Skip to main content

Showing 1–50 of 65 results for author: Sandberg, H

Searching in archive eess. Search in all archives.
.
  1. arXiv:2403.10396  [pdf, ps, other

    eess.SY

    On well-posedness of the leak localization problem in parallel pipe networks

    Authors: Victor Molnö, Henrik Sandberg

    Abstract: With the advent of integrated sensor technology (smart flow meters and pressure sensors), various new numerical algorithms for leak localization (a core element of water distribution system operation) have been developed. However, there is a lack of theory regarding the limitations of leak localization. In this work, we contribute to the development of such a theory by introducing an example water… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: Submitted to Automatica

  2. arXiv:2310.13359  [pdf, other

    eess.SY eess.SP

    Electrical Fault Localisation Over a Distributed Parameter Transmission Line

    Authors: Daniel Selvaratnam, Amritam Das, Henrik Sandberg

    Abstract: Motivated by the need to localise faults along electrical power lines, this paper adopts a frequency-domain approach to parameter estimation for an infinite-dimensional linear dynamical system with one spatial variable. Since the time of the fault is unknown, and voltages and currents are measured at only one end of the line, distance information must be extracted from the post-fault transients. T… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: To be presented at CDC 2023

  3. arXiv:2307.12277  [pdf, other

    eess.SY math.OC

    Resilient Scheduling of Control Software Updates in Radial Power Distribution Systems

    Authors: Kin Cheong Sou, Henrik Sandberg

    Abstract: In response to newly found security vulnerabilities, or as part of a moving target defense, a fast and safe control software update scheme for networked control systems is highly desirable. We here develop such a scheme for intelligent electronic devices (IEDs) in power distribution systems, which is a solution to the so-called software update rollout problem. This problem seeks to minimize the ma… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

  4. arXiv:2304.08983  [pdf, other

    eess.SY

    Complexity reduction for resilient state estimation of uniformly observable nonlinear systems

    Authors: Junsoo Kim, ** Gyu Lee, Henrik Sandberg, Karl H. Johansson

    Abstract: A resilient state estimation scheme for uniformly observable nonlinear systems, based on a method for local identification of sensor attacks, is presented. The estimation problem is combinatorial in nature, and so many methods require substantial computational and storage resources as the number of sensors increases. To reduce the complexity, the proposed method performs the attack identification… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: 12 pages, 4 figures, submitted to IEEE Transactions on Automatic Control

  5. arXiv:2303.15637  [pdf, other

    eess.SY

    The Fundamental Limitations of Learning Linear-Quadratic Regulators

    Authors: Bruce D. Lee, Ingvar Ziemann, Anastasios Tsiamis, Henrik Sandberg, Nikolai Matni

    Abstract: We present a local minimax lower bound on the excess cost of designing a linear-quadratic controller from offline data. The bound is valid for any offline exploration policy that consists of a stabilizing controller and an energy bounded exploratory input. The derivation leverages a relaxation of the minimax estimation problem to Bayesian estimation, and an application of Van Trees' inequality. We… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  6. arXiv:2301.12684  [pdf, other

    math.OC cs.CR eess.SY

    Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: This note addresses the problem of evaluating the impact of an attack on discrete-time nonlinear stochastic control systems. The problem is formulated as an optimal control problem with a joint chance constraint that forces the adversary to avoid detection throughout a given time period. Due to the joint constraint, the optimal control policy depends not only on the current state, but also on the… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: 8 pages. arXiv admin note: substantial text overlap with arXiv:2203.16803

  7. arXiv:2210.05560  [pdf, other

    cs.CR eess.SY

    Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption

    Authors: Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl H. Johansson

    Abstract: Encrypted control has been introduced to protect controller data by encryption at the stage of computation and communication, by performing the computation directly on encrypted data. In this article, we first review and categorize recent relevant studies on encrypted control. Approaches based on homomorphic encryption, multi-party computation, and secret sharing are introduced, compared, and then… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: 33 pages, 12 figures, submitted to Annual Reviews in Control

  8. arXiv:2207.11414  [pdf, other

    q-bio.PE eess.SY

    Modeling and Analysis of a Coupled SIS Bi-Virus Model

    Authors: Sebin Gracy, Philip E. Paré, Ji Liu, Henrik Sandberg, Carolyn L. Beck, Karl Henrik Johansson, Tamer Başar

    Abstract: The paper deals with the setting where two viruses (say virus 1 and virus 2) coexist in a population, and they are not necessarily mutually exclusive, in the sense that infection due to one virus does not preclude the possibility of simultaneous infection due to the other. We develop a coupled bi-virus susceptible-infected-susceptible (SIS) model from a 4n-state Markov chain model, where n is the… ▽ More

    Submitted 29 June, 2024; v1 submitted 23 July, 2022; originally announced July 2022.

  9. arXiv:2204.00209  [pdf, other

    eess.SY cs.GT

    Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs

    Authors: Hampei Sasahara, György Dán, Saurabh Amin, Henrik Sandberg

    Abstract: This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages

  10. arXiv:2204.00050  [pdf, other

    eess.SY

    Leakage Localization in Water Distribution Networks: A Model-Based Approach

    Authors: Ludvig Lindstrom, Sebin Gracy, Sindri Magnusson, Henrik Sandberg

    Abstract: The paper studies the problem of leakage localization in water distribution networks. For the case of a single pipe that suffers from a single leak, by taking recourse to pressure and flow measurements, and assuming those are noiseless, we provide a closed-form expression for leak localization, leak exponent and leak constant. For the aforementioned setting, but with noisy pressure and flow measur… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

  11. arXiv:2203.16803  [pdf, other

    eess.SY cs.CR

    Attack Impact Evaluation by Exact Convexification through State Space Augmentation

    Authors: Hampei Sasahara, Takashi Tanaka, Henrik Sandberg

    Abstract: We address the attack impact evaluation problem for control system security. We formulate the problem as a Markov decision process with a temporally joint chance constraint that forces the adversary to avoid being detected throughout the considered time period. Owing to the joint constraint, the optimal control policy depends not only on the current state but also on the entire history, which lead… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: 8 pages

  12. arXiv:2203.11708  [pdf, other

    math.OC eess.SY

    Scale Fragilities in Localized Consensus Dynamics

    Authors: Emma Tegling, Bassam Bamieh, Henrik Sandberg

    Abstract: We consider distributed consensus in networks where the agents have integrator dynamics of order two or higher ($n\ge 2$). We assume all feedback to be localized in the sense that each agent has a bounded number of neighbors and consider a scaling of the network through the addition of agents in a modular manner, i.e., without re-tuning controller gains upon addition. We show that standard consens… ▽ More

    Submitted 26 January, 2023; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: arXiv admin note: text overlap with arXiv:1907.02465

  13. arXiv:2201.02351  [pdf, other

    cs.CR cs.GT eess.SY

    Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This paper addresses the question whether model knowledge can guide a defender to appropriate decisions, or not, when an attacker intrudes into control systems. The model-based defense scheme considered in this study, namely Bayesian defense mechanism, chooses reasonable reactions through observation of the system's behavior using models of the system's stochastic dynamics, the vulnerability to be… ▽ More

    Submitted 6 December, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

    Comments: 16 pages, accepted at IEEE Transactions on Automatic Control

  14. arXiv:2111.06682  [pdf, ps, other

    eess.SY math.OC

    A Bayesian Nash equilibrium-based moving target defense against stealthy sensor attacks

    Authors: David Umsonst, Serkan Sarıtaş, György Dán, Henrik Sandberg

    Abstract: We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedback systems. The defender periodically and randomly switches between thresholds from a discrete set to increase the uncertainty for the attacker and make stealthy attacks detectable. However, the defender does not know the exact goal of the attacker but only the prior of the possible attacker goals.… ▽ More

    Submitted 31 May, 2022; v1 submitted 12 November, 2021; originally announced November 2021.

    Comments: 16 pages, 4 figures, 4 tables

  15. arXiv:2111.04818  [pdf, other

    cs.CR eess.SY

    Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption

    Authors: Sawsan Emad, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, Henrik Sandberg, Karl H. Johansson

    Abstract: The privacy aspect of state estimation algorithms has been drawing high research attention due to the necessity for a trustworthy private environment in cyber-physical systems. These systems usually engage cloud-computing platforms to aggregate essential information from spatially distributed nodes and produce desired estimates. The exchange of sensitive data among semi-honest parties raises priva… ▽ More

    Submitted 4 April, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted at the 20th European Control Conference (ECC 2022)

  16. Experimental evaluation of sensor attacks and defense mechanisms in feedback systems

    Authors: David Umsonst, Henrik Sandberg

    Abstract: In this work, we evaluate theoretical results on the feasibility of, the worst-case impact of, and defense mechanisms against a stealthy sensor attack in an experimental setup. We demonstrate that for a controller with stable dynamics the stealthy sensor attack is possible to conduct and the theoretical worst-case impact is close to the achieved practical one. However, although the attack should t… ▽ More

    Submitted 28 April, 2022; v1 submitted 5 November, 2021; originally announced November 2021.

    Comments: Accepted in Control Engineering Practice. The paper is published as OpenAccess, so please find the latest version in Volume 124 of Control Engineering Practice

    Journal ref: Control Engineering Practice, 124, July 2022, 105178

  17. arXiv:2109.09493  [pdf, other

    eess.SY

    Multi-Layer SIS Model with an Infrastructure Network

    Authors: Philip E. Pare, Axel Janson, Sebin Gracy, Ji Liu, Henrik Sandberg, Karl H. Johansson

    Abstract: This paper deals with the spread of diseases over both a population network and an infrastructure network. We develop a layered networked spread model for a susceptible-infected-susceptible (SIS) pathogen-borne disease spreading over a human contact network and an infrastructure network, and refer to it as a layered networked susceptible-infected-water-susceptible (SIWS) model. The SIWS network is… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  18. arXiv:2105.12239  [pdf, ps, other

    eess.SY

    Finite sample guarantees for quantile estimation: An application to detector threshold tuning

    Authors: David Umsonst, Justin Ruths, Henrik Sandberg

    Abstract: In threshold-based anomaly detection, we want to tune the threshold of a detector to achieve an acceptable false alarm rate. However, tuning the threshold is often a non-trivial task due to unknown detector output distributions. A detector threshold that provides an acceptable false alarm rate is equivalent to a specific quantile of the detector output distribution. Therefore, we use quantile esti… ▽ More

    Submitted 28 April, 2022; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: 8 pages, 5 figures

  19. arXiv:2105.10664  [pdf, other

    eess.SY

    A Model Randomization Approach to Statistical Parameter Privacy

    Authors: Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl H. Johansson

    Abstract: In this paper, we study a privacy filter design problem for a sequence of sensor measurements whose joint probability density function (p.d.f.) depends on a private parameter. To ensure parameter privacy, we propose a filter design framework which consists of two components: a randomizer and a nonlinear transformation. The randomizer takes the private parameter as input and randomly generates a ps… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

  20. arXiv:2105.04335  [pdf, other

    eess.SY

    Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks

    Authors: Jianqi Chen, Jieqiang Wei, Wei Chen, Henrik Sandberg, Karl H. Johansson, Jie Chen

    Abstract: Undetectable attacks are an important class of malicious attacks threatening the security of cyber-physical systems, which can modify a system's state but leave the system output measurements unaffected, and hence cannot be detected from the output. This paper studies undetectable attacks on cone-invariant systems and multi-agent systems. We first provide a general characterization of zero-dynamic… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: 8 figures

  21. arXiv:2103.13121  [pdf, other

    eess.SY cs.CR cs.GT

    Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study investigates general model-based incident handler's asymptotic behaviors in time against cyber attacks to control systems. The attacker's and the defender's dynamic decision making is modeled as an equilibrium of a dynamic signaling game. It is shown that the defender's belief on existence of an attacker converges over time for any attacker's strategy provided that the stochastic dynami… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

    Comments: 8 pages

  22. arXiv:2103.03287  [pdf, other

    cs.CR cs.GT eess.SY

    Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition

    Authors: Hampei Sasahara, Henrik Sandberg

    Abstract: This study provides a model of cyber deception with asymmetric recognition represented by private beliefs. Signaling games, which are often used in existing works, are built on the implicit premise that the receiver's belief is public information. However, this assumption, which leads to symmetric recognition, is unrealistic in adversarial decision making. For a precise evaluation of risks arising… ▽ More

    Submitted 11 May, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

  23. arXiv:2101.10784  [pdf, other

    eess.SY

    Data-Driven Set-Based Estimation using Matrix Zonotopes with Set Containment Guarantees

    Authors: Amr Alanwar, Alexander Berndt, Karl Henrik Johansson, Henrik Sandberg

    Abstract: We propose a method to perform set-based state estimation of an unknown dynamical linear system using a data-driven set propagation function. Our method comes with set-containment guarantees, making it applicable to safety-critical systems. The method consists of two phases: (1) an offline learning phase where we collect noisy input-output data to determine a function to propagate the state-set ah… ▽ More

    Submitted 27 March, 2022; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: Accepted at the 20th European Control Conference (ECC 2022)

  24. arXiv:2011.07569  [pdf, other

    eess.SY

    Networked Multi-Virus Spread with a Shared Resource: Analysis and Mitigation Strategies

    Authors: Axel Janson, Sebin Gracy, Philip E. Paré, Henrik Sandberg, Karl H. Johansson

    Abstract: The paper studies multi-competitive continuous-time epidemic processes in the presence of a shared resource. We consider the setting where multiple viruses are simultaneously prevalent in the population, and the spread occurs due to not only individual-to-individual interaction but also due to individual-to-resource interaction. In such a setting, an individual is either not affected by any of the… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

  25. arXiv:2011.05829  [pdf, other

    eess.SY

    Power Injection Attacks in Smart Distribution Grids with Photovoltaics

    Authors: Martin Lindström, Hampei Sasahara, Xingkang He, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In order to protect smart distribution grids from intrusions, it is important to understand possible risks and impacts of attacks. We study the worst-case attack strategy of a power injection attack against the physical layer of a smart distribution grid with a high penetration of photovoltaic resources. We derive both the worst attack signal and worst attack location: The worst attack signal is a… ▽ More

    Submitted 6 April, 2021; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: 7 pages

  26. arXiv:2011.04576  [pdf, other

    eess.SY

    Distributed Design of Glocal Controllers via Hierarchical Model Decomposition

    Authors: Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper proposes a distributed design method of controllers having a glocal (global/local) information structure for large-scale network systems. Distributed design, independent design of all subcontrollers that constitute a structured controller, facilitates scalable controller synthesis. While existing distributed design methods confine attention to the decentralized or distributed informatio… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: 16 pages

  27. arXiv:2009.11205  [pdf, other

    eess.SY

    Disconnection-aware Attack Detection and Isolation with Separation-based Detector Reconfiguration

    Authors: Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg

    Abstract: This study addresses incident handling during an adverse event for dynamical networked control systems. Incident handling can be divided into five steps: detection, analysis, containment, eradication, and recovery. For networked control systems, the containment step can be conducted through physical disconnection of an attacked subsystem. In accordance with the disconnection, the equipped attack d… ▽ More

    Submitted 4 October, 2021; v1 submitted 23 September, 2020; originally announced September 2020.

    Comments: accepted at IEEE Transactions on Control Systems Technology

  28. arXiv:2009.03850  [pdf, other

    eess.SY

    Maximizing Privacy in MIMO Cyber-Physical Systems Using the Chapman-Robbins Bound

    Authors: Rijad Alisic, Marco Molinari, Philip E. Paré, Henrik Sandberg

    Abstract: Privacy breaches of cyber-physical systems could expose vulnerabilities to an adversary. Here, privacy leaks of step inputs to linear-time-invariant systems are mitigated through additive Gaussian noise. Fundamental lower bounds on the privacy are derived, which are based on the variance of any estimator that seeks to recreate the input. Fully private inputs are investigated and related to transmi… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

  29. arXiv:2008.07317  [pdf, ps, other

    eess.SY

    Data-Driven Distributed Mitigation Strategies and Analysis of Mutating Epidemic Processes

    Authors: Philip E Pare, Sebin Gracy, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In this paper we study a discrete-time SIS (susceptible-infected-susceptible) model, where the infection and healing parameters and the underlying network may change over time. We provide conditions for the model to be well-defined and study its stability. For systems with homogeneous infection rates over symmetric graphs,we provide a sufficient condition for global exponential stability (GES) of… ▽ More

    Submitted 22 October, 2020; v1 submitted 17 August, 2020; originally announced August 2020.

  30. arXiv:2004.05409  [pdf, ps, other

    eess.SY

    How to Secure Distributed Filters Under Sensor Attacks

    Authors: Xingkang He, Xiaoqiang Ren, Henrik Sandberg, Karl H. Johansson

    Abstract: We study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily manipulate the observations for a time-varying and unknown subset of the sensors. We first propose a recursive distributed filter consisting of two steps at each update. The first step employs a saturation-like scheme, which… ▽ More

    Submitted 22 June, 2021; v1 submitted 11 April, 2020; originally announced April 2020.

  31. arXiv:2003.13187  [pdf, other

    eess.SY

    Bounding Privacy Leakage in Smart Buildings

    Authors: Rijad Alisic, Marco Molinari, Philip E. Paré, Henrik Sandberg

    Abstract: Smart building management systems rely on sensors to optimize the operation of buildings. If an unauthorized user gains access to these sensors, a privacy leak may occur. This paper considers such a potential leak of privacy in a smart residential building, and how it may be mitigated through corrupting the measurements with additive Gaussian noise. This corruption is done in order to hide the occ… ▽ More

    Submitted 29 March, 2020; originally announced March 2020.

  32. arXiv:2003.11576  [pdf, other

    eess.SY

    Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief

    Authors: Hampei Sasahara, Serkan Saritas, Henrik Sandberg

    Abstract: This study investigates the relationship between resilience of control systems to attacks and the information available to malicious attackers. Specifically, it is shown that control systems are guaranteed to be secure in an asymptotic manner by rendering reactions against potentially harmful actions covert. The behaviors of the attacker and the defender are analyzed through a repeated signaling g… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

    Comments: 8 pages

  33. arXiv:2003.05752  [pdf, other

    eess.SY

    Actuator Security Index for Structured Systems

    Authors: Sebin Gracy, Jezdimir Milosevic, Henrik Sandberg

    Abstract: Given a network with the set of vulnerable actuators (and sensors), the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised so as to conduct a perfectly undetectable attack using the said actuator. This paper deals with the problem of computing actuator security indices for discrete-time LTI network systems. Firstly, we show that, under a s… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

  34. arXiv:2001.10532  [pdf, other

    eess.SY math.OC

    Analysis, Online Estimation, and Validation of a Competing Virus Model

    Authors: Philip E. Pare, Damir Vrabac, Henrik Sandberg, Karl H. Johansson

    Abstract: In this paper we introduce a discrete time competing virus model and the assumptions necessary for the model to be well posed. We analyze the system exploring its different equilibria. We provide necessary and sufficient conditions for the estimation of the model parameters from time series data and introduce an online estimation algorithm. We employ a dataset of two competing subsidy programs fro… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: arXiv admin note: text overlap with arXiv:1710.11149

  35. On the confidentiality of controller states under sensor attacks

    Authors: David Umsonst, Henrik Sandberg

    Abstract: With the emergence of cyber-attacks on control systems it has become clear that improving the security of control systems is an important task in today's society. We investigate how an attacker that has access to the measurements transmitted from the plant to the controller can perfectly estimate the internal state of the controller. This attack on sensitive information of the control loop is, on… ▽ More

    Submitted 5 November, 2021; v1 submitted 8 January, 2020; originally announced January 2020.

    Journal ref: Automatica, Volume 123,2021

  36. arXiv:1911.09175  [pdf, ps, other

    eess.SY

    Analysis and distributed control of periodic epidemic processes

    Authors: Sebin Gracy, Philip. E. Pare, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper studies epidemic processes over discrete-time periodic time-varying networks. We focus on the susceptible-infected-susceptible (SIS) model that accounts for a (possibly) mutating virus. We say that an agent is in the disease-free state if it is not infected by the virus. Our objective is to devise a control strategy which ensures that all agents in a network exponentially (resp. asympto… ▽ More

    Submitted 17 November, 2020; v1 submitted 20 November, 2019; originally announced November 2019.

  37. arXiv:1911.05084  [pdf, other

    eess.SY

    Disconnection-aware Attack Detection in Networked Control Systems

    Authors: Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg

    Abstract: This study deals with security issues in dynamical networked control systems. The goal is to establish a unified framework of the attack detection stage, which includes the four processes of monitoring the system state, making a decision based on the monitored signal, disconnecting the corrupted subsystem, and operating the remaining system during restoration. This paper, in particular, considers… ▽ More

    Submitted 27 February, 2020; v1 submitted 12 November, 2019; originally announced November 2019.

    Comments: 8 pages

  38. arXiv:1909.01999  [pdf, other

    eess.SY cs.IT cs.RO math.OC

    Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.05420

  39. arXiv:1903.07345  [pdf, other

    eess.SY

    Secure distributed filtering for unstable dynamics under compromised observations

    Authors: Xingkang He, Xiaoqiang Ren, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In this paper, we consider a secure distributed filtering problem for linear time-invariant systems with bounded noises and unstable dynamics under compromised observations. A malicious attacker is able to compromise a subset of the agents and manipulate the observations arbitrarily. We first propose a recursive distributed filter consisting of two parts at each time. The first part employs a satu… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  40. arXiv:1901.05420  [pdf, other

    eess.SY eess.SP math.OC

    Two-Way Coding in Control Systems Under Injection Attacks: From Attack Detection to Attack Correction

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as… ▽ More

    Submitted 17 January, 2019; v1 submitted 16 January, 2019; originally announced January 2019.

  41. Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems

    Authors: Jezdimir Milosevic, Henrik Sandberg, Karl Henrik Johansson

    Abstract: Risk assessment is an inevitable step in implementation of a cyber-defense strategy. An important part of this assessment is to reason about the impact of possible attacks. In this paper, we propose a framework for estimating the impact of cyber-attacks in stochastic linear control systems. The framework can be used to estimate the impact of denial of service, rerouting, sign alternation, replay,… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

  42. arXiv:1809.06331  [pdf, other

    eess.SY

    Synchronization of Kuramoto oscillators in a bidirectional frequency-dependent tree network

    Authors: Matin Jafarian, Xinlei Yi, Mohammad Pirani, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper studies the synchronization of a finite number of Kuramoto oscillators in a frequency-dependent bidirectional tree network. We assume that the coupling strength of each link in each direction is equal to the product of a common coefficient and the exogenous frequency of its corresponding head oscillator. We derive a sufficient condition for the common coupling strength in order to guara… ▽ More

    Submitted 9 December, 2018; v1 submitted 17 September, 2018; originally announced September 2018.

    Comments: 1- IEEE Conference on Decision and Control (CDC), 2018. 2- The word `source' has been mistakenly used instead of `head' in the paper to be published in the 57th IEEE Conference on Decision and Control, 2018

  43. arXiv:1808.09565  [pdf, other

    math.OC cs.IT eess.SY

    Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information

    Authors: Farhad Farokhi, Henrik Sandberg

    Abstract: The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered. For privacy protection, the response to the query is systematically corrupted with an additive random noise whose support is a subset or equal to a pre-defined constraint set. A measure of privacy using the inverse of the trace of t… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  44. Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement

    Authors: Jezdimir Milosevic, Andre Teixeira, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper proposes an actuator security index based on the definition of perfect undetectability. This index can help a control system operator to localize the most vulnerable actuators in the networked control system, which can then be secured. Particularly, the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised, such that a perfectly un… ▽ More

    Submitted 15 February, 2019; v1 submitted 11 July, 2018; originally announced July 2018.

    Comments: The extension of the paper "A Security Index for Actuators Based on Perfect Undetectability: Properties and Approximation" that appeared at 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)

  45. arXiv:1710.09636  [pdf, other

    eess.SY

    The interconnection of quadratic droop voltage controllers is a Lotka-Volterra system: implications for stability analysis

    Authors: Matin Jafarian, Henrik Sandberg, Karl H. Johansson

    Abstract: This paper studies the stability of voltage dynamics for a power network in which nodal voltages are controlled by means of quadratic droop controllers with nonlinear AC reactive power as inputs. We show that the voltage dynamics is a Lotka-Volterra system, which is a class of nonlinear positive systems. We study the stability of the closed-loop system by proving a uniform ultimate boundedness res… ▽ More

    Submitted 30 January, 2018; v1 submitted 26 October, 2017; originally announced October 2017.

    Comments: Submitted to The IEEE Control Systems Letters

  46. arXiv:1612.05552  [pdf, other

    eess.SY cs.IT

    Secure Estimation and Zero-Error Secrecy Capacity

    Authors: Moritz Wiese, Tobias J. Oechtering, Karl Henrik Johansson, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain channel. An encoder observes and block-encodes the… ▽ More

    Submitted 14 July, 2017; v1 submitted 16 December, 2016; originally announced December 2016.

    Comments: Submitted to IEEE Transactions on Automatic Control

  47. Retrofit Control: Localization of Controller Design and Implementation

    Authors: Takayuki Ishizaki, Tomonori Sadamoto, Jun-ichi Imura, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In this paper, we propose a retrofit control method for stable network systems. The proposed approach is a control method that, rather than an entire system model, requires a model of the subsystem of interest for controller design. To design the retrofit controller, we use a novel approach based on hierarchical state-space expansion that generates a higher-dimensional cascade realization of a giv… ▽ More

    Submitted 12 March, 2018; v1 submitted 8 November, 2016; originally announced November 2016.

    Journal ref: Automatica (2018)

  48. arXiv:1609.00115  [pdf, other

    math.OC eess.SY

    Optimal State Estimation with Measurements Corrupted by Laplace Noise

    Authors: Farhad Farokhi, Jezdimir Milosevic, Henrik Sandberg

    Abstract: Optimal state estimation for linear discrete-time systems is considered. Motivated by the literature on differential privacy, the measurements are assumed to be corrupted by Laplace noise. The optimal least mean square error estimate of the state is approximated using a randomized method. The method relies on that the Laplace noise can be rewritten as Gaussian noise scaled by Rayleigh random varia… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  49. arXiv:1605.00274  [pdf, ps, other

    eess.SY cs.IT

    Uncertain Wiretap Channels and Secure Estimation

    Authors: Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: Uncertain wiretap channels are introduced. Their zero-error secrecy capacity is defined. If the sensor-estimator channel is perfect, it is also calculated. Further properties are discussed. The problem of estimating a dynamical system with nonstochastic disturbances is studied where the sensor is connected to the estimator and an eavesdropper via an uncertain wiretap channel. The estimator should… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: Long version of a paper to be presented at ISIT 2016

  50. From Control System Security Indices to Attack Identifiability

    Authors: Henrik Sandberg, André M. H. Teixeira

    Abstract: In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The generalized index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbance… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

    Comments: Paper presented at the Science of Security for Cyber-Physical Systems Workshop (SoSCYPS) at CPS Week 2016, Vienna, Austria