Vulnerability Analysis of Feedback Systems. Nathan Woodbury Advisor: Dr. Sean Warnick

Similar documents
Vulnerability Analysis of Feedback Systems

Vulnerability Analysis of Closed-Loop Systems. Nathan Woodbury. of graduation requirements for University Honors. Department of Computer Science

Signal Structure for a Class of Nonlinear Dynamic Systems

Network Structure Preserving Model Reduction with Weak A Priori Structural Information

Mathematical Relationships Between Representations of Structure in Linear Interconnected Dynamical Systems

Professor Fearing EE C128 / ME C134 Problem Set 7 Solution Fall 2010 Jansen Sheng and Wenjie Chen, UC Berkeley

Control Systems Engineering ( Chapter 6. Stability ) Prof. Kwang-Chun Ho Tel: Fax:

Outline. Classical Control. Lecture 5

Representing Structure in Linear Interconnected Dynamical Systems

6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski. Solutions to Problem Set 1 1. Massachusetts Institute of Technology

Systems Analysis and Control

Chapter 3: Block Diagrams and Signal Flow Graphs

Advanced Control Theory

Lecture 7 (Weeks 13-14)

Network Reconstruction from Intrinsic Noise: Non-Minimum-Phase Systems

Control Systems Design

Lecture 6. Chapter 8: Robust Stability and Performance Analysis for MIMO Systems. Eugenio Schuster.

Solving and Graphing Inequalities

Topic # Feedback Control Systems

Chapter 5. Standard LTI Feedback Optimization Setup. 5.1 The Canonical Setup

CSL361 Problem set 4: Basic linear algebra

When a function is defined by a fraction, the denominator of that fraction cannot be equal to zero

Organization Team Team ID#

The Meaning of Structure in Interconnected Dynamic Systems

Linear State Feedback Controller Design

Exam in Systems Engineering/Process Control

Descriptor system techniques in solving H 2 -optimal fault detection problems

An Optimization-based Approach to Decentralized Assignability

Control Systems I. Lecture 5: Transfer Functions. Readings: Emilio Frazzoli. Institute for Dynamic Systems and Control D-MAVT ETH Zürich

FEL3210 Multivariable Feedback Control

CDS 101/110a: Lecture 10-1 Robust Performance

EE C128 / ME C134 Fall 2014 HW 9 Solutions. HW 9 Solutions. 10(s + 3) s(s + 2)(s + 5) G(s) =

DERIVATIVE FREE OUTPUT FEEDBACK ADAPTIVE CONTROL

1 The decision problem for First order logic

Sub-Optimal Scheduling of a Flexible Batch Manufacturing System using an Integer Programming Solution

Autonomous Mobile Robot Design

3-1 Graphing and Writing Inequalities. Warm Up Lesson Presentation Lesson Quiz

Chapter 4 & 5: Vector Spaces & Linear Transformations

MIMO analysis: loop-at-a-time

Problem Weight Score Total 100

Chapter 6 Steady-State Analysis of Continuous-Time Systems

100 (s + 10) (s + 100) e 0.5s. s 100 (s + 10) (s + 100). G(s) =

FEL3210 Multivariable Feedback Control

Linear Algebra and Robot Modeling

Data Based Design of 3Term Controllers. Data Based Design of 3 Term Controllers p. 1/10

a. Closed-loop system; b. equivalent transfer function Then the CLTF () T is s the poles of () T are s from a contribution of a

Uncertainty and Robustness for SISO Systems

Chapter Robust Performance and Introduction to the Structured Singular Value Function Introduction As discussed in Lecture 0, a process is better desc

CPSC 540: Machine Learning

L2 gains and system approximation quality 1

27. The pole diagram and the Laplace transform

Unit 1 Linear Models. Answer. Question. Model. Question. Answer. 3 Types of Models. Model: A simplified version of reality

STABILITY ANALYSIS. Asystemmaybe stable, neutrallyormarginallystable, or unstable. This can be illustrated using cones: Stable Neutral Unstable

2.4 Graphing Inequalities

Lab 3: Model based Position Control of a Cart

ECE317 : Feedback and Control

Structured Coprime Factorizations Description of Linear and Time Invariant Networks

LECTURES 14/15: LINEAR INDEPENDENCE AND BASES

A State-Space Approach to Control of Interconnected Systems

forms Christopher Engström November 14, 2014 MAA704: Matrix factorization and canonical forms Matrix properties Matrix factorization Canonical forms

The Q-parametrization (Youla) Lecture 13: Synthesis by Convex Optimization. Lecture 13: Synthesis by Convex Optimization. Example: Spring-mass System

Problem Set 5 Solutions 1

Strongly chordal and chordal bipartite graphs are sandwich monotone

Math Matrix Algebra

Sensitivity to Model Parameters

Necessary and Sufficient Informativity Conditions for Robust Network. Reconstruction Using Dynamical Structure Functions.

A misère-play -operator

ECE137B Final Exam. There are 5 problems on this exam and you have 3 hours There are pages 1-19 in the exam: please make sure all are there.

ECE 3793 Matlab Project 3 Solution

Analysis and Design of Control Systems in the Time Domain

ECE 388 Automatic Control

ẋ n = f n (x 1,...,x n,u 1,...,u m ) (5) y 1 = g 1 (x 1,...,x n,u 1,...,u m ) (6) y p = g p (x 1,...,x n,u 1,...,u m ) (7)

Resilient Structural Stabilizability of Undirected Networks

Control Systems Engineering ( Chapter 8. Root Locus Techniques ) Prof. Kwang-Chun Ho Tel: Fax:

FRTN10 Multivariable Control, Lecture 13. Course outline. The Q-parametrization (Youla) Example: Spring-mass System

The Tuning of Robust Controllers for Stable Systems in the CD-Algebra: The Case of Sinusoidal and Polynomial Signals

9. Two-Degrees-of-Freedom Design

Section 29: What s an Inverse?

10 Transfer Matrix Models

Part IB Paper 6: Information Engineering LINEAR SYSTEMS AND CONTROL. Glenn Vinnicombe HANDOUT 5. An Introduction to Feedback Control Systems

Unit 11 - Week 7: Quantitative feedback theory (Part 1/2)

Lecture 16 : Independence, Covariance and Correlation of Discrete Random Variables

ECE 3793 Matlab Project 3

Introduction to Process Control

Systems Analysis and Control

MATH 547 ALGEBRAIC TOPOLOGY HOMEWORK ASSIGNMENT 4

ECE317 : Feedback and Control

APPLICATIONS FOR ROBOTICS

Control Systems I. Lecture 7: Feedback and the Root Locus method. Readings: Jacopo Tani. Institute for Dynamic Systems and Control D-MAVT ETH Zürich

Letting be a field, e.g., of the real numbers, the complex numbers, the rational numbers, the rational functions W(s) of a complex variable s, etc.

Systems Analysis and Control

Department of Mathematics, University of Wisconsin-Madison Math 114 Worksheet Sections (4.1),

AUTOMATIC CONTROL. Andrea M. Zanchettin, PhD Spring Semester, Introduction to Automatic Control & Linear systems (time domain)

Architectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids

Dynamic Attacks on Power Systems Economic Dispatch

The Strong Largeur d Arborescence

Class President: A Network Approach to Popularity. Due July 18, 2014

ELECTRONICS & COMMUNICATIONS DEP. 3rd YEAR, 2010/2011 CONTROL ENGINEERING SHEET 5 Lead-Lag Compensation Techniques

Q T A = R ))) ) = A n 1 R

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

Transcription:

Vulnerability Analysis of Feedback Systems Nathan Woodbury Advisor: Dr. Sean Warnick

Outline : Vulnerability Mathematical Preliminaries Three System Representations & Their Structures Open-Loop Results: Secure Structures (DAGs) Closed-Loop Results: Fight Fire with Fire 3/15/2013 2

: Vulnerability Lesson: Vulnerability is a Property of Links Lesson: Definition of Link Depends on Structure, which depends on Implementation Lesson: Links in cycles are vulnerable To remove vulnerability, remove cycles Lesson: Can use cycles to minimize vulnerability caused by feedback INTRODUCTION: VULNERABILITY

Attack Models Denial of Service Removal of Link Deception Interception and Modification of a Link 3/15/2013 4

Attack Models Denial of Service Removal of Link Deception Interception and Modification of a Link Underlying Perspective: Both models involve a distributed system where an enemy does bad things on a link. 3/15/2013 5

Attack Models Denial of Service Removal of Link Deception Interception and Modification of a Link Underlying Perspective: Both models involve a distributed system where an enemy does bad things on a link. Destabilization Attack Attack a Single Link Destabilize Entire System Link Failure Malicious Attack Vulnerability Sensitivity of stability to link perturbations Depends on Structure 3/15/2013 6

Definition of Vulnerability Define e: (attacker) effort smallest signal attacker can place on a particular link to destabilize system. (Perturbation of size e) Link Vulnerability: 1 e More effort to destabilize less vulnerable Less effort to destabilize more vulnerable System Vulnerability: Max vulnerability over all links System Representation defines notion of link 3/15/2013 7

: Vulnerability Lesson: Vulnerability is a Property of Links Lesson: Definition of Link Depends on Structure, which depends on Implementation Lesson: Links in cycles are vulnerable To remove vulnerability, remove cycles Lesson: Can use cycles to minimize vulnerability caused by feedback SYSTEMS AND STRUCTURE

What is Structure System structure is represented by a graph Shows flow of information One system can be represented by many structures We will discuss two (Transfer Functions and Dynamical Structure Functions) 3/15/2013 9

Transfer Functions Input-output behavior Black Box G = 1 f(s) s + 3 2 2 (s + 3) 2(s + 3) (s + 1)(s + 3) 2 4 2(s + 1) (s + 1)(s + 3) f s = s 3 + 7s 2 + 15s + 13. The design of the system doesn t worry about implementation, only its inputoutput behavior 3/15/2013 10

Dynamical Structure Functions (DSFs) Factorization of the Transfer Function G = I Q 1 P P = 1 s + 1 0 0 0 1 s + 3 0 0 0 1 s + 3, Q = 0 0 2 s + 3 0 1 s + 1 0 0 2 s + 1 0 An implementation of a system. 3/15/2013 11

: Vulnerability Lesson: Vulnerability is a Property of Links Lesson: Definition of Link Depends on Structure, which depends on Implementation Lesson: Links in cycles are vulnerable To remove vulnerability, remove cycles Lesson: Can use cycles to minimize vulnerability caused by feedback VULNERABILITY IN OPEN-LOOP SYSTEMS

Open-Loop Problem Formulation English: Given a system, design its structure to minimize system vulnerability Fact: Links in P don t matter Math: Given a fixed TF G, Choose DSF Q (with P = I Q G) such that the system vulnerability is minimized: min Q I Q 1 1 1 : Size of matrix element (i, j) with largest norm Generally, this is a hard problem to solve (non-convex) 3/15/2013 13

Conditions of Vulnerability Theorem 1: A link is vulnerable if and only if it is part of a cycle. Same system Different Implementation Different Vulnerabilities Vulnerable Architecture Q has internal feedback P = I Q G One Secure Architecture Q = 0 (No Blue Links) P = I Q G = G 3/15/2013 14

: Vulnerability Lesson: Vulnerability is a Property of Links Lesson: Definition of Link Depends on Structure, which depends on Implementation Lesson: Links in cycles are vulnerable To remove vulnerability, remove cycles Lesson: Can use cycles to minimize vulnerability caused by feedback VULNERABILITY IN CLOSED-LOOP SYSTEMS

Motivation Sometimes, feedback is necessary Given system G, design second system K so that G and K are connected in feedback The combined system behaves well Our Contribution Decide best structure, or implementation, of K to minimize vulnerability 3/15/2013 16

Closed-Loop Problem Formulation English: Given two systems in feedback, design the structure of one to minimize the vulnerability of the combined system. Math: Given fixed TFs G and K, design structure P, Q of K such that the system vulnerability is minimized. min Q G I KG 1 I KG 1 I Q 1 1 3/15/2013 17

Result 1: Decoupling of Vulnerability Theorem 2: Vulnerabilities on links in one system do not depend on the structure of the other system. Only on other system s black box behavior Does depend on its own structure 3/15/2013 18

Result 2: We can Fight Fire with Fire We know that cycles create vulnerability When feedback is necessary, it is possible to use cycles within systems to reduce the vulnerability of the combined system There may be a universal structure of Q that uses cycles to minimize vulnerability, independent of G and K. 3/15/2013 19

Examples Let G = Let K = 2 1 s 1 s 1 1 2 s 1 s 1 1 (s+1)(s+3), 3s 4 2s 1 2s 1 3s 4 3/15/2013 20

Example 1: Fight Fire with Fire Empty Q Q = 0, P = K. Max Vulnerability = 2.27 A Q with Internal Feedback Q = 1 s+1 P = 1 f(s) 0 32 32 0 3s 2 + 57s + 28 2s 2 + 93s + 127 2s 2 + 93s + 127 3s 2 + 57s + 28, f s = s + 1 2 (s + 3) Max Vulnerability = 2.27 Max Vulnerability = 1.85 3/15/2013 21

Example 2: A Word of Caution Empty Q Q = 0, P = K. Max Vulnerability = 2.27 A Q with Internal Feedback Q = 1 s+2 P = 1 s+2 0 1 1 0 3 2 2 3 Max Vulnerability = 2.27 Max Vulnerability = 2.70 3/15/2013 22

: Vulnerability Lesson: Vulnerability is a Property of Links Lesson: Definition of Link Depends on Structure, which depends on Implementation Lesson: Links in cycles are vulnerable To remove vulnerability, remove cycles Lesson: Can use cycles to minimize vulnerability caused by feedback CONCLUSIONS

Next Steps Is there a universal structure? If there is a universal structure, is it the highgain heuristic? If not, how do we design Q to minimize vulnerability? What other characteristics of systems should we explore (maintainability, adaptability, cost)? 3/15/2013 24

Acknowledgements Dr. Sean Warnick Vasu Chetty Phil Paré 3/15/2013 25

QUESTIONS?

APPENDICES

Derivation of a DSF Consider a state-space LTI system z1 z 2 = A 11 A12 A 21 A 22 y = C1 C2 z 1 z 2, z 1 z 2 + B 1 B 2 where C1 C2 has full row rank. The system can be transformed to y x = A 11 A 12 A 21 A 22 y x + B 1 B 2 y = I 0 y x, where y are the states that are measured. Taking the Laplace transform, we get sy sx = A 11 A 12 Y A 21 A 22 X + B 1 U B 2 u u Solving for X we get X = si A 1 22 A 21 Y + si A 1 22 B 2 U, which yields sy = WY + VU W = A 11 + A 12 si A 1 22 A 21 V = A 12 si A 1 22 B 2 + B 1. Let D be a diagonal matrix with the diagonal entries of W. Then si D Y = W D Y + VU. Therefore, Y = QY + PU where Q = P = si D 1 (W D) si D 1 V It can be checked that G = I Q 1 P = C si A 1 B. 3/15/2013 28

Proof of Theorem 2 The inverse of H is defined such that I Q P P I Q A B C D = I 0 0 I. I Q B PD = 0, therefore B = I Q 1 PD = GD I Q C PA = 0, therefore C = I Q 1 PA = KA I Q A PC = I Q A PKA = I, therefore A = I Q PK 1 I Q D PB = I Q D PGD = I, therefore D = I Q PG 1 Thus I Q 1 = I Q PK 1 K I Q PK 1 G I Q PG 1 I Q PG 1 Note that all links in the controller are represented in the bottom rows of Q. Since the vulnerability any link (i, j) in the combined system are defined by the norm of entry (j, i) in H = I Q 1, the vulnerability of the links in the controller are contained entirely in the equations in the right column of H given above and are expressed only in terms of P, Q, and G. Therefore, the vulnerability of the links in the controller are independent of the structure P, Q of the links in the plant. Note that similarly, the vulnerability of the links in the plant are independent of the structure (P, Q) of the links in the controller. 3/15/2013 29

Vulnerability of Links in a DSF Given a DSF (P, Q) and H = I Q 1, the vulnerability of a link i, j in Q is v q ij = ji The vulnerability of the system is V = max i,j Q v q ij 3/15/2013 30

Gain G iω The One-Infinity Norm The problem formulation of both open-loop and closed-loop systems involve min Q X 1, where X is a matrix of rational functions of form p(s) q(s). The infinity norm computes the maximum gain seen by each entry of X (see figure to the right) Corresponds to the size minimum signal required to destabilize the system. The one norm chooses the largest of the computed infinity norms. Therefore the one-infinity norm computes the vulnerability of the system, which we wish to minimize by choosing a good Q. Maximum Gain Frequency ω [rad/sec] 3/15/2013 31

The High-Gain Heuristic (Universal Structure) We don t yet know how to choose Q to minimize the vulnerability of the combined system. But we have a good idea Let Q = 0 n p(s) n p(s) n p(s) 0 n p(s) n p(s) n 0 p(s) In all of our tests, when n R grows large: The vulnerabilities on the links in P approach 0 The vulnerabilities on the links in Q approach 1 rows(q) 3/15/2013 32

Example 3: High Gain Heuristic 1 0 10000 Q = s+1 10000 0 P = 1 g(s) (s) f(s) (s) g(s) f s = s + 1 2 s + 3 g s = 3s 2 + 19993s + 9996 s = 2s 2 + 29997s + 39999 1 0 10000 Q = s 1 10000 0 P = 1 g(s) (s) f(s) (s) g(s) f s = s + 1 2 s + 3 g s = 2s 2 10000s + 9998 s = s 2 20002s + 19999 3/15/2013 33

References A. Rai, D. Ward, S. Roy and S. Warnick, "Vulnerable Links and Secure Architectures in the Stabilization of Networks of Controlled Dynamical Systems," American Control Conference, Montreal, Canada, accepted for publication, 2012. A. Rai, "Analysis and Design Tools for Structured Feedback Systems," M.S. Thesis, Brigham Young Univ., Provo, UT, 2012. 3/15/2013 34