SYSTEM AND METHOD FOR SECURITY CONTROL IN CYBER-PHYSICAL SYSTEMS WITH DELAY-INDUCED FEEDBACK WATERMARKING

Information

  • Patent Application
  • 20240211593
  • Publication Number
    20240211593
  • Date Filed
    December 22, 2022
    a year ago
  • Date Published
    June 27, 2024
    5 months ago
Abstract
A system and a method for secure control of a physical system are described. During operation, the system can obtain measurement of one or more sensors associated with the physical system. The system then estimates a state of the physical system based on the measurement of the sensors. Subsequently, the system generates a feedback control signal based on the estimated state and generates a watermarking signal based on a stored estimated state of the physical system at a previous time instant. The system then generates a watermarked control signal by combining the feedback control signal and the watermarking signal and applies the watermarked control signal to the physical system to regulate the state of the physical system, thereby facilitating secure control of the physical system.
Description
BACKGROUND
Field

This disclosure is generally related to the secure control of physical systems. More specifically, this disclosure is related to using a time-delayed state-estimate watermarking scheme to ensure security while controlling the physical systems.


Related Art

Cyber-physical systems (CPSs) are the integrations of computation, communication, and control that achieve the desired performance of physical processes. CPSs, especially when used in critical infrastructure systems (e.g., power grids, financial markets, and commercial and military communication networks), require security. However, the complex nature of CPSs makes such systems prone to compromise by malicious actors and has led to an increase in malicious cyber-attacks, especially in industrial control systems.


One common type of malicious cyber-attack is the replay attack, in which valid data transmission is maliciously or fraudulently repeated. An effective method for detecting the replay attack can include the use of watermarking signals in the cyber-physical systems. Watermarking can be considered a method of data authentication that infuses untraceable and unrepeatable signals (e.g., additive white noise) into the output of the CPS. A CPS secured by watermarking can be referred to as a watermarked physical system (or watermarked system for short).


The presence of the watermarking signal can indicate whether an output of the watermarked system is the current output. In particular, the watermarked system induces a discrepancy between a replay signal and a current output signal because the corresponding watermarks on the respective signals can be different. However, since the watermarking signal is typically incorporated as extra noise, the overall performance of the watermarked system can degrade due to the watermarking process.


SUMMARY

One embodiment provides a system and method for secure control of a physical system. During operation, the system can obtain measurement of one or more sensors associated with the physical system. The system then estimates a state of the physical system based on the measurement of the sensors. Subsequently, the system generates a feedback control signal based on the estimated state and generates a watermarking signal based on a stored estimated state of the physical system at a previous time instant. The system then generates a watermarked control signal by combining the feedback control signal and the watermarking signal and applies the watermarked control signal to the physical system to regulate the state of the physical system, thereby facilitating secure control of the physical system, against replay attacks.


In a variation on this embodiment, the system can perform a chi-square detection to detect a replay attack on the physical system.


In a further variation, the system can output an alarm signal in response to detecting a replay attack.


In a variation on this embodiment, while generating the feedback control signal, the system can apply a linear-quadratic-Gaussian (LQG) control scheme.


In a variation on this embodiment, while generating the watermarking signal, the system can generate a random delay within a predetermined range based on a predetermined probability mass function, obtaining the stored estimated state based on the random delay such that a difference between the previous time instant and a current time instant equals the random delay, and multiplying the stored estimated state by a predetermined scale factor.


In a further variation, while generating the random delay, the system can generate the random delay for each time instant or generating the random delay for multiple consecutive time instants.


In a further variation, the system can tune the predetermined range and/or the predetermined probability mass function to ensure that the watermarking signal does not cause instability in the physical system.


In a further variation, the system can tune the predetermined scale factor to ensure that the watermarking signal is within an admissible input range of the physical system.


In a further variation, the predetermined probability mass function can include a Gaussian distribution function or a uniform distribution function.





BRIEF DESCRIPTION OF THE FIGURES


FIG. 1A illustrates an exemplary watermarked system, according to prior art.



FIG. 1B illustrates the performance of existing noise-based watermarking schemes, according to prior art.



FIG. 2 illustrates the delay-induced watermarking scheme, according to one embodiment.



FIG. 3A illustrates an exemplary use case of the delay-induced watermarking scheme, according to one embodiment.



FIG. 3B compares the performance of the Gaussian-noise-based watermarking and the delay-induced watermarking schemes for a three-tank system, according to one embodiment.



FIG. 4 presents a flowchart illustrating an exemplary process for implementing the delay-induced watermarking scheme to protect a cyber-physical system from replay attacks, according to one embodiment.



FIG. 5 presents a block diagram of an exemplary secure control system implementing the delay-induced watermarking scheme, according to one embodiment.



FIG. 6 illustrates an exemplary computer system that facilitates the secure control of a physical system, according to one embodiment.





In the figures, like reference numerals refer to the same figure elements.


DETAILED DESCRIPTION

The following description is presented to enable any person skilled in the art to make and use the embodiments and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown but is to be accorded the widest scope consistent with the principles and features disclosed herein.


Overview

Embodiments described herein provide a system and method for generating watermarking signals in control systems. Instead of using additive noise as watermarking signals (which can lead to performance degradation), the proposed solution uses delayed state estimates of the system under control as the watermarking signals. More specifically, the control system can store past estimated states of the system within a predetermined time window and generate watermarking signals by applying a random delay to the past states and then multiplying the randomly delayed states by a predetermined scale factor. The system also determines the constraints (e.g., upper and lower bounds) to be applied to the random delay and the scale factor to ensure that the generated watermarking signals are admissible (i.e., they are within the allowed range of input of the system and do not cause instability in the system). Compared with random noise watermarking signals, the delay-induced watermarking signals can provide fast detection of relay attacks with reduced degradation in system performance.


Time-Delayed Watermarking


FIG. 1A illustrates an exemplary watermarked system, according to prior art. In FIG. 1A, a physical system (e.g., a CPS) 100 can be controlled by a controller 102. More specifically, system 100 and controller 102 can form a control loop, where controller 102 controls the state of system 100 based on the output of system 100. Assuming system 100 is a discrete-time linear time-invariant (LTI) system, the system dynamics can be expressed as:











x

t
+
1


=


Ax
t

+

Bu
t

+

Dw
t



,




(
1
)














y
t

=


Cx
t

+

v
t



,




(
2
)







where xtcustom-characternx is the state of the system at time step t, and utcustom-characternu is the control input at time step t. A∈custom-characternx×nu and B∈custom-characternx×nu are the state and input distribution matrices, respectively. The system dynamics are disrupted by wtcustom-charactercustom-character(0, W), ∀t, with W∈custom-characternw×nw being the system covariance and D∈custom-characternx×nw being the noise distribution matrix. The output of system 100 at time t (i.e., ytcustom-characterny is an imperfect measurement of the system state through output matrix C∈custom-characterny×nx, with sensor noise vtcustom-charactercustom-character(0, V), ∀t, with V∈custom-characternv×nv as the sensor covariance.


To prevent replay attacks, a watermarking signal Δut is added to the control input ut. A state estimator 104 can estimate the system state {circumflex over (x)} and a residue signal can be computed as r=y−C{circumflex over (x)}, where {circumflex over (x)} is the estimated system state. The residue signal can be used to detect anomalies or potential attacks. In the absence of sensor and process noises (i.e., {w} and {v} in Equations (1) and (2)), it should hold that yt→C{circumflex over (x)}t|t+1 for tcustom-character1. Therefore, any large and consistent discrepancies in the statistical behavior of rt for large t should indicate a potential attack. A chi-square or χ2 detector (not shown in FIG. 1) can be used to detect the relay attacks based on the residue. The χ2 detector is a standard tool in system diagnostics that leverages the estimated states to detect data incoherences that can be measured from the dynamic residue. The χ2 detector output over an observation window T can be defined as:











g
k

(
T
)


=




t
=
k


k
+
T






(


y
t

-

C



x
^


t


t
-
1





)

T







R

-
1




(


y
t

-

C



x
^


t


t
-
1





)




,




(
3
)







where the matrix ΣR depends on system properties.


During a replay attack, the attacker can have access to the system's output yt and can transmit an outdated (asynchronous) copy of the system's output yt and replay it indefinitely. As a result, during the attack interval custom-character, both the user and all other system components (including the Kalman filter and the feedback controller in controller 102) receive a compromised signal:











y
t
attack

=

y

t
-
σ



,

t


,




(
4
)







which places the system's behavior in jeopardy. The attack model can be expressed as:













x

t
+
1









=


Ax
t








+

Bu
t








+

Dw
t










,




(
5
)
















y
t








=


Cx
t








+


v
t








.






(
6
)








Therefore, the residue signal in the event of the replay attack becomes r′=y′−C{circumflex over (x)}, where y′ is the compromised system measurement. During attack, the attacker replays a previous yt to make the fake reading look normal, resulting in the residue monitored by the χ2 detector (i.e., yt−C{circumflex over (x)}t|t−1) being replaced by y′t−C{circumflex over (x)}t|t−1. Accordingly, the χ2 detector output during the attack becomes:










g
k



(
T
)


=




t
=
k


k
+
T






(


y
t


-

C



x
^


t


t
-
1





)

T







R

-
1





(


y
t


-

C



x
^


t


t
-
1





)

.







(
7
)







In conventional approaches, the watermarking signal is a Gaussian noise (i.e., Δutcustom-charactercustom-character(0, U)), which is assumed to be statistically independent of other noise sources (e.g., the sensor and process noises). With the addition of the Gaussian noise watermarking signal, the system dynamics described in Equation (1) become:










x

t
+
1


=


Ax
t

+

Bu
t

+

B

Δ


u
t


+


Dw
t

.






(
8
)







It can be shown that stronger watermarking signals (i.e., a larger U) can increase the detectability of the attack (e.g., the replay attack can be detected faster). However, the noise added to the control input can also decrease the performance of the control system. More specifically, the added noise can increase the cost function for the feedback control. Assuming controller 102 implements a linear-quadratic-Gaussian (LQG) control scheme, the cost function can be expressed as:










J
=


lim

t






𝔼
[



1
t






k
=
0


t
-
1





x
k
T



Qx
k




+


u
k
T



Ru
k



]



,




(
9
)







where u=uC+Δu is the control feedback, and Q and R are the weighting matrices.



FIG. 1B illustrates the performance of existing noise-based watermarking schemes, according to prior art. The top drawing shows the χ2 detector output (i.e., gk) for watermarking signals of different intensities (i.e., different U), and the table at the bottom of FIG. 1B shows the corresponding value of the cost functions. As can be seen from FIG. 1B, the larger the U or the higher the watermarking intensity, the faster the detection of the attack. However, a larger U also leads to a higher cost, meaning that the performance of the control system is worse for the larger U.


To provide watermarking without causing significant degradation to the system performance (e.g., without significantly increasing the cost function), in some embodiments of the instant application, the control system can generate a watermarking signal using delayed system state estimates. When the control system implements the LQG control scheme, the feedback control signal can be expressed as:











u
t
LQG

=


-

K

x
^






x
^

t



,




(
10
)







where gains K{circumflex over (x)} is designed to minimize the cost function (i.e., the cost function shown in Equation (9)). In addition, a watermarking signal can be defined as:











u
t
WM

=


-

K
τ





x
^


t
-

τ
t





,




(
11
)







where Kt is the gain matrix used for scaling and τt is the time delay of the estimated state. Both Kt and τt can be used as tunable design parameters when designing the watermarking signal. In some embodiments, the time delays are non-negative and have a predetermined upper bound (i.e., τt∈{1, . . . , τ} for discrete-time delays). In further embodiments, at every time instant, the time delay τt changes randomly such that the sequence {τt}t≥0 can include independent and identically distributed (IID) random variables. The random delay variables can be statistically independent of the process noise and the sensor noise. With watermarking, the control feedback can be expressed as:










u
t

=



u
t
LQG

+

u
t
WM


=



-

K

x
^






x
^

t


-


K
τ





x
^


t
-

τ
t



.








(
12
)








FIG. 2 illustrates the delay-induced watermarking scheme, according to one embodiment. Note that, because the system is assumed to be a discrete-time LTI, a time instant t can also be expressed as a sequence number k. FIG. 2 shows that, at a time step k, the state (denoted xk) of a physical system 200 can affect the output or reading (denoted yk) of a sensor 202. Processing noises (denoted wk) and sensor noises (denoted vk) are added to system 200 and sensor 202, respectively.


A state estimator 204 can estimate the state of system 200 based on the output or reading of sensor 202, and the estimated state is denoted {circumflex over (x)}k. The estimated state {circumflex over (x)}k can be sent to a controller 206, which generates a feedback control signal (denoted ukC) based on the estimated state. In some embodiments, controller 206 can implement the LQG control scheme, and estimator 204 can include a Karman filter. The feedback control signal ukC can also be sent back to estimator 204 to optimize the estimated state.


In addition, the estimated state is sent to a memory module 208 for storage. In some embodiments, memory module 208 can store estimated states of system 200 within a time window of a predetermined duration. For the discrete-time system, memory module 208 can store a predetermined number of time samples of the estimated state. For example, memory module 208 can store estimated states of system 200 within a time window {τ1, . . . , τ2}, with τ1 and τ2 being the lower and upper bounds of the time window, respectively.


A random-delay generator 210 can generate a random delay based on a predetermined probability mass function (pmf). The pmf can be a uniform distribution function or other types of discrete probability distribution functions. A watermarking signal (denoted ukwm) can be generated based on the estimated states stored in memory 208 and the random delay generated by random-delay generator 210. More specifically, the watermarking signal can be expressed as:











u
k
wm

=


-

K
k





x
^


k
-

τ
k





,




(
13
)







where Kk is the scale factor that indicates the intensity of the watermarking signal, and τk is a variable randomly selected from time window {τ1, . . . , τ2} according to a predetermined pmf. In other words, the watermarking signal ukwm is a time-delayed-and-scaled version of the estimated state of system 200.


The feedback control signal ukC and the watermarking signal ukwm can be combined (e.g., by an adder 212) before being input to system 200 for feedback control. To ensure that the closed-loop control system is stable with the introduction of the delay-induced watermarking signal, the boundaries of the time delay and the scale factor (e.g., K) need to be carefully selected.


In some embodiments, the state estimator (e.g., a Kalman filter) can estimate the state of the system according to the following dynamics:











x


t
+
1


t


=


Ax


t
+
1


t


+

Bu
t

+

L

(


y
t

-

Cx

t


t
-
1




)



,




(
14
)







where L is the Kalman gain. The Kalman output is:











x

t

t


=



(

I
-
MC

)



x

t


t
-
1




+

My
t



,




(
15
)







where M is the innovation gain. A more detailed discussion of the LQG control scheme is omitted here, and the scope of this disclosure is not limited by the control scheme. To determine the scale factor (i.e., K) and the pmf of the random time delay (i.e., pτ), one can first define and calculate a number of matrices:







A
=

[




A
-


BK

x
^



MC





-


BK

x
^


(

I
-
MC

)








(

L
-


BK

x
^



M


)


C




A
-


BK

x
^


(

I
-
MC

)

-
LC




]


,







B
=

[





-

BK

τ
_




MC




-


BK

τ
_


(

I
-
MC

)








-

BK

τ
_




MC




-


BK

τ
_


(

I
-
MC

)





]


,

and






Γ
=


[



D




-

BK

x
^




M





-

BK

τ
_




M





0




-

BK

x
^




M





-

BK

τ
_




M




]

.





The following matrix equation can be solved for a given matrix C>0:












A
T


HA

-
H

=

-

C
.






(
16
)







The above equation can be solved to obtain H=HT>0 that exists and is unique. One can also define c>0 as the minimum eigenvalue of C and 0<η<η the minimum and maximum eigenvalues of H, respectively. Next, one can define:









α
:=

{









"\[LeftBracketingBar]"



η
_

-
c
+



"\[LeftBracketingBar]"



A
T


HB



"\[RightBracketingBar]"





"\[RightBracketingBar]"



η
_


,

c
>



"\[LeftBracketingBar]"



A
T


HB



"\[RightBracketingBar]"













"\[LeftBracketingBar]"



η
_

-
c
+



"\[LeftBracketingBar]"



A
T


HB



"\[RightBracketingBar]"





"\[RightBracketingBar]"



η
_


,

c




"\[LeftBracketingBar]"



A
T


HB



"\[RightBracketingBar]"







,






(
17
)













β
:=



η
_


-
1


(




"\[LeftBracketingBar]"



A
T


HB



"\[RightBracketingBar]"


+



"\[LeftBracketingBar]"



B
T


HB



"\[RightBracketingBar]"



)


,




(
18
)







where |custom-character| is the 2-matrix norm.


If α+β<1, then the system as defined by Equations (1) and (2) with the control input defined by Equation (12) using the Kalman filter (as defined by Equation (14)) as the state estimator (i.e., with the Kalman output defined by Equation (15)) can admit bounded solutions for time-delayed signals {circumflex over (x)}t−τt with an arbitrary but bounded delay τt<τ<∞. In other words, one need to find a scale factor that ensures α+β<1 such that the time-delayed-and-scaled state is admissible watermarking (i.e., it is within the acceptable input range of the system and will not destabilize the system). In some embodiments, the scale factor is chosen to be sufficiently small.


As can be seen from FIG. 2, the watermarking signal ukwm affects the state of system 200 and that controller 206 optimizes the feedback control signal ukC based on the estimated state {circumflex over (x)}k of system 200. This means that the optimization of both the watermarking signal ukwm and the feedback control signal ukC can be performed concurrently and codependently.



FIG. 2 also shows an attack-injection point 214, where an attacker can inject an outdated copy of the system's output. According to the attack model defined by Equations (5)-(6), the χ2 detector outputs without and with the addition of the watermarking signal in the feedback control are provided by Equations (3) and (7), respectively. To provide efficient detection of the replay attack, it is desirable to design a watermarking signal such that










lim

k


+






𝔼
[

g



(
T
)


]







lim

k






𝔼
[

g

(
T
)


]

.







(
19
)







The time-delay of the watermarking signal is selected from the time window {1, 2, . . . , τ}, either for every time step t or for a predetermined time interval comprising a number of consecutive time steps, according to a predetermined probability mass function (pmf) pτ. For example, the probability for τ(t)=1 can be p1, the probability for τ(t)=2 can be p2, and so on. The process for determining a suitable scale factor Kτ and a suitable time-delay pmf pτ can include the following steps.


The process for determining a suitable scale factor Kτ and a suitable time-delay pmf pτ should be chosen so that






G
:=


trace
[


lim

t


+






(


Var

(



x
^


t


t
-
1




-


x
^


t


t
-
1




)

+





V


)



C
T







R

-
1



C


]

+
2.








trace
[


lim

t


+






(


Cov
(




x
^


t


t
-
1




-


x
^


t


t
-
1




,


x
t


-


x
^


t


t
-
1






)

+





V


)



C
T







R

-
1



C


]

>
0






and


this


means


that









lim

k


+





g
k



(
T
)



=



lim

k


+





g
k

(
T
)



+

trace
[


lim

t


+






(


Var

(



x
^


t


t
-
1




-


x
^


t


t
-
1




)

+





V


)



C
T







R

-
1



C


]

+
G


,




that automatically satisfies (19).


Based on the above constructed matrices, one can construct matrices








𝕎
1



and



𝕎
2



as



𝕎
1


:=





l
=

-

τ
_






τ
_






Γ
_



𝔻
~




Γ
_

T




A
~


-

l
T





and



𝕎
2



:=




l
=

-

τ
_






τ
_







A
~


-
l




Γ
_



𝔻
~





Γ
_

T

.








The steady state error covariance matrix of the Kalman filter defined by Equation (14) can be constructed as:









E
=


lim

k


+






𝔼
[


(


x
t


-


x
^


t


t
-
1





)




(


x
t


-


x
^


t


t
-
1





)

T


]

.






(
20
)







At this point, one can verify whether W1+W2 is positive definite. If not, the scale matrix Kτ and pmf pτ need to be redesigned. The following equation for custom-character can be solved:












A
~


𝕌



A
~

T


-
𝕌
+


1
2



(


𝕎
1

+

𝕎
2


)



=
0.




(
21
)







One can further verify whether custom-character+custom-character>E. If not, Kτ and pτ need to be redesigned. The attack mode detector is equal to:








lim

k


+





g
k



(
T
)



=



lim

k


+





g
k

(
T
)



+


trace
[


(


𝒬𝕌𝒬
T

+

𝒫𝕌𝒫
T

-
E

)



(


C
T







R

-
1



C

)


]


T






that satisfies condition (19).


A crucial challenge in the watermarking-based secure-control scheme is that the controller is not designed to take into account the watermarking signal (e.g., as defined in (13)). The nominal LQG controller generates a feedback control to minimize the cost function (as defined in (9)) such that utLQG=arg min J(u). When the feedback control signal is augmented with the watermarking signal, the cost J increases, and there is an inherent trade-off between detectability and system performance, as demonstrated in FIG. 1A. However, compared with the conventional noise-based watermarking scheme that is largely controlled by the intensity covariance matrix U, this delay-induced watermarking scheme can provide a richer design space that includes Kτ, pτ, and a domain of τ. The closed loop dynamics now cease being Gaussian because a random process can be chosen freely (e.g., at each time step or each time interval comprising multiple steps, a randomly delayed state can be chosen). This feature provides a richer configuration space to design efficient watermarking signals that can guarantee better and faster detectability in the event of a replay attack with lower system degradation.



FIG. 3A illustrates an exemplary use case of the delay-induced watermarking scheme, according to one embodiment. In this example, a watermarked water supply system 300 that can facilitate a controlled chemical process is shown. System 300 can be controlled by a LQG controller 330 that generates a control signal 324 for regulating the state of system 300. A watermarking system 340 can be embedded into system 300 for injecting watermarking signal 326 into control signal 324.


System 300 can include water tanks 302, 304, and 306. Water tanks 302 and 306 hold hot and cold water, respectively, and water tank 304 holds water with an adjustable level and temperature. The system state x=(x1, x2, x3)T can indicate the level of water in tanks 304 and 306 and the temperature of water in tank 304. The control inputs can be respective control signals to flow pumps 312 and 314, valve 316, and heater 310 from controller 330. The objective of controller 330 is to regulate the state vector around a reference value that dictates the target level of water in tanks 304 and 306 and the target temperature of water in tank 304.


System 300 can include a sensor module 320 that can provide sensor measurements 322 indicative of water levels in tanks 304 and 306 and water temperature of tank 304. In some embodiments, system 300 can be observed by s sensors in sensor module 320. An attacker can record measurements 322 over a period and replay the recorded measurements while attacking system 300 by adding malicious data to measurements 322 to achieve a sequence of desired control signals from controller 330. Watermarking signal 326 allows a detector (i.e., the χ2 detector) to determine the replayed measurements and detect the attack on system 300.


Simulations of system 300 can be run to demonstrate the effectiveness of the watermarking signal in detecting replay attacks. In an exemplary simulation, the process noise and the sensor noise have been assumed to be zero-mean Gaussian with covariance W=0.5 I and V=0.1 I, respectively. The linearized dynamics of system 300 can be assumed as:







A
=



[



0.96


0


0




0.04


0.97


0





-
0.04



0


0.9



]



and


B

=

[



8.8



-
2.3



0


0




0.2


2.2


4.9


0





-
0.21




-
2.2



1.9


21



]



,




and the matrices C and D can be assumed to be identity, i.e., C=D=I.


In one example, the observation window of the χ2 detector can be chosen as T=85, the threshold η=110, the minimum and maximum time delay are set as τmin=50 and τmax=200, respectively. The total time of simulation can be 7000 steps. The performance metric to measure the system response is considered as the linear quadratic regulator (LQR) cost (as defined in Equation (9)) with the following weighting matrices: Qs=diag[0.3, 0.3, 2.4] for state cost, Qs=diag[0.1, 0.1, 0.1] for cost corresponding to integrator state, and R=diag[1, 1, 1, 1].



FIG. 3B compares the performance of the Gaussian-noise-based watermarking and the delay-induced watermarking schemes for the three-tank system shown in FIG. 3A, according to one embodiment. The top drawing of FIG. 3B compares the detection rates of the two watermarking schemes. In this example, the output of the system is recorded between tstart=6000 and tend=7000, and the replay attack starts at tattack=6500. As can be seen from FIG. 3B, the delay-induced watermarking scheme can result in a faster and an overall better detection scheme. The table shown at the bottom of FIG. 3B compares the LQR cost for three scenarios, no watermarking, using the delay-induced watermarking, or using the Gaussian-noise-based watermarking. As can be seen from the table, the delay-induced watermarking scheme can result in a lower LQR cost compared with the Gaussian-noise-based watermarking scheme (e.g., approximately 20% lower).



FIG. 4 presents a flowchart illustrating an exemplary process for implementing the delay-induced watermarking scheme to protect a cyber-physical system from replay attacks, according to one embodiment. During the operation of the cyber-physical system, a number of sensors in the system can measure the output of the system (operation 402), which can be an imperfect measurement of the state of the system. The output of the sensors can be sent to a feedback controller (operation 404). In some embodiments, the feedback controller can implement an LQG control scheme to estimate the state vector of the system and generate a feedback control signal (operation 406). For example, the feedback controller can include a Kalman-filter-based state estimator that estimates the system state vector according to the dynamics shown in Equations (14) and (15).


The estimated state vector can be stored in a memory for future usage (operation 408). In some embodiments, the memory can be configured to store the estimated state vector within a time window of a predetermined duration. Newly arrived estimated state vectors may evict older state vectors. For a discreate-time system, the memory can be configured to store a predetermined number of estimated state vectors.


A watermarking-signal generator can generate a delay-induced watermarking signal based on the stored time-delayed state vectors (operation 410). In some embodiments, the watermarking-signal generator can first generate a random time delay within a predetermined range based on a predetermined pmf. The pmf can be a Gaussian distribution function, a uniform distribution function, or other types of random distribution functions. The random time delay has an upper and lower bound. In some embodiments, a random time delay can be generated at each time step. In alternative embodiments, a random time delay can be generated for a plurality of consecutive time steps. The watermarking-signal generator can also determine a scale factor. The watermarking signal can be generated by accessing the memory to obtain the time-delayed state vector based on the random time delay and then multiplying the time-delayed state vector by the scale factor. Note that, before applying the watermarking signal to the system under control, the watermarking-signal generator needs to verify whether the generated watermarking signal is admissible, i.e., whether the watermarking signal is within the acceptable input range and whether the watermarking signal will destabilize the system. In the three-tank example shown in FIG. 3A, the watermarking signal should not exceed the allowed water level and temperature of tank 304, and the watermarking signal should not cause volatile changes to the water level and temperature in tank 304. In some embodiments, the watermarking-signal generator can verify whether G>0 is true based on the scale factor and the predetermined pmf and/or boundaries of the random delay. If not, the watermarking-signal generator can select a different scale factor and a different pmf and/or boundaries of the time delay. The watermarking-signal generator typically can select a sufficiently small scale factor and a reasonable upper bound (e.g., not too big) of the time delay. In further embodiments, the watermarking-signal generator can tune the magnitude (i.e., the scale factor) of the time-delayed watermarking signal and the pmf and/or range of the random time delay to obtain an optimal watermarking signal that satisfies condition (19).


The delay-induced watermarking signal can be combined with the control signal generated by the feedback controller to generate a watermarked control signal (operation 412). The watermarked control signal can be sent to the system under control as feedback control (operation 414). Sending the watermarked control signal to the system can involve applying the watermarked control signal to various control components of the system (e.g., heater 310, pumps 312 and 314, and valve 316 of system 300 shown in FIG. 3A) such that the state of the system can be regulated according to the watermarked control signal. More specifically, the dynamic of the state of the system can be regulated by the watermarked control signal based on Equation (1). A χ2 detector determines whether a replay attack occurs based on the system output and the estimated state within a predetermined time window (operation 416). If a replay attack is detected, the detector outputs an alarm signal, indicating the detection of an attack (operation 418). In some embodiments, the χ2 detector can monitor the residue signal and compute g(T), and if g(T) exceeds a predetermined threshold, the detector can output an alarm signal. If no relay attack is detected, the system continues to operate (operation 402).



FIG. 5 presents a block diagram of an exemplary secure control system implementing the delay-induced watermarking scheme, according to one embodiment. Secure control system 500 can include one or more sensors 502, a state estimator 504, a feedback controller 506, a memory 508, a random-delay generator 510, a watermarking-signal generator 512, a control-signal-combining module 514, and an attack detector 516. The various modules included in secure control system 500 can be implemented using hardware components, software components, or both.


Sensors 502 can measure the output of a system under control, which can be a CPS that is vulnerable to replay attacks. Due to process noise as well as the sensor noise, the output of sensors 502 can be an imperfect measurement of the state of the system under control. State estimator 504 and feedback controller 506 together can generate a feedback control signal that can regulate the state of the system under control to place the system in a desired state. More specifically, feedback controller 506 can be an LQG controller implementing the LQG control scheme, and state estimator 504 can estimate the state based on the output of sensors 502 and the feedback signal.


Memory 508 can store the past estimated state of the system within a time window of a predetermined duration. In some embodiments, memory 508 can store just enough past states needed for generating the delay-induced watermarking signals. In other words, the boundaries of the time window can be the lower and upper boundaries of the time delay. In alternative embodiments, memory 508 can store more states than what is needed for generating the delay-induced watermarking signals. In such a case, the boundaries of the time window can encompass the lower and upper boundaries of the time delay.


Random-delay generator 510 can be responsible for generating a random time delay based on a predetermined pmf. In some embodiments, the system is a discrete-time system, and generating the random delay may comprise randomly selecting a time sample within the aforementioned time window or within the predetermined lower and upper boundaries of the time delay. Watermarking-signal generator 512 can be responsible for generating an admissible watermarking signal based on the past states stored in memory 508, the random delay generated by random-delay generator 510, and a predetermined scale factor. More specifically, watermarking-signal generator 512 can select a past state from memory 508 based on the generated random delay. For example, if the current time instant is t, the generated random delay is τt, then the selected state can be the state of the system at time t−τt (i.e., xt−τt). Note that random-delay generator 510 can generate a random delay at each time instant (e.g., generate a unique τt for each t) or generate a random delay for a predetermined short duration (e.g., generate the same τt for t0<t<t1).


Watermarking-signal generator 512 can then multiply the obtained past state by the predetermined scale factor to generate the watermarking signal. In some embodiments, watermarking-signal generator 512 can determine whether the watermarking signal is admissible to the system and whether the generated watermarking signal would destabilize the system when being added to the system as part of the feedback control signal. More specifically, watermarking-signal generator 512 can tune the scale factor as well as the pmf used by random-delay generator 510 to ensure that the generated watermarking signal is admissible to the system and will not lead to instability. Due to the randomness of the time delay (either at each time step or at multiple time steps), the delay-induced watermarking signal is non-repeatable, thus making it possible to detect the replay attack.


Control-signal-combining module 514 can be responsible for combining the feedback control signal generated by feedback controller 506 and the watermarking signal generated by watermarking-signal generator 512. The combined signal can be referred to as a watermarked feedback control signal. Control-signal-combining module 514 can further send the watermarked feedback control signal as control input to the system in order to regulate the state of the system to achieve the desired system state.


Attack detector 516 can be responsible for monitoring the residue signal to determine whether a replay attack occurs. In some embodiments, attack detector 516 can include a chi-square detector. The observation window of the chi-square detector can be selected based on the properties of the system. With appropriately designed watermarking system, attack detector 516 can effectively detect the occurrence of the replay attack. For example, attack detector 516 can monitor the residue signal and compute gk(T) according to Equation (3). In response to detecting that gk(T) exceeds a predetermined threshold (e.g., as shown in the top drawing of FIG. 3B), attack detector 516 can output an alarm signal.



FIG. 6 illustrates an exemplary computer system that facilitates the secure control of a physical system, according to one embodiment. Computer system 600 includes a processor 602, a memory 604, and a storage device 606. Furthermore, computer system 600 can be coupled to peripheral input/output (I/O) user devices 610, e.g., a display device 612, a keyboard 614, a pointing device 616, and a sensor 618 associated with the physical system under control. Storage device 606 can store an operating system 620, a secure control system 622, and data 650.


Secure control system 622 can include instructions, which when executed by computer system 600, can cause computer system 600 or processor 602 to perform methods and/or processes described in this disclosure. Specifically, secure control system 622 can include instructions for receiving measurement data from sensors associated with the physical system under control (sensor-data-receiving instructions 624); instructions for estimating the state of the physical system (state-estimation instructions 626); instructions for generating a feedback control signal based on the estimated state (feedback-control instructions 628); instructions for storing the estimated state (state-storage instructions 630); instructions for generating a random delay (random-delay-generation instructions 632); instructions for tuning the range and determining the pmf of the random delay (random-delay-tuning instructions 634); instructions for generating an admissible watermarking signal based on the past states of the physical system, the random delay, and a predetermined scale factor (watermarking-signal-generation instructions 636); instructions for tuning the scale factor (scaling-factor-tuning instructions 638); instructions for combining the watermarking signal with the feedback control signal (control-signal-combining instructions 640); and instructions for detecting the replay attacks (attack-detection instructions 642). Data 650 can include the past estimated states 652.


In general, the disclosed embodiments provide a system and method that facilitate the secure control of a physical system using delay-induced watermarking. A physical system operating in the presence of process noise can be controlled using a feedback control signal generated from the estimated state of the physical system and a delayed-and-scaled version of the estimated state as a watermarking signal. More specifically, the secure control system can store (e.g., in a memory) estimated states of the physical system within a time window of a predetermined length. At each time instant or step, a watermarking signal can be generated by randomly selecting, from the stored estimated states, an estimated state and by multiplying the selected estimated state with a predetermined scale factor. The watermarking signal can be combined with the feedback control signal, and the combination (referred to as the watermarked control signal) can be used as a control input to modulate the state of the physical system under control. The random selection of the estimated states can be based on a predetermined pmf of the time delay between the selected state and the current state. The range and pmf of the time delay and the magnitude of the scale factor need to be carefully selected to ensure that the watermarking signal is an admissible control input to the physical system under control and that the addition of the watermarking signal as the control input will not destabilize the physical system under control. Further, the range and pmf of the time delay and the magnitude of the scale factor can be tuned to ensure fast detection of a replay attack with minimal performance degradation of the control system. In addition to the chemical process system shown in FIG. 3A, this watermarking scheme can be applied to any type of control system that controls the operation of a physical system, such as an electrical system, a mechanical system, a hydraulic system, etc.


The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium.


Furthermore, the methods and processes described above can be included in hardware modules or apparatus. The hardware modules or apparatus can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), dedicated or shared processors that execute a particular software module or a piece of code at a particular time, and other programmable-logic devices now known or later developed. When the hardware modules or apparatus are activated, they perform the methods and processes included within them.


The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims.

Claims
  • 1. A computer-implemented method for secure control of a physical system, the method comprising: obtaining measurement of one or more sensors associated with the physical system;estimating a state of the physical system based on the measurement of the sensors;generating a feedback control signal based on the estimated state;generating a watermarking signal based on a stored estimated state of the physical system at a previous time instant;generating a watermarked control signal by combining the feedback control signal and the watermarking signal; andapplying the watermarked control signal to the physical system to regulate the state of the physical system, thereby facilitating secure control of the physical system.
  • 2. The method of claim 1, comprising performing a chi-square detection to detect a replay attack on the physical system.
  • 3. The method of claim 2, further comprising outputting an alarm signal in response to detecting a replay attack.
  • 4. The method of claim 1, wherein generating the feedback control signal comprises applying a linear-quadratic-Gaussian (LQG) control scheme.
  • 5. The method of claim 1, wherein generating the watermarking signal comprises: generating a random delay within a predetermined range based on a predetermined probability mass function;obtaining the stored estimated state based on the random delay such that a difference between the previous time instant and a current time instant equals the random delay; andmultiplying the stored estimated state by a predetermined scale factor.
  • 6. The method of claim 5, wherein generating the random delay comprises: generating the random delay for each time instant; orgenerating the random delay for multiple consecutive time instants.
  • 7. The method of claim 5, further comprising tuning the predetermined range and/or the predetermined probability mass function to ensure that the watermarking signal does not cause instability in the physical system.
  • 8. The method of claim 5, further comprising tuning the predetermined scale factor to ensure that the watermarking signal is within an admissible input range of the physical system.
  • 9. The method of claim 5, wherein the predetermined probability mass function comprises a Gaussian distribution function or a uniform distribution function.
  • 10. A computer system for secure control of a physical system, the computer system comprising: a processor; anda storage device coupled to the processor and storing instructions, which when executed by the processor cause the processor to perform a method, the method comprising: obtaining measurement of one or more sensors associated with the physical system;estimating a state of the physical system based on the measurement of the sensors;generating a feedback control signal based on the estimated state;generating a watermarking signal based on a stored estimated state of the physical system at a previous time instant;generating a watermarked control signal by combining the feedback control signal and the watermarking signal; andapplying the watermarked control signal to the physical system to regulate the state of the physical system, thereby facilitating secure control of the physical system.
  • 11. The computer system of claim 10, wherein the method comprises performing a chi-square detection to detect a replay attack on the physical system.
  • 12. The computer system of claim 11, wherein the method further comprises outputting an alarm signal in response to detecting a replay attack.
  • 13. The computer system of claim 10, wherein generating the feedback control signal comprises applying a linear-quadratic-Gaussian (LQG) control scheme.
  • 14. The computer system of claim 10, wherein generating the watermarking signal comprises: generating a random delay within a predetermined range based on a predetermined probability mass function;obtaining the stored estimated state based on the random delay such that a difference between the previous time instant and a current time instant equals the random delay; andmultiplying the stored estimated state by a predetermined scale factor.
  • 15. The computer system of claim 14, wherein generating the random delay comprises: generating the random delay for each time instant; orgenerating the random delay for multiple consecutive time instants.
  • 16. The computer system of claim 14, wherein the method further comprises tuning the predetermined range and/or the predetermined probability mass function to ensure that the watermarking signal does not cause instability in the physical system.
  • 17. The computer system of claim 14, wherein the method further comprises tuning the predetermined scale factor to ensure that the watermarking signal is within an admissible input range of the physical system.
  • 18. The computer system of claim 14, wherein the predetermined probability mass function comprises a Gaussian distribution function or a uniform distribution function.
  • 19. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for secure control of a physical system, the method comprising: obtaining measurement of one or more sensors associated with the physical system;estimating a state of the physical system based on the measurement of the sensors;generating a feedback control signal based on the estimated state;generating a watermarking signal based on a stored estimated state of the physical system at a previous time instant;generating a watermarked control signal by combining the feedback control signal and the watermarking signal; andapplying the watermarked control signal to the physical system to regulate the state of the physical system, thereby facilitating secure control of the physical system.
  • 20. The non-transitory computer-readable storage medium of claim 19, wherein generating the watermarking signal comprises: generating a random delay within a predetermined range based on a predetermined probability mass function;obtaining the stored estimated state based on the random delay such that a difference between the previous time instant and a current time instant equals the random delay; andmultiplying the stored estimated state by a predetermined scale factor.
RELATED APPLICATION

This application is related to co-pending U.S. application Ser. No. 17/939,577, Attorney Docket Number PARC-20210826US01, titled “METHOD AND ARCHITECTURE FOR PROVIDING INTEGRATED DESIGN OF CYBER-PHYSICAL SYSTEM WITH WATERMARKING,” by inventors Raman Goyal, Christoforos Somarakis, Erfaun Noorani, Aleksandar B. Feldman, and Shantanu Rane, filed on 7 Sep. 2022, the disclosure of which is incorporated herein by reference in its entirety.