On model of cyber-physical system with state and measurement attacks on the basis of stochastic difference equations

Authors

  • Василь Петрович Марценюк University of Bielsko-Biala, Bielsko-Biala
  • Андрій Степанович Сверстюк I.Y. Gorbachevsky Ternopil State Medical University

DOI:

https://doi.org/10.18372/2410-7840.21.13543

Keywords:

cyber-physical system, stochastic difference equations, optimal estimation problem, network model

Abstract

The article is devoted to questions of simulation of cyber-physical systems taking into account information threats. The principles of organization of structure and reliable functioning of the studied systems are analyzed. The conceptual model of cyber-physical systems taking into account information threats is presented. The constructive algorithm for finding an estimation in a cyberphysical model during attacks on a state and observation on the basis of measuring system indices is proposed in the work. The model is presented as a non-stationary descriptor system, which includes differential equations for node state variables and algebraic equations for measurements. State variables and measurements are considered as random vectors. The information criterion is used to find the optimal estimate of the scalar product that characterizes the state of the system. The algorithm is based on the construction of the task of estimation to the problem of optimal control. The value of the mean square error that does not depend on attacks is obtained. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. An algorithm for constructing an optimal estimation for a scalar product is proposed, which includes the state of the network model during an attack. Mutual information between random vectors was used as a quality criterion for optimization. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. Considering the effects of attacks on this estimate, it should be noted that the build estimate depends on such attacks only through the multiplier. The average square error of such an estimate is independent of the attack. The reason for the absence of impact of the attack on the mean square error is the quadratic form of the sets that are selected for state attacks. This assumption makes it possible to apply a linear-quadratic optimization device, which reduces the problem of evaluation to the problem of optimal control. Received results illustrated in the numerical example for the stage of system without noise and with attacks and for the stage of system with noise and attacks. In this case , a three-node cyberphysical system was used which could be used for planning technical service and optimized management for achievement more high totalperformance and safety of the studied systems .

Author Biographies

Василь Петрович Марценюк, University of Bielsko-Biala, Bielsko-Biala

Doctor of Technical Sciences, Professor, Professor of the Department of Іnformatics and Automatics, University of Bielsko-Biala, Bielsko-Biala

Андрій Степанович Сверстюк, I.Y. Gorbachevsky Ternopil State Medical University

PhD, Associate Professor of Technical Sciences, Associate Professor, Associate Professor, Department of Medical Informatics, I.Y. Gorbachevsky Ternopil State Medical University

References

E.A Lee, "Cyber physical systems: Design challenges", 11th IEEE international symposium on object oriented realtime distributed computing (isorc), pp. 363-369, 2008.

J. Lee, B. Bagheri, H. Kao, "A cyber-physical systems architecture for industry 4.0-based manufacturing systems", Manufacturing Letters, vol. 3, pp. 18-23, 2015.

A. R. Metke and R. L. Ekl, "Security technology for smart grid networks", IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010.

S. Sridhar, A. Hahn, M. Govindarasu, "Cyber–physical system security for the electric power grid", Proceedings of the IEEE, vol. 99, no. 1, pp. 1-15, 2012.

J. Slay and M. Miller, "Lessons learned from the Maroochy water breach", Critical Infrastructure Protection, vol. 253, pp. 73-82, 2007.

A. A. Cardenas, S. Amin, S. Sastry, "Research challenges for the security of control systems", Proceedings of the 3rd Conference on Hot Topics in Security, Berkeley, CA, USA, 2008, pp. 6:1-6:6.

S. X. Ding, "Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools", Springer, 2008.

A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, "Challenges for securing cyber physical systems", Workshop on Future Directions in Cyber-physical Systems Security, Newark, NJ, USA, Jul. 2009.

C. DeMarco, J. Sariashkar, F. Alvarado, "The potential for malicious control in a competitive power systems environment", IEEE Int. Conf. on Control Applications, Dearborn, MI, USA, 1996, pp. 462-467.

S. Amin, A. Cardenas, and S. Sastry, "Safe and secure networked ´ control systems under denial-of-service attacks", Hybrid Systems: Computation and Control, vol. 5469, Apr. 2009, pp. 31-45.

Y. Liu, M. K. Reiter, P. Ning, "False data injection attacks against state estimation in electric power grids", ACM Conference on Computer and Communications Security, Chicago, IL, USA, Nov. 2009, pp. 21-32.

A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, S. Sastry, "Cyber security analysis of state estimators in electric power systems", IEEE Conf. on Decision and Control, Atlanta, GA, USA, Dec. 2010, pp. 5991-5998.

S. Amin, X. Litrico, S.S. Sastry, A.M. Bayen, "Stealthy deception attacks on water SCADA systems", Hybrid Systems: Computation and Control, Stockholm, Sweden, Apr. 2010, pp. 161-170.

Y. Mo, B. Sinopoli, "Secure control against replay attacks", Allerton Conf. on Communications, Control and Computing, Monticello, IL, USA, Sep. 2010, pp. 911-918.

R. Smith, "A decoupled feedback structure for covertly appropriating network control systems", IFAC World Congress, Milan, Italy, Aug. 2011, pp. 90-95.

M. Zhu, S. Mart´ınez, "Stackelberg-game analysis of correlated attacks in cyber-physical systems", American Control Conference, San Francisco, CA, USA, Jul. 2011, pp. 4063-4068.

F. Hamza, P. Tabuada, S. Diggavi, "Secure stateestimation for dynamical systems under active adversaries", Allerton Conf. on Communications, Control and Computing, Sep. 2011.

G. Dan, H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems", IEEE Int. Conf. on Smart Grid Communications, Gaithersburg, MD, USA, Oct. 2010, pp. 214-219.

E. Levrat, B. Iung, A. Crespo Marquez, "E-maintenance: review and conceptual framework", Production Planning & Control, Vol. 19, no. 4, June 2008, pp. 408-429.

S. Ruiz-Arenas, I. Horváth, R. Mejía-Gutiérrez, E. Opiyo, "Towards the maintenance principles of

cyber-physical systems", Strojniški vestnik-Journal of Mechanical Engineering, vol. 60 (12), pp. 815-831, 2014.

F. Pasqualetti, R. Zampieri, and F. Bullo, Controllability metrics and algorithms for complex networks, 2013.

F. Pasqualetti, F. Dorer, and F. Bullo, Attack detec-tion and identification for cyber-physical systems, Part I: Models and fundamental limitations.

L. Rossman, "Epanet 2, water distribution system modeling software", US Environmental Protection Agency, Water Supply and Water Resources Division, Tech. Rep., 2000.

Y. Tomita, S. Omatu, T. Soeda, "An application of the information theory to _ltering problems", Information Sciences, vol. 11, no. 1, pp. 13-27, 1976. [Online]. Available: http:// www. sciencedirect. com/ science/ article/pii/0020025576900347.

X. Feng, K. Loparo, and Y. Fang, "Optimal state estimation for stochastic systems: An information theoretic approach", Automatic Control, IEEE Transactions, vol. 42, no. 6, pp. 771-785, Jun. 1997, issn: 0018-9286. doi: 10.1109/9.587329.

N. Kirichenko, A. Nakonechnyi, "Minimax approach to recursive estimation of states of linear dynamic systems", Cybernetics, vol. 13, no. 4, pp. 527-531, 1977, issn: 1573-8337. doi: 10.1007/BF01069547. [Online]. Available: http://dx.doi.org/10.1007/BF01069547.

A. Nakonechnyi, O. Levoshich, "Estimating the solutions of linear stochastic equations by the information criterion", Journal of Soviet Mathematics, vol. 60, no. 4, pp. 1619-1625, 1992, issn: 1573-8795. doi: 10.1007/BF01097620. [Online]. Available: http://dx.doi.org/10.1007/BF01097620.

A. Nakonechny, V. Marzeniuk, "Uncertainties in medical processes control", Lecture Notes in Economics and Mathematical Systems, vol. 581, pp. 185-192, 2006, doi: 10.1007/3-540-35262-7_11. [Online]. Available: https://www.scopus.com/inward/record. uri?eid=2s2.0-53749093113&partnerID=40&md5=e06a573bf 8b6cdcdccd6dc91aecd2626.

D. MacKay, Information theory, inference, and learning algorithms. Cambridge, UK New York: Cambridge University Press, 2003, isbn: 0521642981.

R. Waschburger and R. K. H. Galva, "Time delay estimation in discretetime state-space models", Signal Process., vol. 93, no. 4, pp. 904-912, Apr. 2013, issn: 0165-1684. doi: 10.1016/j.sigpro.2012.10.017. [Online]. Available: http:// dx. doi. org/10.1016/j.sigpro.2012. 10.017.

Published

2019-03-28

Issue

Section

Articles