Designing Secure Unknown Input Observer Using Encryption

Document Type : Original Article

Authors

School of Electrical and Computer Engineering, University of Shiraz, Shiraz, Iran

Abstract

: In this paper, a secure unknown input observer is designed in a networked control system environment. For this propose, the Paillier encryption, which is a semi- homomorphic encryption method, is employed. The algebraic calculations required for the estimation can be performed over the encrypted data and the encrypted states estimation are generated. The boundedness condition  of estimation error is obtained by considering the digital processor. This method increases the security of system state estimates and effectively eliminates attacks that disrupt the confidentiality of the data. Simulation on the TE-PCS will be performed to illustrate the results.

Keywords


[1]      Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in 
Communication, Control, and Computing, 47th 
Annual Allerton Conference on. IEEE, pp. 911–918, 2009.
[2]      لادن صادقی خرمی و احمد افشار، «طراحی سیستم تشخیص و جداسازی حمله با استفاده از رویتگر با ورودی ناشناخته نامینیمم فاز برای سیستم کنترل مبتنی بر شبکه»، کنفرانس بین المللی مهندسی برق ایران، دوره 24، صفحه 2019-2024، شیراز،  1396.
[3]      Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks 
on scada systems,” IEEE Transactions on Control Systems Technology, 
vol. 22, no. 4, pp. 1396–1407, 2014. 

[4]      مینا سلیم و محمد جواد خسروجردی، «طراحی تخمین گر عیب با استفاده از تکنیک  مبتنی بر داده»، مجله مهندسی برق دانشگاه تبریز، جلد 46، شماره 4، صفحه 147-158، 1395.
[5]      مرتضی خرم کشکولی و مریم دهقانی، «تشخیص، شناسایی و جداسازی عیب توربین گاز پالایشگاه دوم پارس جوبی با استفاده از روش‌های ترکیبی داده کاوی، kmeans ، تحلیل مؤلفه‌های اصلی(PCA) و ماشین بردار پشتیبان (SVM)»، مجله مهندسی برق دانشگاه تبریز، جلد 47، شماره 2، صفحه 501-515،  1396.
[6]      Khorrami, Ladan Sadeghi, and Ahmad Afshar. "Attack detection in active queue management within large-scale networks control system with information of network and physical system." Electrical Engineering (ICEE), 24th Iranian Conference on. IEEE, 2016.
[7]      A. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson, “Secure control systems: A quantitative risk management approach,” IEEE Control Systems, vol. 35, no. 1, pp. 24–45, 2015.
[8]      Amin, Saurabh, Alvaro A. Cárdenas, and S. Shankar Sastry. "Safe and secure networked control systems under denial-of-service attacks." International Workshop on Hybrid Systems: Computation and Control. Springer, Berlin, Heidelberg, 2009.
[9]      Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Achieving secure role-based access control on encrypted data in cloud storage." IEEE transactions on information forensics and security 8.12 , pp. 1947-1960, 2013.

[10]      F. Farokhi, I. Shames, and N. Batterham, “Secure and private cloud-based control using semi-homomorphic encryption,” IFAC- PapersOnLine, vol. 49, no. 22, pp. 163–168, 2016. 

[11]      J. Kim, C. Lee, H. Shim, J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Encrypting controller using fully homomorphic encryption for security of cyber-physical systems,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 175–180, 2016. 

[12]      K. Kogiso and T. Fujita, “Cyber-security enhancement of networked control systems using homomorphic encryption,” in Decision and Control (CDC), 2015 IEEE 54th Annual Conference on. IEEE, pp. 6836–6843, 2015. 

[13]      Darup, Moritz Schulze, et al. "Towards encrypted mpc for linear constrained systems." IEEE Control Systems Letters 2.2 , pp. 195-200, 2018.
[14]      Alexandru, Andreea B., Manfred Morari, and George J. Pappas. "Cloud-based MPC with Encrypted Data." arXiv preprint arXiv:, pp. 1803.09891, 2018.
[15]      A. Al-Anwar, Y. Shoukry, S. Chakraborty, P. Martin, P. Tabuada, and M. B. Srivastava, “Proloc: resilient localization with private observers using partial homomorphic encryption,” in International Conference on Information Processing in Sensor Networks, pp. 41–52, 2017. 

[16]      M. Zamani, L. Sadeghikhorrami, A.A. Safavi, and F. Farokhi, “Private state estimation for cyber physical systems using semi homomorphic encryption,” Proceedings of the 23nd International Symposium on Mathematical Theory of Networks and Systems, pp. 399–404, 2018.
[17]      F. J. Gonzalez-Serrano, A. Amor-Martın, and J. Casamayon-Anton, “State estimation using an extended kalman filter with privacy- protected observed inputs,” in IEEE International Workshop on In- formation Forensics and Security. IEEE, pp. 54–59, 2014.
[18]      P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp. 223– 238, 1999.
[19]      Z.-P. Jiang and Y. Wang, “Input-to-state stability for discrete-time nonlinear systems,” Automatica, vol. 37, no. 6, pp. 857 – 869, 2001.
[20]      F. Zhang, Matrix theory: basic results and techniques. Springer Science & Business Media, 2011. 

[21]      L.Ricker, ”Model predictive control of a continuous nonlinear two-phase reactor”. Journal of Process Control, vol. 3, Nov, 1993.
[22]      R.Chaboksawar, Y.Mo and B.Sinopoli, “Detecting integrity attacks on SCADA systems”. Preprints of the 18th IFAC World Congress, Milano, Italy, 2011.