Cyber-Physical System Checkpointing and Recovery Fanxin Kong , Meng - - PowerPoint PPT Presentation

cyber physical system checkpointing and recovery
SMART_READER_LITE
LIVE PREVIEW

Cyber-Physical System Checkpointing and Recovery Fanxin Kong , Meng - - PowerPoint PPT Presentation

Cyber-Physical System Checkpointing and Recovery Fanxin Kong , Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania Cyber-Physical System Checkpointing and Recovery Fanxin


slide-1
SLIDE 1

Cyber-Physical System Checkpointing and Recovery

Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee

Department of Computer and Information Science University of Pennsylvania

slide-2
SLIDE 2

Cyber-Physical System Checkpointing and Recovery

Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee

Department of Computer and Information Science University of Pennsylvania

slide-3
SLIDE 3

2 Security

slide-4
SLIDE 4

3

CPS Attack Surfaces

Smart Power Grid

  • Cyber attack surfaces
  • e.g., communication, networks,

computers, ...

  • Environmental attack surfaces
  • e.g., GPS signal, electro-

magnetic interference, ...

  • Physical attack surfaces
  • e.g., locks, casings, cables, …
  • Human attack surfaces
  • e.g., phishing, blackmail, …
slide-5
SLIDE 5

Outline

  • What we study
  • Our idea: checkpointing and recovery
  • Design for recovery
  • Checkpointing protocol design
  • Evaluation

4

slide-6
SLIDE 6
  • The attacker can arbitrarily

change sensor measurements

  • environmental attack surfaces
  • cyber attack surfaces

5

What we study and why?

Target: Sensor Attacks

Controller Physical system Sensor Actuator Network Malicious signals Malicious packets 30mi/h 100mi/h

slide-7
SLIDE 7
  • The attacker can arbitrarily

change sensor measurements

  • environmental attack surfaces
  • cyber attack surfaces

6

What we study and why?

  • To ensure control performance

with sensor attacks

Target: Sensor Attacks Goal: Resilience

Controller Physical system Sensor Actuator Network Malicious signals Malicious packets

slide-8
SLIDE 8

7

Ideally…

  • Ideally, the system performs (almost) the same as if

there is no attack

  • Example: cruise control under a speed sensor attack

Speed sensor attack

slide-9
SLIDE 9

8

How sensor attacks affect control?

Controller Sensor Actuator

  • 1. A sensor attack or fault occurs

Physical system

  • 4. The actuator performs the misled actuation
  • 5. The physical system drifts off
slide-10
SLIDE 10

9

Limitations of Existing Approaches

  • Existing approaches rely on sensor redundancy
  • Multiple sensors (partially) measure the same

physical variables

  • Existing approaches limit the number of

compromised sensors

  • E.g., less than half of the total number of sensors

In question: how to handle the case that violates these limitations?

slide-11
SLIDE 11

Outline

  • What we study
  • Our idea: checkpointing and recovery
  • Design for recovery
  • Checkpointing protocol design
  • Evaluation

10

slide-12
SLIDE 12

11

My idea: checkpointing and recovery

Controller Sensor Actuator Physical system

  • Recovery: restore the system so that state estimations /

predictions correctly reflect the system’s physical states Advantage: no need to modify the controller

slide-13
SLIDE 13

12

  • It is often infeasible to roll back a CPS system
  • e.g., power flow in the power grid
  • irreversible processes

Can we apply roll-back recovery directly?

slide-14
SLIDE 14

13

  • e.g., speed sensor attack
  • Physically rolling back physical states incurs

considerable overhead and usually unnecessary

Can we apply roll-back recovery directly?

  • - desired speed

Roll-back Better

  • It is often infeasible to roll back a CPS system
  • e.g., power flow in the power grid
  • irreversible processes
slide-15
SLIDE 15

Outline

  • What we study
  • Our idea: checkpointing and recovery
  • Design for recovery
  • Checkpointing protocol design
  • Evaluation

14

slide-16
SLIDE 16

15

Physical-State Recovery: Rolling the system to the current time by starting from a consistent global physical-state.

Propose roll-forward recovery

Estimated speed Prediction using historical state

slide-17
SLIDE 17
  • Idea: model-based prediction

16

How does it work?

Step 1: predict the current state Step 2: recover the faulty state

By prediction (step 1, 2) Unchanged

E.g., A linear time-invariant system

slide-18
SLIDE 18

Outline

  • What we study
  • Our idea: checkpointing and recovery
  • Design for recovery
  • Checkpointing protocol design
  • Evaluation

17

slide-19
SLIDE 19

18

What kind of states is used?

Cyber state: logical consistency Message send-receive Physical state: timed consistency Difference

  • f timestamp
slide-20
SLIDE 20

19

Which consistent state is used?

  • States that pass detection can be used for recovery
  • Attack detection usually has substantial delay
  • States during the detection interval may be incorrect

detection window ? ?

used for recovery pending detection

  • Idea: use states outside detection window for recovery
slide-21
SLIDE 21

20

Checkpointing CPS

  • A sliding window based protocol

detection window

? ? … ? ?

buffered states deleted states the stored state buffered states the stored state deleted states

  • Step 1: states are buffered, before passing the detection
  • Step 2: the state is stored, after passing the detection
  • Step 3: stored states are discarded, if no longer needed
slide-22
SLIDE 22

time

21

The overall system design

attacked recovery NO recovered YES NO YES

?

Controller Physical system checkpointing

Normal operation Recovery

  • Recovery-based control: predict future states based on the recovered state

prediction

Recovery-based control

slide-23
SLIDE 23

Outline

  • What we study
  • Our idea: checkpointing and recovery
  • Design for recovery
  • Checkpointing protocol design
  • Evaluation

22

slide-24
SLIDE 24

23

Scenario: lane keep

  • Testbed: an unmanned vehicle. Each

front wheel is driven by a motor, and each motor has a speed sensor

  • Goal: to keep a vehicle travel in a

straight line, i.e., the two front wheels have the same speed

  • Controller: a PID controller supervises and controls

the speed difference of the two front wheels

  • Attack: the attacker modifies a speed sensor’s

measurements to a constant value

slide-25
SLIDE 25

24

How well does it work?

No protection With protection

speed difference speed difference

recovery large

The vehicle keeps turning

small

The vehicle travels almost straightly

slide-26
SLIDE 26

25

Summary

  • Goal: Securing Cyber-Physical Systems
  • CPS Checkpointing and Recovery
  • A Roll-forward Recovery
  • A Sliding-Window Based Checkpointing Protocol
  • Case Study: Sensor Attacks on Automobiles

Thank you!