation. IEEE Trans. Power Syst., (1), February 1989.
  76. F.F. Wu, K. Moslehi, and A. Bose. Power system control centers: Past, present, and future. Proceedings of the IEEE, 93(11):1890-1908, nov 2005. ISSN 0018-9219.
  77. L. Xie, Y. Mo, and B. Sinopoli. False data injection attacks in electricity markets. In First IEEE International Conference on Smart Grid Communications, October 2010.
  78. Y. Yuan, Z. Li, and K. Ren. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2(2):382-390, June 2011.
  79. W. Zhang, Q. Yang, and Y. Geng. A survey of anomaly detection methods in networks. In International Symposium on Computer Network and Multimedia Technology, 2009.
  80. R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas. MATPOWER's extensible optimal power flow architecture. In Power and Energy Society General Meeting, pages 1-7. IEEE, July 2009.