Award Abstract # 1238959
CPS: Frontiers: Collaborative Research: Foundations of Resilient CybEr-Physical Systems (FORCES)

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: VANDERBILT UNIVERSITY
Initial Amendment Date: April 10, 2013
Latest Amendment Date: April 10, 2013
Award Number: 1238959
Award Instrument: Standard Grant
Program Manager: David Corman
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: April 15, 2013
End Date: March 31, 2019 (Estimated)
Total Intended Award Amount: $1,945,299.00
Total Awarded Amount to Date: $1,945,299.00
Funds Obligated to Date: FY 2013 = $1,945,299.00
History of Investigator:
  • Xenofon Koutsoukos (Principal Investigator)
    xenofon.koutsoukos@vanderbilt.edu
  • Janos Sztipanovits (Co-Principal Investigator)
  • Gabor Karsai (Co-Principal Investigator)
Recipient Sponsored Research Office: Vanderbilt University
110 21ST AVE S
NASHVILLE
TN  US  37203-2416
(615)322-2631
Sponsor Congressional District: 05
Primary Place of Performance: Vanderbilt University
1025 16th Avenue South
Nashville
TN  US  37212-2328
Primary Place of Performance
Congressional District:
05
Unique Entity Identifier (UEI): GTNBNWXJ12D5
Parent UEI:
NSF Program(s): Information Technology Researc
Primary Program Source: 01001314DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7918
Program Element Code(s): 164000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This NSF Cyber-Physical Systems (CPS) Frontiers project "Foundations Of Resilient CybEr-physical Systems (FORCES)" focuses on the resilient design of large-scale networked CPS systems that directly interface with humans. FORCES aims to pr ovide comprehensive tools that allow the CPS designers and operators to combine resilient control (RC) algorithms with economic incentive (EI) schemes.

Scientific Contributions
The project is developing RC tools to withstand a wide-range of attacks and faults; learning and control algorithms which integrate human actions with spatio-temporal and hybrid dynamics of networked CPS systems; and model-based design to assure semantically consistent representations across all branches of the project. Operations of networked CPS systems naturally depend on the systemic social institutions and the individual deployment choices of the humans who use and operate them. The presence of incomplete and asymmetric information among these actors leads to a gap between the individually and socially optimal equilibrium resiliency levels. The project is developing EI schemes to reduce this gap. The core contributions of the FORCES team, which includes experts in control systems, game theory, and mechanism design, are the foundations for the co-design of RC and EI schemes and technological tools for implementing them.

Expected Impacts
Resilient CPS infrastructure is a critical National Asset. FORCES is contributing to the development of new Science of CPS by being the first project that integrates networked control with game theoretic tools and the economic incentives of human decision makers for resilient CPS design and operation. The FORCES integrated co-design philosophy is being validated on two CPS domains: electric power distribution and consumption, and transportation networks. These design prototypes are being tested in real world scenarios. The team's research efforts are being complemented by educational offerings on resilient CPS targeted to a large and diverse audience.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 46)
Abdel-Aziz, Hamzah and Koutsoukos, Xenofon "Data-driven online learning and reachability analysis of stochastic hybrid systems for smart buildings" Cyber-Physical Systems , v.5 , 2019 , p.41--64
A. Laszka and W. Abbas and X. Koutsoukos "Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays" IEEE Communications Letters , v.PP , 2017 , p.1-1 10.1109/LCOMM.2017.2648782
Amin Ghafouri and Xenofon Koutsoukos "Vulnerability of Fixed-Time Control of Signalized Intersections to Cyber-Tampering" 9th International Symposium on Resilient Control Systems , 2016
Amin Ghafouri, Aron Laszka, Abhishek Dubey, and Xenofon Koutsoukos "Optimal Detection of Fault Traffic Sensors Used in Route Planning" 2nd International Workshop on Science of Smart City Operations and Platforms Engineering (SCOPE) , 2017
Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. "Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments" 2016 Conference on Decision and Game Theory for Security (GameSec 2016) , 2016
Amin Ghafouri, Yevgeniy Vorobeychik and Xenofon Koutsoukos "Adversarial Regression for Generating Stealthy Attacks Against Cyber-Physical Systems" Symposium on Integrating Representation, Learning, and Execution for Goal Directed Autonomy, AAAI Spring Symposium Series 2018 , 2018
Anibal Bergon, Matthew Daigle, Indranil Roychoudhury, Gautam Biswas, Xenofon Koutsoukos, and Belarmino Pulido "An Event-based Distributed Diagnosis Framework using Structural Model Decomposition" Artificial Intelligence , v.210 , 2014 , p.1
Aron Laszka and Galina Schwartz "Becoming Cybercriminals: Incentives in Networks with Interdependent Security" 7th Conference on Decision and Game Theory for Security (GameSec) , 2016
Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, and Xenofon Koutsoukos "Vulnerability of Transportation Networks to Traffic-Signal Tampering" ACM/IEEE 7th International Conference on Cyber-Physical Systems , 2016
Aron Laszka, Jian Lou, and Yevgeniy Vorobeychik "Multi-defender strategic filtering against spear-phishing attacks" Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16) , 2016
Aron Laszka, Waseem Abbas, Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. "Optimal Thresholds for Intrusion Detection Systems" 2016 Symposium and Bootcamp on the Science of Security (HotSoS'16) , 2016
(Showing: 1 - 10 of 46)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

According to one of the widely accepted definitions, cyber-physical systems (CPS) are engineered systems where functionality emerges from the networked interaction of computational and physical processes. Complex CPS abound in modern society and it is not surprising that many of these systems are safety and mission critical that makes them a target for attacks. Even under normal conditions, CPS face complex issues crosscutting many disciplines with significant implications on essential system functions. Adding cyber-attacks in all their insidious variety creates a massive challenge that cannot be neglected due to the potential consequences.

Because of its significance, security and resilience have attracted considerable attention in many CPS application domains. Because of the heterogeneity and complexity, methodologies that improve CPS security are very diverse with different objectives, specifications, and constraints resulting in a broad body of knowledge. Research efforts are starting to use scientific methods and results to shape technology, practice, and policy in protecting systems from attackers, detecting intrusions, and recovering from compromises. Beyond the complex structure and interactions, security and resilience properties emerge from complex interrelationships, they are not explained by understanding the individual elements of the system, and are highly dynamic in response to changing environment and circumstances.

The objective in this NSF Frontier project is to develop the foundations of secure and resilient CPS. The Vanderbilt team, in particular, focused on the following research areas: (1) Robust monitoring, diagnosis, and networked control, (2) Learning and control for resilience, (3) Threat assessment and diagnostics, and (4) System-security co-design. The developed approaches build upon our strengths on model-based design and system and game theory. The overall objective has been to develop integrated solutions that increase our understanding of complex interrelationships in CPS and allow design of defense strategies that improve security and resilience.

The team accomplished the following key results in the project:

1.  Developed and evaluated a game theoretic framework for attack and anomaly detection in CPS. The novelty of the approach lies on incorporating dynamical models of CPS including invariant constraints such as energy and traffic flow as well as data driven component models. The results have been demonstrated using case studies of water distribution systems, process control systems, and transportation networks.

2.  Developed resilient distributed control and coordination algorithms in the presence of malicious agents.  Innovations in this area include the use of trusted nodes for improving resilience of consensus algorithms multi-agent systems and resilient distributed diffusion for multi-task state estimation that can be used for tracking multiple targets.

3.  Developed learning and control methods to improve resilience in CPS that include methods for sensor selection and placement in adversarial setting in the context of transportation networks and water distribution systems, decentralized resilient traffic light control, stochastic message authentication for integrity assurance of resource constraint systems, and integrative methods that combine redundancy, diversity, and hardening for improving security and resilience.

4.  Develop languages and tools for threat and attack modeling in CPS in order to understand the impact of cyber attacks to system performance and operation. The tools allow the representation of novel attack models and the characterization of the actions of that are needed to compromise the operation of the CPS.  The threat and attack models developed were used for vulnerability analysis of transportation networks and power systems.

5.  Developed a suite of methods for system-security co-design using a model-based framework where the software and system implementation task is to derive the code and models such that they satisfy functional, safety, and security as well as the resource constraint requirements imposed by the underlying platform.

6.  Developed simulation and hardware-in-the-loop testbeds and conducted comprehensive evaluation of both system and security properties. The testbeds include a modeling and simulation integration platform that enables evaluation of resilience of transportation networks in the presence of cyber attacks based on attacker-defender games using simulations of sufficient fidelity and a hardware-in-the-loop which connects physics simulators with networked embedded computers for performing analysis of realistic cyber-attack effects in networked CPS.

7.  Broadening participation: The main activity for broadening participation in computing is the organization of summer camps on CPS and CPS security for high school students. The camps use RoboScape, a team-based, hands-on curriculum for teaching cybersecurity, distributed programming, and robotics. We continue offering the camps in Summer 2019 after the completion of the project. More importantly, we are offering a teacher camp in order to involve middle and high school teachers and scale up our outreach and recruitment of women and underrepresented minorities.      

 

 


Last Modified: 05/30/2019
Modified by: Xenofon Koutsoukos

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page