Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory...

47
Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering University of Waterloo Miroslav Pajic, Rahul Mangharam, George Pappas Electrical and Systems Engineering University of Pennsylvania Christoforos Hadjicostis Electrical and Computer Engineering University of Cyprus Collaborators

Transcript of Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory...

Page 1: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Using Structured System Theory

to Identify Malicious Behavior

in Distributed Systems

Shreyas Sundaram Department of Electrical and Computer Engineering

University of Waterloo

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAA

Miroslav Pajic, Rahul Mangharam, George Pappas

Electrical and Systems Engineering University of Pennsylvania

Christoforos Hadjicostis Electrical and Computer Engineering

University of Cyprus

Collaborators

Page 2: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Outline

2

Introduction

Background on Linear and Structured System Theory

Resilient Information Dissemination in Multi-Agent Networks

Designing an Intrusion Detection System for a Wireless Control Network

Page 3: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Distributed Systems and Networks in

Safety-Critical Applications

Airplane Health Monitoring and Management System

Electrical Power Grid

UAV Teams

Credits: Sampigethaya et al. (Digital Avionics Conference 2007), Urban Ecoist, Boeing

Page 4: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Distributed Systems and Networks in

Safety-Critical Applications

Airplane Health Monitoring and Management System

Credits: Sampigethaya et al. (Digital Avionics Conference 2007), Urban Ecoist, Boeing

Electrical Power Grid

UAV Teams

Core requirement: disseminate information through network • quickly, efficiently, reliably, securely, …

Page 5: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Problem Formulation

5

Consider a network with nodes {x1, x2, …, xN} e.g., sensors, computers, robots, “agents”, …

Each node can only interact with certain other nodes

Assume fixed interaction topology in this talk

Page 6: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Function Calculation

Each node xi has some initial value xi[0]

e.g., temperature measurement, position, vote, ...

Some nodes must calculate certain functions of these values

Special cases

Data accumulation: some nodes gather all values

Distributed consensus: all nodes calculate same function

6

?]0[2 ix

?]0[max ix 1.2

-0.3

-4.1

2.2

5.0 7.4

20.1

-6.2

8.5

-1.9

5.9

9.8

-6.3

2.7

3.9

-0.5

2.0 ?]0[ ix

Page 7: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Existing Work on Distributed Function

Calculation

Distributed function calculation schemes well studied over past few decades Flooding, tree-based schemes, gossip, token passing, …

Communication complexity, computational complexity, time complexity, fault tolerance, …

Many excellent books on this topic Dissemination of Information in Communication Networks,

Hromkovic et. al., 2005

Communication Complexity, Kushilevitz and Nisan, 1997

Distributed Algorithms, Lynch, 1997

Elements of Distributed Computing, Garg, 2002

Parallel and Distributed Computation, Bertsekas and Tsitsiklis, 1997

7

Page 8: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Linear Iterative Strategies

Investigate linear iterative strategies for distributed function calculation

At each time-step k, every node updates its value as

Extensively studied for asymptotic consensus For some vector a,

Also studied by communications community: network coding

Survey papers: [Olfati-Saber, Fax & Murray, Proc. IEEE, 2007], [Ren, Beard & Atkins,

Proc. ACC, 2005], [Yeung, Li, Cai, Zhang, 2006]

)(

][][]1[inbrj

jijiiii kxwkxwkx

8

Nikx T

ik

,,2,1],0[][lim

xa

Page 9: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Potential for Incorrect Behavior

9

Here, we ask:

“What happens if some nodes don’t follow the linear iterative strategy?”

Faulty nodes: update their values incorrectly due to hardware faults, or stop working altogether

Malicious nodes: willfully update their values incorrectly to prevent other nodes from calculating functions

Related works: [Jadbabaie, Lin & Morse ’03], [Gupta, Langbort & Murray ’06],

[Pasqualetti, Bicchi & Bullo ’07], [Sundaram & Hadjicostis ’08], [Teixeira, Sandberg & Johansson ’10], [Chapman & Mesbahi ’10]

Page 10: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Building Intuition

Node x1 wants to obtain all initial values via some algorithm

Node x2 is malicious and pretends x3[0] = 9

Node x4 behaves correctly and uses x3[0] = 5

Node x1 doesn’t know who to believe i.e., is node x3’s value equal to 9 or 5?

Node x1 needs another node to act as tie-breaker

10

2]0[1 x

0]0[2 x 5]0[3 x

1]0[4 x

x1

x2 x3

x4

Page 11: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Main Results

11

If network has up to b malicious nodes, we show:

Node xi has 2b or fewer node-disjoint paths from

some node xj

Malicious nodes can update their values in such a way that xi

cannot calculate any function of xj’s initial value

Node xi has 2b+1 or more node-disjoint paths from

every other node

xi can obtain all initial values after running linear strategy for

at most N time-steps with almost any weights

Page 12: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Main Results

12

If network has up to b malicious nodes, we show:

Node xi has 2b or fewer node-disjoint paths from

some node xj

Malicious nodes can update their values in such a way that xi

cannot calculate any function of xj’s initial value

Node xi has 2b+1 or more node-disjoint paths from

every other node

“Easy”

“Tricky”

xi can obtain all initial values after running linear strategy for

at most N time-steps with almost any weights

Page 13: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Using Structured System Theory to Analyze

Linear Iterations

13

To prove resilience, we use the following approach:

Linear strategy is resilient to b malicious

nodes in a given network

A graph has some property “Q”

Original network has connectivity 2b+1

A linear system has some property “P”

(Structured System Theory)

Page 14: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Background on

Linear and Structured

System Theory

Page 15: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Properties of Linear Systems

15

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,

Input: u 2 m

Page 16: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Properties of Linear Systems

16

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,

Input: u 2 m

Page 17: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Properties of Linear Systems

17

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,

Input: u 2 m

Standard Approach: Use algebraic tests to determine if properties hold

Page 18: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Linear Structured Systems

18

System is structured if every entry of the matrices (A,B,C) is either zero, or an independent free parameter

Used to represent and analyze dynamical systems with unknown/uncertain parameters [Lin ‘74, Dion et al., ‘03]

Structured system theory: determines properties of systems based on the zero/nonzero structure of matrices

][][

][][]1[

kCxky

kBukAxkx

mpn uyx ,,

Page 19: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Structural Properties

19

“Structured system has property P”: Property P holds for at least one choice of free parameters in the matrices (A, B, C)

Structural properties are generic!

Use graph based techniques to determine if structural properties hold

Structured system has property P

Structured system will have property P for almost any choice

of free parameters

Page 20: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Example of Structured System and

Associated Graph

20

Structured system can be represented as a graph

Structured system:

Associated graph H:

1 2 7

3 4 5

8

6

0 0 0

0 0 0[ 1] [ ] [ ],

0 0 0 0 0

0 0 0 0 0

x k x k u k

][

000

000

000

][

11

10

9

kxky

1

2

3 4 Output

vertices: Y

State vertices: X

Input

vertices: U

Page 21: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Example: Test for Structural Invertibility

21

Theorem [van der Woude, ’91]:

e.g.,

System is structurally invertible

Graph H has m vertex-disjoint paths from inputs to outputs

J. W. van der Woude, Mathematics of Control Systems and Signals, 1991

1

2

3 4 Output

vertices: Y

State vertices: X

Input

vertices: U

Page 22: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Example: Test for Structural Invertibility

22

Theorem [van der Woude, ’91]:

e.g.,

System is structurally invertible

Graph H has m vertex-disjoint paths from inputs to outputs

J. W. van der Woude, Mathematics of Control Systems and Signals, 1991

1

2

3 4 Output

vertices: Y

State vertices: X

Input

vertices: U

Structurally Invertible

Page 23: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

References on Structured Systems

23

C. T. Lin, “Structural Controllability”, IEEE TAC, 1974

K. J. Reinschke, Multivariable Control: A Graph-Theoretic Approach, 1988

J-M. Dion, C. Commault and J. van der Woude, “Generic Properties and Control of Linear Structured Systems: A Survey”, Automatica, 2003

D. D. Siljak, Decentralized Control of Complex Systems, 1991

Sundaram & Hadjicostis, CDC 2009, ACC 2010 (Structural properties over finite fields, upper bound on generic controllability/observability indices)

Page 24: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Application to Resilient

Information Dissemination

Page 25: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Modeling Faulty/Malicious Behavior in

Linear Iterative Strategies

25

Linear iterative strategy for information dissemination:

Correct update equation for node xi:

Faulty or malicious update by node xi:

fi[k] is an additive error at time-step k

Note: this model allows node xi to update its value in a completely arbitrary manner

)(

][][]1[inbrj

jijiiii kxwkxwkx

( )

[ 1] [ ] [ ] [ ]i ii i ij j i

j nbr i

x k w x k w x k f k

Page 26: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Modeling the Values Seen by Each Node

26

Each node obtains neighbors’ values at each time-step

Let yi[k] = Cix[k] denote values seen by xi at time-step k

Rows of Ci index portions of x[k] available to xi

][

1000

0100

0001

][

][

][

][

3

4

3

1

3 k

kx

kx

kx

k xy

C

For node x3:

x4

x3

x2

x1

Page 27: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Linear Iteration with Faulty/Malicious

Nodes

27

Let S = {xi1, xi2

, …, xib} be set of faulty/malicious nodes

Unknown a priori, but bounded by b

Update equation for entire system:

1

2

1 2

1 11 1 1

1

[ 1] [ ]

[ ]

[ ][ 1] [ ]

[ ]

[ 1] [ ][ ]

[ ] [ ]

b

S

b

S

i

N

i

i i i

N N NN N

ik k

k

i i

f kx k w w x k

f k

x k w w x kf k

k k

B

x W x

f

e e e

y C x

Constraint: weight wij = 0 if node xj is not a neighbor of node xi

Page 28: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Recovering the Initial State

28

System model for linear iteration with malicious nodes

Objective: Recover initial state x[0] from outputs of the system, without knowing fS[k]

Almost equivalent to strong observability of system

The set S is also unknown here

Only know it has at most b elements

[ 1] [ ] [ ]

[ ] [ ]

S S

i i

k k k

k k

x Wx B f

y C x

Page 29: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Recovering the Initial State

29

Want to ensure that the output trajectory uniquely specifies the initial state

Same output trajectory must not be generated by two different initial states and two (possibly) different sets of b malicious nodes

By linearity, can show:

[ 1] [ ] [ ]

[ ] [ ]

S S

i i

k k k

k k

x Wx B f

y C x

Linear system

is strongly observable for

any known set Q of 2b nodes

Can recover initial state in system

for any unknown set S of b nodes

[ 1] [ ] [ ]

[ ] [ ]

Q Q

i i

k k k

k k

x Wx B f

y C x

Page 30: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Structural Strong Observability

30

For any set Q of 2b nodes, strong observability of

is a structural property

Graph of system is given by graph of original network, with additional inputs and outputs

Using tests for structural strong observability, we show:

[ 1] [ ] [ ]

[ ] [ ]

Q Q

i i

k k k

k k

x Wx B f

y C x

xi has 2b+1 node-disjoint paths from every other

node

Above system will be strongly observable for any set Q of 2b

nodes

Page 31: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

By generic nature of structural properties:

How long will each node need to wait before the values that it receives uniquely specifies the initial state?

If a linear system is strongly observable, outputs of system over N time-steps are sufficient to determine initial state

Any node can obtain x[0] after at most N time-steps

Robustness of the Linear Iterative Scheme

31

Network is 2b+1 connected

For almost any W, any node can recover all initial values despite actions

of b malicious nodes

Page 32: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Application to Feedback Control:

Monitoring for Malicious Behavior in a

Wireless Control Network

Page 33: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Control Over Networks

33

Sensors ( )and Actuators ( ) are installed on a plant

Communicate with controllers ( ) over a network

Standard architectures:

Wired Control System Wireless Control System

Network primarily used as a channel

Plant Controller

Plant Controller

Page 34: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Much Work on Networked Control

34

Studied by many researchers

Branicky et al., Elia et al., Gupta et al., Hespanha et al., Martins et al., Murray et al., Nair et al., Seiler et al., Sinopoli et al., Walsh et al., …

Robustness to “network” issues:

Packet dropouts, Bernoulli channel failures

Delays in the feedback loop

Survey paper: Hespanha et al., Proc IEEE, 2007

Page 35: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

The Wireless Control Network (WCN)

35

Idea: Can we use the wireless network itself as a controller? Leverage the computational capability in the network

Desired properties: Lightweight computation - design for resource constrained

nodes

Static transmission schedules

Compositionality

Handles multiple actuation and sensing points

Utility: Network can be used as a backup control mechanism

in case primary controller fails

Uses existing infrastructure, does not require additional hardware

Plant

WCN

Page 36: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Wireless Control Network

36

Plant:

State update procedure, node zi:

Plant update procedure, input i:

Network state vector:

From neighbors From sensors

From actuator’s

neighbors

][][

][][]1[

kk

kkk

Cxy

BuAxx

[ 1] [ ] [ ] [ ]j z j zi i

i ii i ij j ij j

z s

z k w z k w z k h y k

[ ] [ ]j ai

i ij j

z

u k g z k

TN kzkzkzk ][][][][ 21 z

Plant

WCN

Page 37: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Wireless Control Network: A Linear System

37

Network update procedure:

Only elements corresponding to existing links (link

weights) are allowed to be non-zero

][][

][][]1[

21

22221

11211

21

22221

11211

21

22221

11211

k

ggg

ggg

ggg

k

k

hhh

hhh

hhh

k

www

www

www

k

mNmm

N

N

NpNN

p

p

NNNN

N

N

zu

yzz

G

HW

Plant

WCN

Page 38: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Closed Loop System

38

Overall system state:

Closed loop system:

Matrices W, G, H are structured Sparsity constraints imposed by the

WCN topology

A decentralized control problem

^ x [ k ] =

· x [ k ]

z [ k ]

¸

Plant

WCN

Page 39: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Stabilizing the Closed Loop System

39

Problem: Find numerical matrices W, H, G satisfying structural constraints so that

Use a numerical design procedure to determine suitable W, H, G

Based on Linear Matrix Inequalities

Can also be made robust to Bernoulli packet drops

ˆ

A BGA

HC Wis stable

Page 40: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Abnormal Behavior in the Network

40

What if certain nodes in the WCN become faulty or malicious?

Security of control networks in industrial control systems is a major issue [NIST Technical Report, 2008]

Data Historian: Maintain and analyze logs of plant and network behavior

Intrusion Detection System: Detect and identify any abnormal activities

Is it possible to design a Data Historian/Intrusion Detection System for the WCN?

Page 41: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Intrusion Detection System

41

Obvious Solution (?): have IDS listen to transmissions of every node in WCN and double-check whether they are computing correctly

Obviously not satisfactory

Can we get by with listening to the transmissions of only a subset T of the nodes?

Under what conditions?

Which subset should we choose?

Page 42: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Monitored Nodes

42

Denote transmissions of any set T of monitored nodes by

T is a matrix with a single 1 in each row, indicating which elements of z[k] are being monitored

Example:

[ ] [ ]k kt Tz

3 6 3[ ] [ ]xk k

T

t 0 I z

T

z1 z4 z7

z2 z5 z8

z3 z6 z9

source node (plant sensor)

WCN

Page 43: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

System Model with Malicious Nodes

43

As before, linear system model for WCN with set S of malicious nodes:

Objective: Recover y[k], fS[k] and S (initial state z[0] assumed known)

Almost equivalent to invertibility of system

Problem: Don’t know the set of faulty nodes S Assumption: At most b faulty nodes

Must ensure that output sequence cannot be generated by a different y[k] and possibly different set of b malicious nodes

[ 1] [ ] [ ] [ ]

[ ] [ ]

S Sk k k k

k k

z Wz Hy B f

t Tz

Page 44: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Conditions for IDS/Data Historian Design

44

IDS can recover y[k] and

identify up to b faulty

nodes in the network by

monitoring transmissions

of set T

Can recover inputs and set S in system

for any unknown set S of b nodes

Linear system

is invertible for

any known set Q of 2b nodes

There are p+2b node-disjoint

paths from sensors and any set

Q of 2b nodes to set T (generically)

[ ]

[ 1] [ ][ ]

[ ] [ ]

S

S

kk k

k

k k

yz Wz H B

f

t Tz

[ ][ 1] [ ]

[ ]

[ ] [ ]

Q

Q

kk k

k

k k

yz Wz H B

f

t Tz

Page 45: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Suppose we want to identify b = 1 faulty/malicious node and recover the plant outputs in this setting:

Consider set Q = {z1,z2}

Example

45

z1 z4 z7

z5 z8

z3 z6 z9

z2

T p = 1

Q

Page 46: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Example

46

Suppose we want to identify b = 1 faulty/malicious node and recover the plant outputs in this setting:

Consider set Q = {z1,z2} p+2b vertex disjoint paths from sensor and Q to T

Can verify that this holds for any set Q of 2b nodes Can identify any single faulty/malicious node and recover y[k]

z1 z4 z7

z2 z5 z8

z3 z6 z9

T p = 1

Q

Page 47: Using Structured System Theory to Identify …sundara2/talks/struct...Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department

Summary

47

Analyzed linear iterative strategies in networks with malicious nodes

Key tool: structured system theory Provides graph-theoretic analysis of linear systems

Linear iterative strategies for information dissemination: Robust to b malicious nodes if connectivity of network is 2b+1 or

higher (strong observability)

Linear iterative strategies for stabilization with a wireless network IDS can identify b malicious nodes by monitoring a subset of nodes if

those nodes have enough disjoint paths from other nodes (invertibility)