Controller Synthesis for Linear Time-varying Systems with Adversaries![Conflict Detection Enabled Conflict Detection Enabled](/sites/all/themes/redux/css/images/icons/conflict_enabled_icon.png)
Title | Controller Synthesis for Linear Time-varying Systems with Adversaries |
Publication Type | Report |
Year of Publication | 2015 |
Authors | Zhenqi Huang, University of Illinois at Urbana-Champaign, Yu Wang, University of Illinois at Urbana-Champaign, Sayan Mitra, University of Illinois at Urbana-Champaign, Geir Dullerud, University of Illinois at Urbana-Champaign |
Report Number | arXiv:1501.04925 [cs.SY] |
Keywords | constraint-based synthesis, controller synthesis, critical infrastructure, Cyber-physical security, NSA SoS Lablets Materials, science of security, Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems, UIUC |
Abstract | We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks en- visioned on cyber-physical systems such as sensor spoofing, controller corruption, and actuator intrusion. After formu- lating the problem in a general setting, we present a sound and complete algorithm for the case with linear dynamics and an adversary with a budget on the total L2-norm of its actions. The algorithm relies on a result from linear control theory that enables us to decompose and precisely compute the reachable states of the system in terms of a symbolic simulation of the adversary-free dynamics and the total uncertainty induced by the adversary. With this de- composition, the synthesis problem eliminates the universal quantifier on the adversary's choices and the symbolic con- troller actions can be effectively solved using an SMT solver. The constraints induced by the adversary are computed by solving second-order cone programmings. The algorithm is later extended to synthesize state-dependent controller and to generate attacks for the adversary. We present prelimi- nary experimental results that show the effectiveness of this approach on several example problems. |
URL | https://publish.illinois.edu/science-of-security-lablet/files/2014/05/Controller-Synthesis-for-Linea... |
Citation Key | node-23368 |
Attachment | Size |
---|---|
bytes |
- Critical Infrastructure
- Science of Security
- constraint-based synthesis
- Controller Synthesis
- critical infrastructure
- cyber-physical security
- NSA SoS Lablets Materials
- Science of Security
- Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems
- UIUC
- UIUC
- NSA SoS Lablets Materials
- Static-Dynamic Analysis of Security Metrics for Cyber-Physical Systems