26
Cyber-Physical System Checkpointing and Recovery Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee Department of Computer and Information Science University of Pennsylvania

Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

  • Upload
    others

  • View
    17

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Cyber-Physical System Checkpointing and Recovery

Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee

Department of Computer and Information Science University of Pennsylvania

Page 2: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Cyber-Physical System Checkpointing and Recovery

Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, Insup Lee

Department of Computer and Information Science University of Pennsylvania

Page 3: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

2

Security

Page 4: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

3

CPS Attack Surfaces

Smart Power Grid

•  Cyber attack surfaces -  e.g., communication, networks,

computers, ...

•  Environmental attack surfaces -  e.g., GPS signal, electro-

magnetic interference, ...

•  Physical attack surfaces -  e.g., locks, casings, cables, …

•  Human attack surfaces -  e.g., phishing, blackmail, …

Page 5: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Outline

•  Whatwestudy•  Ouridea:checkpointingandrecovery•  Designforrecovery•  Checkpointingprotocoldesign•  Evaluation

4

Page 6: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

•  The attacker can arbitrarily change sensor measurements

- environmental attack surfaces - cyber attack surfaces

5

What we study and why?

Target: Sensor Attacks

Controller

Physical system

Sens

or

Actu

ator

Network

Malicious signals

Malicious packets

30mi/h 100mi/h

Page 7: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

•  The attacker can arbitrarily change sensor measurements

- environmental attack surfaces - cyber attack surfaces

6

What we study and why?

•  To ensure control performance with sensor attacks

Target: Sensor Attacks

Goal: Resilience

Controller

Physical system

Sens

or

Actu

ator

Network

Malicious signals

Malicious packets

Page 8: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

7

Ideally…

•  Ideally, the system performs (almost) the same as if there is no attack -  Example: cruise control under a speed sensor attack

Speed sensor attack

Page 9: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

8

How sensor attacks affect control?

Controller

Sensor Actuator

1.  A sensor attack or fault occurs

Physical system

4. The actuator performs the misled actuation

5. The physical system drifts off

Page 10: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

9

Limitations of Existing Approaches

•  Existing approaches rely on sensor redundancy -  Multiple sensors (partially) measure the same

physical variables

•  Existing approaches limit the number of compromised sensors -  E.g., less than half of the total number of sensors

In question: how to handle the case that violates these limitations?

Page 11: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Outline

•  Whatwestudy•  Ouridea:checkpointingandrecovery•  Designforrecovery•  Checkpointingprotocoldesign•  Evaluation

10

Page 12: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

11

My idea: checkpointing and recovery

Controller

Sensor Actuator Physical system

•  Recovery: restore the system so that state estimations /predictions correctly reflect the system’s physical states

Advantage: no need to modify the controller

Page 13: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

12

•  It is often infeasible to roll back a CPS system

- e.g., power flow in the power grid - irreversible processes

Can we apply roll-back recovery directly?

Page 14: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

13

- e.g., speed sensor attack

•  Physically rolling back physical states incurs considerable overhead and usually unnecessary

Can we apply roll-back recovery directly?

-- desired speed

Roll-back

Better

•  It is often infeasible to roll back a CPS system

- e.g., power flow in the power grid - irreversible processes

Page 15: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Outline

•  Whatwestudy•  Ouridea:checkpointingandrecovery•  Designforrecovery•  Checkpointingprotocoldesign•  Evaluation

14

Page 16: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

15

Physical-State Recovery: Rolling the system to the current time by starting from a consistent global physical-state.

Propose roll-forward recovery

Estimated speed

Prediction using historical state

Page 17: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

•  Idea: model-based prediction

16

How does it work?

Step 1: predict the current state

Step 2: recover the faulty state

By prediction (step 1, 2)

Unchanged

E.g., A linear time-invariant system

Page 18: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Outline

•  Whatwestudy•  Ouridea:checkpointingandrecovery•  Designforrecovery•  Checkpointingprotocoldesign•  Evaluation

17

Page 19: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

18

What kind of states is used?

Cyber state: logical consistency

Message send-receive

Physical state: timed consistency

Difference of timestamp

Page 20: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

19

Which consistent state is used?

•  States that pass detection can be used for recovery •  Attack detection usually has substantial delay •  States during the detection interval may be incorrect

detection window

? ?

used for recovery pending detection

•  Idea: use states outside detection window for recovery

Page 21: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

20

Checkpointing CPS

•  A sliding window based protocol

detection window

? ? … ? ?

buffered states deleted states the stored state

buffered states the stored state

deleted states

•  Step 1: states are buffered, before passing the detection •  Step 2: the state is stored, after passing the detection •  Step 3: stored states are discarded, if no longer needed

Page 22: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

time

21

The overall system design

attacked

recovery NO

recovered YES NO

YES

?

Controller

Physical system

checkpointing

Normal operation Recovery

• Recovery-based control: predict future states based on the recovered state

prediction

Recovery-based control

Page 23: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

Outline

•  Whatwestudy•  Ouridea:checkpointingandrecovery•  Designforrecovery•  Checkpointingprotocoldesign•  Evaluation

22

Page 24: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

23

Scenario: lane keep

•  Testbed: an unmanned vehicle. Each front wheel is driven by a motor, and each motor has a speed sensor

•  Goal: to keep a vehicle travel in a straight line, i.e., the two front wheels have the same speed

•  Controller: a PID controller supervises and controls the speed difference of the two front wheels

•  Attack: the attacker modifies a speed sensor’s measurements to a constant value

Page 25: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

24

How well does it work?

No protection

With protection

spee

d di

ffer

ence

sp

eed

differ

ence

recovery

large

The vehicle keeps turning

small

The vehicle travels almost straightly

Page 26: Cyber-Physical System Checkpointing and Recoveryiot.stanford.edu/nsf-final/slides/sitp-nsf-final-checkpointing.pdf · Cyber-Physical System Checkpointing and Recovery Fanxin Kong,

25

Summary

•  Goal: Securing Cyber-Physical Systems

•  CPS Checkpointing and Recovery

•  A Roll-forward Recovery

•  A Sliding-Window Based Checkpointing Protocol

•  Case Study: Sensor Attacks on Automobiles

Thank you!