Abstract
Cyber-physical systems rely on distributed embedded wireless nodes for sensing, computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and mitigating such attacks in a resource-efficient manner requires the network to identify the components under attack and adapt its response based on the observed network performance and attack impact. In this paper, we present our ongoing work on a passivity-based, control-theoretic framework for designing and evaluating adaptive network defenses against the control channel jamming attack. In this attack, an adversary makes use of information gathered from the compromised nodes to identify the location and disrupt the control messages. We present a dynamical model of the attack impact over time, and represent the network response as a feedback control action. Using passivity theory, we identify a class of linear controllers that correspond to network responses that guarantee convergence to a desired operating point. Through a numerical study, we analyze network characteristics such as robustness to uncertain observations of the network state, stability in the presence of delayed observations, and rate of convergence to the desired state. We find that, in general, higher order controllers provide increased robustness and stability, at the cost of slower overall convergence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pajic, M., Sundaram, S., Pappas, G., Mangharam, R.: The wireless control network: A new approach for control over networks. IEEE Transactions on Automatic Control 56(10), 2305–2318 (2011)
Mo, Y., Kim, T., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber–physical security of a smart grid infrastructure. Proceedings of the IEEE 100(1), 195–209 (2012)
Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31–45. Springer, Heidelberg (2009)
Tague, P., Li, M., Poovendran, R.: Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing 8(9), 1221–1234 (2009)
Bonaci, T., Lee, P., Bushnell, L., Poovendran, R.: A convex optimization approach for clone detection in wireless sensor networks. In: Pervasive and Mobile Computing (2012)
Chan, A., Liu, X., Noubir, G., Thapa, B.: Broadcast control channel jamming: Resilience and identification of traitors. In: IEEE International Symposium on Information Theory, pp. 2496–2500 (2007)
Lazos, L., Liu, S., Krunz, M.: Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Second ACM Conference on Wireless Network Security, pp. 169–180 (2009)
Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: A system theoretic approach. In: 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772 (2010)
Clark, A., Bushnell, L., Poovendran, R.: A passivity-based framework for composing attacks on networked control systems. In: 50th Allerton Conference on Communication, Control, and Computing (2012)
Brogliato, B., Egeland, O., Lozano, R., Maschke, B.: Dissipative Systems Analysis and Control: Theory and Applications. Springer (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lee, P., Clark, A., Bushnell, L., Poovendran, R. (2013). Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach. In: Tarraf, D. (eds) Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 449. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01159-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-01159-2_9
Publisher Name: Springer, Heidelberg
Print ISBN: 978-3-319-01158-5
Online ISBN: 978-3-319-01159-2
eBook Packages: EngineeringEngineering (R0)