The Wireless Control Network: Monitoring for Malicious Behavior

Loading...
Thumbnail Image
Penn collection
Real-Time and Embedded Systems Lab (mLAB)
Degree type
Discipline
Subject
Wireless Control Systems
Security
Network Control Systems
Cyber-Physical Systems
Controls and Control Theory
Digital Communications and Networking
Funder
Grant number
License
Copyright date
Distributor
Related resources
Contributor
Abstract

We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) recover the plant outputs (for data-logging and diagnostic purposes) and (b) identify malicious behavior by any of the wireless nodes in the network. We show that if the connectivity of the network is sufficiently high, the IDS only needs to observe a subset of the nodes in the network in order to achieve this objective. Our approach provides a characterization of the set of nodes that should be observed, a systematic procedure for the IDS to use to identify the malicious nodes and recover the outputs of the plant, and an upper bound on the delay required to obtain the necessary information.

Advisor
Date of presentation
2010-12-15
Conference name
Real-Time and Embedded Systems Lab (mLAB)
Conference dates
2023-05-17T05:57:02.000
Conference location
Date Range for Data Collection (Start Date)
Date Range for Data Collection (End Date)
Digital Object Identifier
Series name and number
Volume number
Issue number
Publisher
Publisher DOI
Journal Issue
Comments
Suggested Citation: S. Sundaram, M. Pajic, C.N. Hadjicostis, R. Mangharam, G.J. Pappas. (2010). "The Wireless Control Network: Monitoring for Malicious Behavior." Proceedings of the 49th IEEE Conference on Decision and Control. ©2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Recommended citation
Collection