Fred Love, B. McMillin, Sivanesan Tulasidas, W. Balachandran
{"title":"WiP Abstract: Multiple Security Domain Nondeducibility for Point-of-Care Diagnostic Technology","authors":"Fred Love, B. McMillin, Sivanesan Tulasidas, W. Balachandran","doi":"10.1109/ICCPS.2016.7479127","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479127","url":null,"abstract":"Microfluidics is an interdisciplinary science focusing on the development of devices and systems that process low volumes of fluid for applications such as high throughput DNA sequencing, immunoassays, and entire Labs-on- Chip platforms. Microfluidic diagnostic technology enables these advances by facilitating the miniaturization and integration of complex biochemical processing through a microfluidic biochip [1]. This approach tightly couples the biochemical operations, sensing system, control algorithm, and droplet-based biochip. During the process the status of a droplet is monitored in real- time to detect operational errors. If an error has occurred, the control algorithm dynamically reconfigures to allow recovery and rescheduling of on-chip operations. During this recovery procedure the droplet that is the source of the error is discarded to prevent the propagation of the error and the operation is repeated. Threats to the operation of the microfluidics biochip include (1) integrity: an attack can modify control electrodes to corrupt the diagnosis, and (2) privacy: what can a user/operator deduce about the diagnosis? It is challenging to describe both these aspects using existing models; as Figure 1 depicts there are multiple security domains, Unidirectional information flows shown in black indicate undesirable flows, the bidirectional black arrows indicate desirable, but possibly corrupted, information flows, and the unidirectional red arrows indicate undesirable information flows. As with Stuxnet, a bi- directional, deducible information flow is needed between the monitoring security domain and internal security domain (biochip) [2]. Simultaneously, the attacker and the operators should receive a nondeducible information flow. Likewise, the red attack arrows should be deducible to the internal domain. Our current security research direction uses the novel approach of Multiple Security Domain Nondeducibility [2] to explore the vulnerabilities of exploiting this error recovery process through information flow leakages and leads to protection of the system through desirable information flows.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"44 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89308642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Paridari, A. Mady, Isidoro S. La Porta, Rohan Chabukswar, Jacobo Blanco, André M. H. Teixeira, H. Sandberg, M. Boubekeur
{"title":"Cyber-Physical-Security Framework for Building Energy Management System","authors":"K. Paridari, A. Mady, Isidoro S. La Porta, Rohan Chabukswar, Jacobo Blanco, André M. H. Teixeira, H. Sandberg, M. Boubekeur","doi":"10.1109/ICCPS.2016.7479072","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479072","url":null,"abstract":"Energy management systems (EMS) are used to control energy usage in buildings and campuses, by employing technologies such as supervisory control and data acquisition (SCADA) and building management systems (BMS), in order to provide reliable energy supply and maximise user comfort while minimising energy usage. Historically, EMS systems were installed when potential security threats were only physical. Nowadays, EMS systems are connected to the building network and as a result directly to the outside world. This extends the attack surface to potential sophisticated cyber-attacks, which adversely impact EMS operation, resulting in service interruption and downstream financial implications. Currently, the security systems that detect attacks operate independently to those which deploy resiliency policies and use very basic methods. We propose a novel EMS cyber-physical-security framework that executes a resilient policy whenever an attack is detected using security analytics. In this framework, both the resilient policy and the security analytics are driven by EMS data, where the physical correlations between the data-points are identified to detect outliers and then the control loop is closed using an estimated value in place of the outlier. The framework has been tested using a reduced order model of a real EMS site.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"14 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90866889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roel Dobbe, D. Arnold, Stephan Liu, Duncan S. Callaway, C. Tomlin
{"title":"Real-Time Distribution Grid State Estimation with Limited Sensors and Load Forecasting","authors":"Roel Dobbe, D. Arnold, Stephan Liu, Duncan S. Callaway, C. Tomlin","doi":"10.1109/ICCPS.2016.7479117","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479117","url":null,"abstract":"High penetration levels of distributed generation (DG) and electric vehicles (EVs) diversify power flow and bring uncertainty to distribution networks, making planning and control more involved for distribution system operators (DSOs). The increased risk of constraint violation triggers the need to augment forecasts with real- time state estimation. This is economically and technically challenging since it requires investing in a large number of sensors and these have to communicate with often older and slower supervisory control and data acquisition (SCADA) systems. We address distribution grid state estimation via combining only a limited set of sensors with load forecast information. It revisits open problems in a recent paper that proposes a Bayesian estimation scheme. We derive the estimator for balanced power networks via rigorous modeling. An off-line analysis of load aggregation, forecast accuracy and number of sensors provides concrete engineering trade-offs to determine the optimal number of sensors for a desired accuracy. This estimation procedure can be used in real time as an observer for control problems or off-line for planning purposes to asses the effect of DG or EVs on specific network components.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"107 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83428517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Davit Hovhannisyan, F. Kurdahi, A. Eltawil, A. Aghakouchak, M. A. Faruque
{"title":"Poster Abstract: Unifying Modeling Substrate for Irrigation Cyber-Physical Systems","authors":"Davit Hovhannisyan, F. Kurdahi, A. Eltawil, A. Aghakouchak, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479116","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479116","url":null,"abstract":"CPS's multi-domain nature is difficult to capture using existing modeling approaches, which produce compartmentalized and complex system simulation models. Unifying models of multi-domain physical phenomena and processes, and man-made artifacts into a single modeling substrate will enable enhanced design of intelligent control algorithms and analytics. Moreover, with use of known modeling abstractions, which describe the physical ordinary differential equation (ODE) relationships by introducing model components, such as those found in Electronic Design Automation (EDA) tools, models of the physical world, e.g. irrigation systems, integrated with models of cyber world, e.g. electrical circuits, can be analyzed using existing tools. This can be done by using analogies between hydraulic, electrical, mechanical, etc. For example, we developed soil moisture transient electrical circuit model for the next generation of Irrigation CPS. The most important component in smart irrigation system design are the knowledge of water transport in the soil, or percolation, and water uptake by plants or transpiration and evaporation, or combined evapotranspiration (ET). Main analytical ODEs that describe water transport in soil are Richard's Equation: ∂θ/∂t =(∂θ/∂z) [K(θ)(( ∂ψ/∂z) + 1)] and Darcy's Law: q = K(ψ)∇ψ, where θ is water content, K is the hydraulic conductivity, z is the elevation, t is time, ψ is the pressure head or water potential, q is the flux or the discharge per square area. However, these equations do not have closed form solutions, thus, we chose to model and simulate the phenomena using electrical circuit components. To expose the underlying soil physics, we modeled vertical segment of soil by layers of water storage, or capacitive, and transport, or resistive, components. Starting with a single layer of storage, model is tuned and evolved. At each successful stage of evolution, a storage component is divided into two storage elements and connected by a transport component. Meanwhile, model parameters are tuned by quadratic optimization with respect to experimental data split into training and validation segments, which were gathered from outdoor soil moisture sensor in a 16 day duration with 15 min sampling period. Finally, experimental results show that model order 3 has the best fit of experimental data with R2 = 0.923. Thus, this ODE based simulation methodology describes transient behavior of vertical moisture transport in soil, and enables CPS model- based design and control.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"19 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Rate Control and Demand Balancing for Electric Vehicle Charging","authors":"Fanxin Kong, Xue Liu, Zhonghao Sun, Qinglong Wang","doi":"10.1109/ICCPS.2016.7479118","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479118","url":null,"abstract":"The anticipated high electric vehicle (EV) penetration motivates many research efforts to alleviate the potential associated grid impact. However, few works discuss the crucial issue: quality of service (QoS) degradation caused by competing for charging resources. This issue arises due to the limitation on power supply and charging space that charging stations can usually provide. Our work studies this issue and proposes an operational scheme that optimizes QoS for EV users while satisfying the stability of the power grid. The scheme consists of two levels. The lower level deals with charging rate control, for which we propose an efficient algorithm with provable QoS-optimal allocation of power supply to EVs. The upper level handles charging demand balancing, for which we design two approximation algorithms that schedule EVs to multiple charging stations. One algorithm is a 3-approximation with polynomial complexity; while the other is a (2+ε)-approximation using a fully polynomial time approximation scheme. Through extensive simulations based on realistic data traces and simulations tools, we demonstrate the efficiency and efficacy of our operational scheme and further provide interesting findings from in-depth analysis of the experimental results.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"17 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80176212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiP Abstract: Distributed Reactive Control Synthesis for Aircraft Electric Power Systems via SAT Solving","authors":"Yunus Emre Sahin, N. Ozay","doi":"10.1109/ICCPS.2016.7479125","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479125","url":null,"abstract":"In this work, we consider a simplified version of the distributed control synthesis problem where the system is modeled as a Boolean network and specifications are given as propositional formulae on environment and system variables. In this relatively static Boolean setting, (centralized) reactive control synthesis problem reduces to a quantified Boolean satisfiability problem which can be solved by off-the-shelf SAT solvers. For the distributed control synthesis, we propose a recursive algorithm that starts from a global assume-guarantee specification and maps it to local assume-guarantee specifications for individual subsystems. Finding these local assume- guarantee specifications leads to a modular design framework. For instance, local controllers for subsystems can be synthesized independently via SAT or a local subsystem can be replaced with another subsystem that satisfies the same local assume-guarantee specifications. We also investigate how the interconnection structure of the network affects the performance of this algorithm. In particular, we show that if the interconnection structure is a multi-tree and the global assumptions and guarantees satisfy certain independence conditions, the algorithm is complete.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"94 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80385024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sujit Rokka Chhetri, Sina Faezi, A. Canedo, M. A. Faruque
{"title":"Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems","authors":"Sujit Rokka Chhetri, Sina Faezi, A. Canedo, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479115","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479115","url":null,"abstract":"Additive manufacturing systems leak cyber-related information (such as G-code, M-code, etc.) from the side-channels (such as acoustic, power, thermal, etc.). In our work, we have successfully demonstrated the vulnerability of additive manufacturing to thermal side-channel attacks, where confidentiality can be breached to steal the Intellectual Property (IP) in the form of 3D design and printing parameters. We introduce a novel methodology to reverse engineer the thermal images acquired from the thermal side-channel to extract specific information (such as speed, temperature, axis of movement, etc.) present in the cyber-domain. To the best of our knowledge, this kind of forensics has not yet been explored in additive manufacturing systems.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72782997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasser Shoukry, Michelle S. Chong, M. Wakaiki, P. Nuzzo, A. Sangiovanni-Vincentelli, S. Seshia, J. Hespanha, P. Tabuada
{"title":"SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks","authors":"Yasser Shoukry, Michelle S. Chong, M. Wakaiki, P. Nuzzo, A. Sangiovanni-Vincentelli, S. Seshia, J. Hespanha, P. Tabuada","doi":"10.1145/3078621","DOIUrl":"https://doi.org/10.1145/3078621","url":null,"abstract":"We introduce a scalable observer architecture to estimate the states of a discrete-time linear-time-invariant (LTI) system whose sensors can be manipulated by an attacker. Given the maximum number of attacked sensors, we build on previous results on necessary and sufficient conditions for state estimation, and propose a novel multi-modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving. We present two techniques to reduce the complexity of the estimation problem. As a first strategy, instead of a bank of distinct observers, we use a family of filters sharing a single dynamical equation for the states, but different output equations, to generate estimates corresponding to different subsets of sensors. Such an architecture can reduce the memory usage of the observer from an exponential to a linear function of the number of sensors. We then develop an efficient SMT-based decision procedure that is able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate. We provide proofs of convergence for our algorithm and report simulation results to compare its runtime performance with alternative techniques. Our algorithm scales well for large systems (including up to 5000 sensors) for which many previously proposed algorithms are not implementable due to excessive memory and time requirements. Finally, we illustrate the effectiveness of our algorithm on the design of resilient power distribution systems.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87334198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rui Tan, H. Nguyen, Y. Foo, Xinshu Dong, David K. Y. Yau, Z. Kalbarczyk, R. Iyer, H. Gooi
{"title":"Optimal False Data Injection Attack against Automatic Generation Control in Power Grids","authors":"Rui Tan, H. Nguyen, Y. Foo, Xinshu Dong, David K. Y. Yau, Z. Kalbarczyk, R. Iyer, H. Gooi","doi":"10.1109/ICCPS.2016.7479109","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479109","url":null,"abstract":"This paper studies false data injection attacks against automatic generation control (AGC), a fundamental control system used in all power grids to maintain the grid frequency at a nominal value. Attacks on the sensor measurements for AGC can cause frequency excursion that triggers remedial actions such as disconnecting customer loads or generators, leading to blackouts and potentially costly equipment damage. We derive an attack impact model and analyze an optimal attack, consisting of a series of false data injections, that minimizes the remaining time until the onset of remedial actions, leaving the shortest time for the grid to counteract. We show that, based on eavesdropped sensor data and a few feasible-to-obtain system constants, the attacker can learn the attack impact model and achieve the optimal attack in practice. This paper provides essential understanding on the limits of physical impact of false data injections on power grids, and provides an analysis framework to guide the protection of sensor data links. Our analysis and algorithms are validated by experiments on a physical 16-bus power system testbed and extensive simulations based on a 37-bus power system model.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82862745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster Abstract: A Unified Distributed Control Framework for Inverter-Based Islanded Microgrid","authors":"Chin-Yao Chang, Wei Zhang, Jianming Lian","doi":"10.1109/ICCPS.2016.7479112","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479112","url":null,"abstract":"Control of microgrid has received considerable research attention in recent years. Various distributed control methods have been proposed in the literature to achieve power sharing, frequency synchronization, and other control objectives for AC islanded microgrids. This poster will present a general control design framework that unifies many of the existing methods in the literature. We will also show that such a unified structure will enable us to identify common fundamental challenges of microgrid control problems and allow us to recover the existing control results in a unified way with many interesting extensions.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"17 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85160733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}