2021 Annual Meeting
(245a) Control Techniques for Handling Sensor and Actuator Cyberattacks on Evolving Nonlinear Process Systems
Despite the elegance of the theories developed in [6], an important question to address is how such a strategy might be implemented practically. Specifically, the theoretical results in [6] introduce a number of theoretical expressions which must be satisfied, including, for example, various parameters related to the operating region and plant/model mismatch. Through a series of simulation examples involving a continuous stirred tank reactor and focused on the state estimation-based attack detection strategy, we elucidate some of the difficulties in designing resilient control strategies without rigorously determining the parameters of the control and detection strategies using theory but instead attempting to utilize simulation. We also discuss, via simulation, strategies for attempting to thwart specific types of attacks on the actuators via injecting control signals at intervals, as well as the role of plant/model mismatch introduced via data-driven models and numerical error on control actions when state measurement cyberattacks occur. Finally, in light of these control/detection concepts, we discuss concepts related to cyberattack discoverability for nonlinear systems.
References:
[1] Heidarinejad, M., Liu, J., & Christofides, P. D. (2012). Economic model predictive control of nonlinear process systems using Lyapunov techniques. AIChE Journal, 58(3), 855-870.
[2] Ellis, M., Durand, H., & Christofides, P. D. (2014). A tutorial review of economic model predictive control methods. Journal of Process Control, 24(8), 1156-1178.
[3] Wu, Z., Albalawi, F., Zhang, J., Zhang, Z., Durand, H., & Christofides, P. D. (2018). Detecting and handling cyber-attacks in model predictive control of chemical processes. Mathematics, 6(10), 173.
[4] Cárdenas, A. A., Amin, S., Lin, Z. S., Huang, Y. L., Huang, C. Y., & Sastry, S. (2011, March). Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 355-366.
[5] Satchidanandan, B., & Kumar, P. R. (2016). Dynamic watermarking: Active defense of networked cyberâphysical systems. Proceedings of the IEEE, 105(2), 219-240.
[6] Rangan, K. K., Oyama, H., & Durand, H. (2021). Integrated cyberattack detection and handling for nonlinear systems with evolving process dynamics under Lyapunov-based economic model predictive control. Chemical Engineering Research and Design.
[7] Oyama, H., & Durand, H. (2020). Integrated cyberattack detection and resilient control strategies using Lyapunovâbased economic model predictive control. AIChE Journal, 66(12), e17084.