Skip to main content

Showing 1–28 of 28 results for author: Sandberg, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.12684  [pdf, other

    math.OC cs.CR eess.SY

    Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: This note addresses the problem of evaluating the impact of an attack on discrete-time nonlinear stochastic control systems. The problem is formulated as an optimal control problem with a joint chance constraint that forces the adversary to avoid detection throughout a given time period. Due to the joint constraint, the optimal control policy depends not only on the current state, but also on the… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:2203.16803

  2. arXiv:2210.05560  [pdf, other

    cs.CR eess.SY

    Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption

    Authors: Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl H. Johansson

    Abstract: Encrypted control has been introduced to protect controller data by encryption at the stage of computation and communication, by performing the computation directly on encrypted data. In this article, we first review and categorize recent relevant studies on encrypted control. Approaches based on homomorphic encryption, multi-party computation, and secret sharing are introduced, compared, and then… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: 33 pages, 12 figures, submitted to Annual Reviews in Control

  3. arXiv:2206.06863  [pdf, other

    math.OC cs.LG

    How are policy gradient methods affected by the limits of control?

    Authors: Ingvar Ziemann, Anastasios Tsiamis, Henrik Sandberg, Nikolai Matni

    Abstract: We study stochastic policy gradient methods from the perspective of control-theoretic limitations. Our main result is that ill-conditioned linear systems in the sense of Doyle inevitably lead to noisy gradient estimates. We also give an example of a class of stable systems in which policy gradient methods suffer from the curse of dimensionality. Our results apply to both state feedback and partial… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

  4. arXiv:2204.00209  [pdf, other

    eess.SY cs.GT

    Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs

    Authors: Hampei Sasahara, György Dán, Saurabh Amin, Henrik Sandberg

    Abstract: This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages

  5. arXiv:2203.16803  [pdf, other

    eess.SY cs.CR

    Attack Impact Evaluation by Exact Convexification through State Space Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: We address the attack impact evaluation problem for control system security. We formulate the problem as a Markov decision process with a temporally joint chance constraint that forces the adversary to avoid being detected throughout the considered time period. Owing to the joint constraint, the optimal control policy depends not only on the current state but also on the entire history, which lead… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: 8 pages

  6. arXiv:2202.08311  [pdf, other

    cs.LG math.OC stat.ML

    Single Trajectory Nonparametric Learning of Nonlinear Dynamics

    Authors: Ingvar Ziemann, Henrik Sandberg, Nikolai Matni

    Abstract: Given a single trajectory of a dynamical system, we analyze the performance of the nonparametric least squares estimator (LSE). More precisely, we give nonasymptotic expected $l^2$-distance bounds between the LSE and the true regression function, where expectation is evaluated on a fresh, counterfactual, trajectory. We leverage recently developed information-theoretic methods to establish the opti… ▽ More

    Submitted 19 February, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

  7. arXiv:2201.02351  [pdf, other

    cs.CR cs.GT eess.SY

    Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be… ▽ More

    Submitted 6 December, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 16 pages, accepted at IEEE Transactions on Automatic Control

  8. arXiv:2201.01680  [pdf, other

    cs.LG math.OC stat.ML

    Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems

    Authors: Ingvar Ziemann, Henrik Sandberg

    Abstract: TWe establish regret lower bounds for adaptively controlling an unknown linear Gaussian system with quadratic costs. We combine ideas from experiment design, estimation theory and a perturbation bound of certain information matrices to derive regret lower bounds exhibiting scaling on the order of magnitude $\sqrt{T}$ in the time horizon $T$. Our bounds accurately capture the role of control-theore… ▽ More

    Submitted 12 June, 2024; v1 submitted 5 January, 2022; originally announced January 2022.

  9. arXiv:2111.04818  [pdf, other

    cs.CR eess.SY

    Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption

    Authors: Sawsan Emad, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, Henrik Sandberg, Karl H. Johansson

    Abstract: The privacy aspect of state estimation algorithms has been drawing high research attention due to the necessity for a trustworthy private environment in cyber-physical systems. These systems usually engage cloud-computing platforms to aggregate essential information from spatially distributed nodes and produce desired estimates. The exchange of sensitive data among semi-honest parties raises priva… ▽ More

    Submitted 4 April, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted at the 20th European Control Conference (ECC 2022)

  10. arXiv:2103.13121  [pdf, other

    eess.SY cs.CR cs.GT

    Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study investigates general model-based incident handler's asymptotic behaviors in time against cyber attacks to control systems. The attacker's and the defender's dynamic decision making is modeled as an equilibrium of a dynamic signaling game. It is shown that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynami… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: 8 pages

  11. arXiv:2103.03287  [pdf, other

    cs.CR cs.GT eess.SY

    Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study provides a model of cyber deception with asymmetric recognition represented by private beliefs. Signaling games, which are often used in existing works, are built on the implicit premise that the receiver's belief is public information. However, this assumption, which leads to symmetric recognition, is unrealistic in adversarial decision making. For a precise evaluation of risks arising… ▽ More

    Submitted 11 May, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

  12. arXiv:2011.09288  [pdf, ps, other

    math.OC cs.LG stat.ML

    On Uninformative Optimal Policies in Adaptive LQR with Unknown B-Matrix

    Authors: Ingvar Ziemann, Henrik Sandberg

    Abstract: This paper presents local asymptotic minimax regret lower bounds for adaptive Linear Quadratic Regulators (LQR). We consider affinely parametrized $B$-matrices and known $A$-matrices and aim to understand when logarithmic regret is impossible even in the presence of structural side information. After defining the intrinsic notion of an uninformative optimal policy in terms of a singularity conditi… ▽ More

    Submitted 30 April, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

  13. Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption

    Authors: Amr Alanwar, Victor Gassmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl Henrik Johansson, Matthias Althoff

    Abstract: The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires outsourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encrypti… ▽ More

    Submitted 25 February, 2023; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: This paper is accepted at the European Journal of Control

  14. arXiv:1909.01999  [pdf, other

    eess.SY cs.IT cs.RO math.OC

    Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.05420

  15. arXiv:1903.07261  [pdf, other

    cs.GT

    A Network Monitoring Game with Heterogeneous Component Criticality Levels

    Authors: Jezdimir Milosevic, Mathieu Dahan, Saurabh Amin, Henrik Sandberg

    Abstract: We consider an attacker-operator game for monitoring a large-scale network that is comprised on components that differ in their criticality levels. In this zero-sum game, the operator seeks to position a limited number of sensors to monitor the network against an attacker who strategically targets a network component. The operator (resp. attacker) seeks to minimize (resp. maximize) the network los… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  16. arXiv:1808.09565  [pdf, other

    math.OC cs.IT eess.SY

    Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information

    Authors: Farhad Farokhi, Henrik Sandberg

    Abstract: The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered. For privacy protection, the response to the query is systematically corrupted with an additive random noise whose support is a subset or equal to a pre-defined constraint set. A measure of privacy using the inverse of the trace of t… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  17. arXiv:1708.09096  [pdf, other

    math.OC cs.IT

    Transfer-Entropy-Regularized Markov Decision Processes

    Authors: Takashi Tanaka, Henrik Sandberg, Mikael Skoglund

    Abstract: We consider the framework of transfer-entropy-regularized Markov Decision Process (TERMDP) in which the weighted sum of the classical state-dependent cost and the transfer entropy from the state random process to the control random process is minimized. Although TERMDPs are generally formulated as nonconvex optimization problems, we derive an analytical necessary optimality condition expressed as… ▽ More

    Submitted 27 May, 2020; v1 submitted 29 August, 2017; originally announced August 2017.

  18. arXiv:1705.02802  [pdf, other

    math.OC cs.IT

    Directed Information as Privacy Measure in Cloud-based Control

    Authors: Takashi Tanaka, Mikael Skoglund, Henrik Sandberg, Karl Henrik Johansson

    Abstract: We consider cloud-based control scenarios in which clients with local control tasks outsource their computational or physical duties to a cloud service provider. In order to address privacy concerns in such a control architecture, we first investigate the issue of finding an appropriate privacy measure for clients who desire to keep local state information as private as possible during the control… ▽ More

    Submitted 8 May, 2017; originally announced May 2017.

  19. arXiv:1612.05552  [pdf, other

    eess.SY cs.IT

    Secure Estimation and Zero-Error Secrecy Capacity

    Authors: Moritz Wiese, Tobias J. Oechtering, Karl Henrik Johansson, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain channel. An encoder observes and block-encodes the… ▽ More

    Submitted 14 July, 2017; v1 submitted 16 December, 2016; originally announced December 2016.

    Comments: Submitted to IEEE Transactions on Automatic Control

  20. arXiv:1605.00274  [pdf, ps, other

    eess.SY cs.IT

    Uncertain Wiretap Channels and Secure Estimation

    Authors: Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: Uncertain wiretap channels are introduced. Their zero-error secrecy capacity is defined. If the sensor-estimator channel is perfect, it is also calculated. Further properties are discussed. The problem of estimating a dynamical system with nonstochastic disturbances is studied where the sensor is connected to the estimator and an eavesdropper via an uncertain wiretap channel. The estimator should… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: Long version of a paper to be presented at ISIT 2016

  21. Rate of Prefix-free Codes in LQG Control Systems

    Authors: Takashi Tanaka, Karl Henrik Johansson, Tobias Oechtering, Henrik Sandberg, Mikael Skoglund

    Abstract: In this paper, we consider a discrete time linear quadratic Gaussian (LQG) control problem in which state information of the plant is encoded in a variable-length binary codeword at every time step, and a control input is determined based on the codewords generated in the past. We derive a lower bound of the rate achievable by the class of prefix-free codes attaining the required LQG control perfo… ▽ More

    Submitted 5 April, 2016; originally announced April 2016.

    Comments: The 2016 IEEE International Symposium on Information Theory

  22. Quadratic Gaussian Privacy Games

    Authors: Farhad Farokhi, Henrik Sandberg, Iman Shames, Michael Cantoni

    Abstract: A game-theoretic model for analysing the effects of privacy on strategic communication between agents is devised. In the model, a sender wishes to provide an accurate measurement of the state to a receiver while also protecting its private information (which is correlated with the state) private from a malicious agent that may eavesdrop on its communications with the receiver. A family of nontrivi… ▽ More

    Submitted 17 September, 2015; originally announced September 2015.

    Comments: Accepted for Presentation at the 54th IEEE Conference on Decision and Control (CDC 2015)

  23. arXiv:1401.4935  [pdf, ps, other

    eess.SY cs.NI

    Performance Analysis of a Network of Event-based Systems

    Authors: Chithrupa Ramesh, Henrik Sandberg, Karl H. Johansson

    Abstract: We consider a scenario where multiple event-based systems use a wireless network to communicate with their respective controllers. These systems use a contention resolution mechanism (CRM) to arbitrate access to the network. We present a Markov model for the network interactions between the event-based systems. Using this model, we obtain an analytical expression for the reliability, or the probab… ▽ More

    Submitted 20 January, 2014; originally announced January 2014.

  24. arXiv:1303.3796  [pdf, ps, other

    cs.NI eess.SY math.CA math.OC physics.flu-dyn

    The conservation of information, towards an axiomatized modular modeling approach to congestion control

    Authors: C. Briat, E. A. Yavuz, H. Hjalmarsson, K. H. Johansson, U. T. Jönsson, G. Karlsson, H. Sandberg

    Abstract: We derive a modular fluid-flow network congestion control model based on a law of fundamental nature in networks: the conservation of information. Network elements such as queues, users, and transmission channels and network performance indicators like sending/acknowledgement rates and delays are mathematically modelled by applying this law locally. Our contributions are twofold. First, we introdu… ▽ More

    Submitted 15 March, 2013; originally announced March 2013.

    Comments: Submitted to IEEE Transactions on Networking. arXiv admin note: text overlap with arXiv:1208.1230

  25. arXiv:1201.5019  [pdf, ps, other

    math.OC cs.CE eess.SY

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    Authors: Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an $l_1$ relaxation technique provides an exact optimal solution to this cardinality minimization problem. The proposed result is based on a polyhedral c… ▽ More

    Submitted 17 September, 2012; v1 submitted 22 December, 2011; originally announced January 2012.

  26. arXiv:1201.0469  [pdf, ps, other

    cs.CE

    Computing Critical $k$-tuples in Power Networks

    Authors: Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In this paper the problem of finding the sparsest (i.e., minimum cardinality) critical $k$-tuple including one arbitrarily specified measurement is considered. The solution to this problem can be used to identify weak points in the measurement set, or aid the placement of new meters. The critical $k$-tuple problem is a combinatorial generalization of the critical measurement calculation problem. U… ▽ More

    Submitted 2 January, 2012; originally announced January 2012.

  27. arXiv:1108.2755  [pdf, other

    eess.SY cs.SI math.DS math.OC physics.soc-ph

    The Meaning of Structure in Interconnected Dynamic Systems

    Authors: E. Yeung, J. Goncalves, H. Sandberg, S. Warnick

    Abstract: Interconnected dynamic systems are a pervasive component of our modern infrastructures. The complexity of such systems can be staggering, which motivates simplified representations for their manipulation and analysis. This work introduces the complete computational structure of a system as a common baseline for comparing different simplified representations. Linear systems are then used as a vehic… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 21 pages, to appear in IEEE Control Systems Magazine 2012 Special Invited Issue: Designing Controls for Modern Infrastructure Networks

  28. arXiv:1011.1828  [pdf, other

    math.OC cs.NI physics.soc-ph

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    Authors: André Teixeira, György Dán, Henrik Sandberg, Karl H. Johansson

    Abstract: The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication chan… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: Modified version submitted to the 18th IFAC World Congress, 2011. The paper has 11 pages and 4 figures