Access the full text.
Sign up today, get DeepDyve free for 14 days.
B. Lu (2005)
Linear Parameter-Varying Control of an F-16 Aircraft at High Angle of Attack
Rui Ma, S. Basumallik, S. Eftekharnejad, Fanxin Kong (2020)
Recovery-based Model Predictive Control for Cascade Mitigation under Cyber-Physical Attacks2020 IEEE Texas Power and Energy Conference (TPEC)
J. Petit, Bas Stottelaar, M. Feiri (2015)
Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR
K. Tan, Yun Li (2001)
Performance-based control system design automation via evolutionary computingEngineering Applications of Artificial Intelligence, 14
Tianjia He, Lin Zhang, Fanxin Kong, Asif Salekin (2020)
Exploring inherent sensor redundancy for automotive anomaly detection57th Design Automation Conference. ACM
K. Tan, Y. Li (2001)
PERFORMANCE-BASED CONTROL SYSTEM DESIGN AUTOMATION VIA EVOLUTIONARY COMPUTING
M. Pajic, James Weimer, N. Bezzo, P. Tabuada, O. Sokolsky, Insup Lee, George Pappas (2014)
Robustness of attack-resilient state estimators2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, S. Sastry (2011)
Attacks against process control systems: risk assessment, detection, and response
Francis Akowuah, Romesh Prasad, Carlos Espinoza, Fanxin Kong (2021)
Recovery-by-Learning: Restoring Autonomous Cyber-physical Systems from Sensor Attacks2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA)
Yasser Shoukry, Paul Martin, P. Tabuada, M. Srivastava (2013)
Non-invasive Spoofing Attacks for Anti-lock Braking Systems
Sibin Mohan, Stanley Bak, E. Betti, H. Yun, L. Sha, M. Caccamo (2012)
S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical SystemsArXiv, abs/1202.5722
Robert Mitchell, I. Chen (2014)
A survey of intrusion detection techniques for cyber-physical systemsACM Computing Surveys (CSUR), 46
Karl Åström, Richard Murray (2008)
Feedback Systems: An Introduction for Scientists and Engineers
Anezka Chovancova, Tomas Fico, Lubos Chovanec, Peter Hubinsk (2014)
Mathematical Modelling and Parameter Identification of Quadrotor (a survey)Procedia Engineering, 96
S. Chaterji, Parinaz Ardabili, M. Alam, S. Bagchi, M. Chiang, D. Corman, B. Henz, S. Jana, Na Li, S. Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, A. Sabharwal, S. Sundaram, James Weimer, Jennifer Weller (2019)
Resilient Cyberphysical Systems and their Application Drivers: A Technology RoadmapArXiv, abs/2001.00090
J. Giraldo, A. Cárdenas, R. Sanfelice (2019)
A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems2019 American Control Conference (ACC)
Xiaofeng Wang, N. Hovakimyan, L. Sha (2013)
L1Simplex: Fault-tolerant control of cyber-physical systems2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
B. He, Xiaoming Yuan (2012)
On the O(1/n) Convergence Rate of the Douglas-Rachford Alternating Direction MethodSIAM J. Numer. Anal., 50
W. Heemels, J. Sandee, P. Bosch (2008)
Analysis of event-driven controllers for linear systemsInternational Journal of Control, 81
Lin Zhang, Xin Chen, Fanxin Kong, Alvaro A. Cardenas (2020)
Real-time recovery for cyber-physical systems using linear approximations41st IEEE Real-time Systems Symposium (RTSS). IEEE.
A. Cárdenas, Saurabh Amin, S. Sastry (2008)
Secure Control: Towards Survivable Cyber-Physical Systems2008 The 28th International Conference on Distributed Computing Systems Workshops
Francis Akowuah, Fanxin Kong (2021)
Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS)
Francis Akowuah, Fanxin Kong (2021)
Physical Invariant Based Attack Detection for Autonomous Vehicles: Survey, Vision, and Challenges2021 Fourth International Conference on Connected and Autonomous Driving (MetroCAD)
Pengyuan Lu, Limin Zhang, B. Park, Lu Feng (2018)
Attack-Resilient Sensor Fusion for Cooperative Adaptive Cruise Control2018 21st International Conference on Intelligent Transportation Systems (ITSC)
Aviva Hope Rutkin (2013)
spoofers use fake GPS signals to knock a yacht off courseMIT Technology Review. Online; accessed May 2020.
JH Sandee, WPMH Heemels, PPJ Van Den Bosch (2005)
Event-driven control as an opportunity in the multidisciplinary development of embedded controllersAmerican Control Conference. IEEE
Yilin Mo, E. Garone, A. Casavola, B. Sinopoli (2010)
False data injection attacks against state estimation in wireless sensor networks49th IEEE Conference on Decision and Control (CDC)
Karl Johan Åström, Richard M Murray (2010)
Feedback Systems: An Introduction for Scientists and EngineersPrinceton university press
Stephen Boyd, Neal Parikh, Eric Chu (2011)
Distributed Optimization and Statistical Learning Via the Alternating Direction Method of MultipliersNow Publishers Inc
Fanxin Kong, Meng Xu, James Weimer, O. Sokolsky, Insup Lee (2018)
Cyber-Physical System Checkpointing and Recovery2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)
Xin Chen, S. Sankaranarayanan (2017)
Model Predictive Real-Time Monitoring of Linear Systems2017 IEEE Real-Time Systems Symposium (RTSS)
Radoslav Ivanov, M. Pajic, Insup Lee (2016)
Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical SystemsACM Transactions on Embedded Computing Systems (TECS), 15
2013. spoofers use fake GPS signals to knock a yacht off course. MIT Technology Review. Online; accessed
M. Pajic, James Weimer, N. Bezzo, O. Sokolsky, George Pappas, Insup Lee (2017)
Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State EstimatorsIEEE Control Systems, 37
H. Kwakernaak, R. Sivan (1972)
Linear Optimal Control Systems
Yao Liu, P. Ning, M. Reiter (2011)
False data injection attacks against state estimation in electric power gridsACM Trans. Inf. Syst. Secur., 14
Raul Quinonez, J. Giraldo, Luis Salazar, Erick Bauman, A. Cárdenas, Zhiqiang Lin (2020)
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu (2020)
SoK: A Minimalist Approach to Formalizing Analog Sensor Security2020 IEEE Symposium on Security and Privacy (SP)
Xiao Zhou, J. Doyle (1997)
Essentials of Robust Control
F. Sabatino (2015)
Quadrotor control: modeling, nonlinearcontrol design, and simulation
E. Elnozahy, L. Alvisi, Yi-Min Wang, David Johnson (2002)
A survey of rollback-recovery protocols in message-passing systemsACM Comput. Surv., 34
Hongjun Choi, Sayali Kate, Yousra Aafer, X. Zhang, Dongyan Xu (2020)
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles
Inseok Hwang, Sungwan Kim, Youdan Kim, C. Seah (2010)
A Survey of Fault Detection, Isolation, and Reconfiguration MethodsIEEE Transactions on Control Systems Technology, 18
M. Branicky, S. Phillips, Wei Zhang (2000)
Stability of networked control systems: explicit analysis of delayProceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334), 4
J. Giraldo, D. Urbina, A. Cárdenas, J. Valente, M. Faisal, Justin Ruths, Nils Tippenhauer, H. Sandberg, R. Candell (2018)
A Survey of Physics-Based Attack Detection in Cyber-Physical SystemsACM Computing Surveys (CSUR), 51
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo (2017)
Cyber-Physical Systems Security—A SurveyIEEE Internet of Things Journal, 4
D. Urbina, J. Giraldo, A. Cárdenas, Nils Tippenhauer, J. Valente, M. Faisal, Justin Ruths, R. Candell, H. Sandberg (2016)
Limiting the Impact of Stealthy Attacks on Industrial Control SystemsProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, X. Zhang, Dongyan Xu, Xinyan Xinyan (2018)
Detecting Attacks Against Robotic Vehicles: A Control Invariant ApproachProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Tanya Crenshaw, E. Gunter, C. Robinson, L. Sha, P. Kumar (2007)
The Simplex Reference Model: Limiting Fault-Propagation Due to Unreliable Components in Cyber-Physical System Architectures28th IEEE International Real-Time Systems Symposium (RTSS 2007)
Michael Green, David JN Limebeer (2012)
Linear Robust ControlCourier Corporation.
B. Stellato, G. Banjac, P. Goulart, A. Bemporad, Stephen Boyd (2017)
OSQP: an operator splitting solver for quadratic programsMathematical Programming Computation, 12
Gaoqi He, Zhifu Chai, Xingjian Lu, Fanxin Kong, Bin Sheng (2019)
ADMM-Based Decentralized Electric Vehicle Charging with Trip Duration Limits2019 IEEE Real-Time Systems Symposium (RTSS)
M. Wolf, D. Serpanos (2018)
Safety and Security in Cyber-Physical Systems and Internet-of-Things SystemsProceedings of the IEEE, 106
Xin Chen, Sriram Sankaranarayanan (2017)
Model-predictive real-time monitoring of linear systemsIEEE Real-time Systems Symposium (RTSS). IEEE Press
Tanya L. Crenshaw, Elsa Gunter, Craig L. Robinson, Lui Sha, P. R. Kumar (2007)
The simplex reference model: Limiting fault-propagation due to unreliable components in cyber-physical system architectures28th IEEE International Real-time Systems Symposium (RTSS). IEEE
J. Sandee, W. Heemels, P. Bosch (2005)
Event-driven control as an opportunity in the multidisciplinary development of embedded controllersProceedings of the 2005, American Control Conference, 2005.
Ruixuan Wang, Fanxin Kong, Hasshi Sudler, Xun Jiao (2021)
Brief Industry Paper: HDAD: Hyperdimensional Computing-based Anomaly Detection for Automotive Sensor Attacks2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS)
A. Domahidi, E. Chu, Stephen Boyd (2013)
ECOS: An SOCP solver for embedded systems2013 European Control Conference (ECC)
Hamza Fawzi, P. Tabuada, S. Diggavi (2012)
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial AttacksIEEE Transactions on Automatic Control, 59
Rui Ma, S. Basumallik, S. Eftekharnejad, Fanxin Kong (2021)
A Data-Driven Model Predictive Control for Alleviating Thermal Overloads in the Presence of Possible False DataIEEE Transactions on Industry Applications, 57
J. Giraldo, Esha Sarkar, A. Cárdenas, M. Maniatakos, Murat Kantarcioglu (2017)
Security and Privacy in Cyber-Physical Systems: A Survey of SurveysIEEE Design & Test, 34
Tianjia He, Lin Zhang, Fanxin Kong, Asif Salekin (2020)
Exploring Inherent Sensor Redundancy for Automotive Anomaly Detection2020 57th ACM/IEEE Design Automation Conference (DAC)
Huijun Gao, Xiangyu Meng, Tongwen Chen (2008)
Stabilization of Networked Control Systems With a New Delay CharacterizationIEEE Transactions on Automatic Control, 53
Ruixuan Wang, Fanxin Kong, Hasshi Sudler, Xun Jiao (2021)
HDAD: Hyperdimensional computing-based anomaly detection for automotive sensor attacks27th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS)
J. Roux (2003)
An Introduction to the Kalman Filter
A. Ganesan, J. Rao, K. Shin (2017)
Exploiting Consistency among Heterogeneous Sensors for Vehicle Anomaly Detection
Fan Fei, Zhan Tu, Dongyan Xu, Xinyan Deng (2020)
Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks2020 IEEE International Conference on Robotics and Automation (ICRA)
The increasing autonomy and connectivity in cyber-physical systems (CPS) come with new security vulnerabilities that are easily exploitable by malicious attackers to spoof a system to perform dangerous actions. While the vast majority of existing works focus on attack prevention and detection, the key question is “what to do after detecting an attack?”. This problem attracts fairly rare attention though its significance is emphasized by the need to mitigate or even eliminate attack impacts on a system. In this article, we study this attack response problem and propose novel real-time recovery for securing CPS. First, this work’s core component is a recovery control calculator using a Linear-Quadratic Regulator (LQR) with timing and safety constraints. This component can smoothly steer back a physical system under control to a target state set before a safe deadline and maintain the system state in the set once it is driven to it. We further propose an Alternating Direction Method of Multipliers (ADMM) based algorithm that can fast solve the LQR-based recovery problem. Second, supporting components for the attack recovery computation include a checkpointer, a state reconstructor, and a deadline estimator. To realize these components respectively, we propose (i) a sliding-window-based checkpointing protocol that governs sufficient trustworthy data, (ii) a state reconstruction approach that uses the checkpointed data to estimate the current system state, and (iii) a reachability-based approach to conservatively estimate a safe deadline. Finally, we implement our approach and demonstrate its effectiveness in dealing with totally 15 experimental scenarios which are designed based on 5 CPS simulators and 3 types of sensor attacks.
ACM Transactions on Embedded Computing Systems (TECS) – Association for Computing Machinery
Published: Sep 22, 2021
Keywords: Cyber-physical system
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.