kth.sePublications
Change search
Link to record
Permanent link

Direct link
Teixeira, André, Associate ProfessorORCID iD iconorcid.org/0000-0001-5491-4068
Alternative names
Publications (10 of 33) Show all publications
Herdeiro Teixeira, A., Sandberg, H. & Johansson, K. H. (2016). Strategic stealthy attacks: The output-to-output ℓ2-gain. In: Proceedings of the IEEE Conference on Decision and Control: . Paper presented at 54th IEEE Conference on Decision and Control, CDC 2015, 15 December 2015 through 18 December 2015 (pp. 2582-2587). IEEE conference proceedings
Open this publication in new window or tab >>Strategic stealthy attacks: The output-to-output ℓ2-gain
2016 (English)In: Proceedings of the IEEE Conference on Decision and Control, IEEE conference proceedings, 2016, p. 2582-2587Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems. In particular, the threat scenarios tackled in the paper consider adversaries that aim at deteriorating the system's performance by maximizing the corresponding quadratic cost function, while remaining stealthy with respect to anomaly detectors. As opposed to other work in the literature, the effect of the adversary's actions on the anomaly detector's output is not constrained to be zero at all times. Moreover, scenarios where the adversary has uncertain model knowledge are also addressed. The set of strategic attack policies is formulated as a non-convex constrained optimization problem, leading to a sensitivity metric denoted as the output-to-output ℓ2-gain. Using the framework of dissipative systems, the output-to-output gain is computed through an equivalent convex optimization problem. Additionally, we derive necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2016
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-188288 (URN)10.1109/CDC.2015.7402605 (DOI)000381554502131 ()2-s2.0-84962010138 (Scopus ID)9781479978861 (ISBN)
Conference
54th IEEE Conference on Decision and Control, CDC 2015, 15 December 2015 through 18 December 2015
Note

QC 20160613

Available from: 2016-06-13 Created: 2016-06-09 Last updated: 2024-03-18Bibliographically approved
Teixeira, A., Shames, I., Sandberg, H. & Johansson, K. H. (2015). A Secure Control Framework for Resource-Limited Adversaries. Automatica, 51(1), 135-148
Open this publication in new window or tab >>A Secure Control Framework for Resource-Limited Adversaries
2015 (English)In: Automatica, ISSN 0005-1098, E-ISSN 1873-2836, Vol. 51, no 1, p. 135-148Article in journal (Refereed) Published
Abstract [en]

Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this paper. An attack space dened bythe adversary's model knowledge, disclosure, and disruption resources is introduced. Adversaries constrained by these resourcesare modeled for a networked control system architecture. It is shown that attack scenarios corresponding to denial-of-service,replay, zero-dynamics, and bias injection attacks on linear time-invariant systems can be analyzed using this framework.Furthermore, the attack policy for each scenario is described and the attack's impact is characterized using the concept ofsafe sets. An experimental setup based on a quadruple-tank process controlled over a wireless network is used to illustrate theattack scenarios, their consequences, and potential counter-measures.

Keywords
Attack space, Cyber-physical systems, Secure control systems, System security
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-159725 (URN)10.1016/j.automatica.2014.10.067 (DOI)000348015500017 ()2-s2.0-84920703223 (Scopus ID)
Funder
EU, FP7, Seventh Framework Programme, 608224Swedish Research Council, 2009-4565; 2013-5523Knut and Alice Wallenberg Foundation
Note

QC 20150220

Available from: 2015-02-09 Created: 2015-02-09 Last updated: 2022-06-23Bibliographically approved
Teixeira, A., Kupzog, F., Sandberg, H. & Johansson, K. H. (2015). Cyber-Secure and Resilient Architectures for Industrial Control Systems. In: Smart Grid Security: Innovative Solutions for a Modernized Grid: (pp. 149-183). Elsevier
Open this publication in new window or tab >>Cyber-Secure and Resilient Architectures for Industrial Control Systems
2015 (English)In: Smart Grid Security: Innovative Solutions for a Modernized Grid, Elsevier, 2015, p. 149-183Chapter in book (Other academic)
Abstract [en]

In this chapter, we survey cyber security solutions for control and monitoring systems that are used to manage the Smart Grid. We start with a short review of the history and use of Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems, and how cyber security in control systems has recently become a major concern, in the wake of the Stuxnet and other recently discovered malware. We follow up with surveying information technology and control-centric security tools that can be used to improve the resilience of industrial control systems. Feedback control loops are core components in the Smart Grid, as they enable the maximal utilization of the physical infrastructure and its resources. As the number of control loops in the Smart Grid increases, the cyber security challenges faced by ICSs become increasingly important within the Smart Grid's context. To highlight such novel challenges, we give an overview of the envisioned control loops in future Smart Grids, and discuss the potential impact of cyber threats targeting critical Smart Grid functionalities. As a case study, false-data injection attacks on power transmission networks are considered. The level of resilience to such attacks is assessed through a control-centric risk assessment methodology, which is also used for allocating the deployment of more modern and secure equipment. The chapter ends with a discussion of future research challenges in the area.

Place, publisher, year, edition, pages
Elsevier, 2015
Keywords
Industrial Control Systems, Resilient Control, Risk Assessment, Security
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-181190 (URN)10.1016/B978-0-12-802122-4.00006-7 (DOI)2-s2.0-84943177049 (Scopus ID)
Note

Part of ISBN 978-012802354-9, 978-012802122-4

QC 20241210

Available from: 2016-02-16 Created: 2016-01-29 Last updated: 2024-12-10Bibliographically approved
Ghadimi, E., Teixeira, A., Shames, I. & Johansson, M. (2015). Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems. IEEE Transactions on Automatic Control, 60(3), 644-658, Article ID 6892987.
Open this publication in new window or tab >>Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems
2015 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 60, no 3, p. 644-658, article id 6892987Article in journal (Refereed) Published
Abstract [en]

The alternating direction method of multipliers (ADMM) has emerged as a powerful technique for large-scale structured optimization. Despite many recent results on the convergence properties of ADMM, a quantitative characterization of the impact of the algorithm parameters on the convergence times of the method is still lacking. In this paper we find the optimal algorithm parameters that minimize the convergence factor of the ADMM iterates in the context of l2-regularized minimization and constrained quadratic programming. Numerical examples show that our parameter selection rules significantly outperform existing alternatives in the literature.

Place, publisher, year, edition, pages
IEEE Press, 2015
Keywords
Algorithms, Optimization, Quadratic programming
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-159885 (URN)10.1109/TAC.2014.2354892 (DOI)000350206000004 ()2-s2.0-84923620364 (Scopus ID)
Funder
Swedish Foundation for Strategic Research Swedish Research Council
Note

QC 20150407

Available from: 2015-02-10 Created: 2015-02-10 Last updated: 2024-03-15Bibliographically approved
Teixeira, A., Sou, K. C., Sandberg, H. & Johansson, K. H. (2015). Secure control systems: A quantitative risk management approach. IEEE Control Systems, 35(1), 24-45
Open this publication in new window or tab >>Secure control systems: A quantitative risk management approach
2015 (English)In: IEEE Control Systems, ISSN 1066-033X, Vol. 35, no 1, p. 24-45Article in journal (Refereed) Published
Abstract [en]

Critical infrastructures must continuously operate safely and reliably, despite a variety of potential system disturbances. Given their strict operating requirements, such systems are automated and controlled in real time by several digital controllers receiving measurements from sensors and transmitting control signals to actuators. Since these physical systems are often spatially distributed, there is a need for information technology (IT) infrastructures enabling the timely data flow between the system components. These networked control systems are ubiquitous in modern societies [1]. Examples include the electric power network, intelligent transport systems, and industrial processes.

Keywords
Communication networks, Computer crime, Computer security, Detectors, Networked control systems, Power systems planning, Risk management
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-159728 (URN)10.1109/MCS.2014.2364709 (DOI)000348209200009 ()2-s2.0-84921522090 (Scopus ID)
Funder
Swedish Research Council, 2009-4565, 2013-5523EU, FP7, Seventh Framework Programme, 608224Knut and Alice Wallenberg Foundation
Note

QC 20150216

Available from: 2015-02-09 Created: 2015-02-09 Last updated: 2022-06-23Bibliographically approved
Teixeira, A., Paridari, K., Sandberg, H. & Johansson, K. H. (2015). Voltage control for interconnected microgrids under adversarial actions. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA: . Paper presented at 20th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2015, 8 September 2015 through 11 September 2015. IEEE conference proceedings
Open this publication in new window or tab >>Voltage control for interconnected microgrids under adversarial actions
2015 (English)In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, IEEE conference proceedings, 2015Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we study the impact of adversarial actions on voltage control schemes in interconnected microgrids. Each microgrid is abstracted as a power inverter that can be controlled to regulate its voltage magnitude and phase-angle independently. Moreover, each power inverter is modeled as a single integrator, whose input is given by a voltage droop-control policy that is computed based on voltage magnitude and reactive power injection measurements. Under mild assumptions, we then establish important properties of the nominal linearized closed-loop system, such as stability, positivity, and diagonal dominance. These properties play an important role when characterizing the potential impact of different attack scenarios. In particular, we discuss two attack scenarios where the adversary corrupts measurement data and reference signals received by the voltage droop controllers. The potential impact of instances of each scenario is analyzed using control-theoretic tools, which may be used to develop methodologies for identifying high-risk attack scenarios, as is illustrated by numerical examples.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2015
Keywords
Inverters, Microgrids, Power system dynamics, Power system stability, Stability analysis, Voltage control, Voltage measurement, Closed loop systems, Electric inverters, Electric power distribution, Factory automation, Risk perception, Diagonal dominance, Linearized closed-loop systems, Micro grid, Reactive power injections, Voltage magnitude, System stability
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-181134 (URN)10.1109/ETFA.2015.7301476 (DOI)000378564800077 ()2-s2.0-84952921173 (Scopus ID)9781467379298 (ISBN)
Conference
20th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2015, 8 September 2015 through 11 September 2015
Funder
Swedish Research Council
Note

QC 20160216

Available from: 2016-02-16 Created: 2016-01-29 Last updated: 2024-03-18Bibliographically approved
Araújo, J., Teixeira, A., Henriksson, E. & Johansson, K. H. (2014). A down-sampled controller to reduce network usage with guaranteed closed-loop performance. In: Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on: . Paper presented at 53rd IEEE Conference on Decision and Control,15-17 Dec. 2014 , Los Angeles, USA (pp. 6849-6856). IEEE conference proceedings
Open this publication in new window or tab >>A down-sampled controller to reduce network usage with guaranteed closed-loop performance
2014 (English)In: Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on, IEEE conference proceedings, 2014, p. 6849-6856Conference paper, Published paper (Refereed)
Abstract [en]

We propose and evaluate a down-sampled controller which reduces the network usage while providing a guaranteed desired linear quadratic control performance. This method is based on fast and slow sampling intervals, as the closed-system benefits by being brought quickly to steady-state conditions while behaving satisfactorily when being actuated at a slow rate once at those conditions. This mechanism is shown to provide large savings with respect to network usage when compared to traditional periodic time-triggered control and other aperiodic controllers proposed in the literature.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2014
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-159702 (URN)10.1109/CDC.2014.7040465 (DOI)000370073807006 ()2-s2.0-84988290586 (Scopus ID)978-1-4799-7746-8 (ISBN)
Conference
53rd IEEE Conference on Decision and Control,15-17 Dec. 2014 , Los Angeles, USA
Note

QC 20150223

Available from: 2015-02-09 Created: 2015-02-09 Last updated: 2024-03-18Bibliographically approved
Juelsgaard, M., Teixeira, A., Johansson, M., Wisniewski, R. & Bendtsen, J. (2014). Distributed Coordination of Household Electricity Consumption. In: 2014 IEEE Conference on Control Applications, CCA 2014: . Paper presented at 2014 IEEE Conference on Control Applications, CCA 2014; Juan Les Antibes; France; 8 October 2014 through 10 October 2014 (pp. 33-40). IEEE
Open this publication in new window or tab >>Distributed Coordination of Household Electricity Consumption
Show others...
2014 (English)In: 2014 IEEE Conference on Control Applications, CCA 2014, IEEE , 2014, p. 33-40Conference paper, Published paper (Refereed)
Abstract [en]

This work presents a distributed framework for coordination of flexible electricity consumption for a number of households in the distribution grid. Coordination is conducted with the purpose of minimizing a trade-off between individual concerns about discomfort and electricity cost, on the one hand, and joint concerns about grid losses and voltage variations on the other. Our contribution is to demonstrate how distributed coordination of both active and reactive consumption may be conducted, when consumers are jointly coupled by grid losses and voltage variations. We further illustrate the benefit of including consumption coordination for grid operation, and how different types of consumption present different benefits.

Place, publisher, year, edition, pages
IEEE, 2014
Series
IEEE International Conference on Control Applications, ISSN 1085-1992
Keywords
Distributed coordination, Distributed framework, Distribution grid, Electricity costs, Electricity-consumption, Grid operation, Household electricity consumption, Voltage variation
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-159707 (URN)10.1109/CCA.2014.6981325 (DOI)000366055800006 ()2-s2.0-84920507760 (Scopus ID)9781479974092 (ISBN)
Conference
2014 IEEE Conference on Control Applications, CCA 2014; Juan Les Antibes; France; 8 October 2014 through 10 October 2014
Note

QC 20150410

Available from: 2015-02-09 Created: 2015-02-09 Last updated: 2024-03-15Bibliographically approved
Teixeira, A., Shames, I., Sandberg, H. & Johansson, K. H. (2014). Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties. IEEE Transactions on Cybernetics, 44(11), 2024-2037
Open this publication in new window or tab >>Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties
2014 (English)In: IEEE Transactions on Cybernetics, ISSN 2168-2267, E-ISSN 2168-2275, Vol. 44, no 11, p. 2024-2037Article in journal (Refereed) Published
Abstract [en]

The ability to maintain state awareness in the face of unexpected and unmodeled errors and threats is a defining feature of a resilient control system. Therefore, in this paper, we study the problem of distributed fault detection and isolation (FDI) in large networked systems with uncertain system models. The linear networked system is composed of interconnected subsystems and may be represented as a graph. The subsystems are represented by nodes, while the edges correspond to the interconnections between subsystems. Considering faults that may occur on the interconnections and subsystems, as our first contribution, we propose a distributed scheme to jointly detect and isolate faults occurring in nodes and edges of the system. As our second contribution, we analyze the behavior of the proposed scheme under model uncertainties caused by the addition or removal of edges. Additionally, we propose a novel distributed FDI scheme based on local models and measurements that is resilient to changes outside of the local subsystem and achieves FDI. Our third contribution addresses the complexity reduction of the distributed FDI method, by characterizing the minimum amount of model information and measurements needed to achieve FDI and by reducing the number of monitoring nodes. The proposed methods can be fused to design a scalable and resilient distributed FDI architecture that achieves local FDI despite unknown changes outside the local subsystem. The proposed approach is illustrated by numerical experiments on the IEEE 118-bus power network benchmark.

Place, publisher, year, edition, pages
IEEE Press, 2014
Keywords
Fault diagnosis, multi-agent systems, networked control systems, power systems
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:kth:diva-155775 (URN)10.1109/TCYB.2014.2350335 (DOI)000343319700004 ()25222962 (PubMedID)2-s2.0-84908269867 (Scopus ID)
Funder
Swedish Research Council, 2009-4565 2013-5523Swedish Foundation for Strategic Research Knut and Alice Wallenberg Foundation
Note

QC 20141114

Available from: 2014-11-14 Created: 2014-11-13 Last updated: 2022-06-23Bibliographically approved
Farokhi, F., Teixeira, A. M. H. & Langbort, C. (2014). Gaussian Cheap Talk Game with Quadratic Cost Functions: When Herding Between Strategic Senders is a Virtue. In: 2014 AMERICAN CONTROL CONFERENCE (ACC): . Paper presented at American Control Conference, DEC 04-06, 2014, Portland, OR.
Open this publication in new window or tab >>Gaussian Cheap Talk Game with Quadratic Cost Functions: When Herding Between Strategic Senders is a Virtue
2014 (English)In: 2014 AMERICAN CONTROL CONFERENCE (ACC), 2014Conference paper, Published paper (Refereed)
Abstract [en]

We consider a Gaussian cheap talk game with quadratic cost functions. The cost function of the receiver is equal to the estimation error variance, however, the cost function of each senders contains an extra term which is captured by its private information. Following the cheap talk literature, we model this problem as a game with asymmetric information. We start by the single sender case in which the receiver also has access to a noisy but honest side information in addition to the message transmitted by a strategic sender. We generalize this setup to multiple sender case. For the multiple sender case, we observe that if the senders are not herding (i. e., copying each other policies), the quality of the receiver's estimation degrades rapidly as the number of senders increases.

Series
Proceedings of the American Control Conference, ISSN 0743-1619
Keywords
Agents-based systems, Estimation, Networked control systems
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-162011 (URN)10.1109/ACC.2014.6859123 (DOI)000346492602135 ()2-s2.0-84905676968 (Scopus ID)978-1-4799-3274-0 (ISBN)
Conference
American Control Conference, DEC 04-06, 2014, Portland, OR
Note

QC 20150327

Available from: 2015-03-27 Created: 2015-03-20 Last updated: 2024-03-18Bibliographically approved
Projects
Analysis and design of secure and resilient control systems [2018-04396_VR]; Uppsala UniversityResilience, Safety, and Security in Tree-structured Civil Networks [2021-06316_VR]; Uppsala UniversityProbabilistic Methods for Secure Learning and Control [2023-05234_VR]; Uppsala UniversitySOCRATES: Sensor and actuator selection for learning, estimation and control of fractional dynamical networks [2023-05178_VR]; Uppsala University
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5491-4068

Search in DiVA

Show all publications