Cyberattack resilient motion control

The research in cyberattack resilient motion control systems addresses critical vulnerabilities at the intersection of robotics and cybersecurity. The lab has pioneered several novel approaches to protect robotic systems from sophisticated attacks while maintaining operational performance.

Our research has identified a class of perfectly undetectable false data injection attacks (FDIAs) based on affine transformations that can compromise robotic manipulators and mobile robots. These attacks exploit weaknesses in the partially linear dynamic properties and symmetry of nonlinear robotic systems , allowing attackers to inject multiplicative and additive false data that remains hidden from detection. This work has been published in multiple papers including “Affine Transformation-based Perfectly Undetectable False Data Injection Attacks on Remote Manipulator Kinematic Control with Attack Detector” (Ueda and Blevins) in IEEE Robotics and Automation Letters.

To counter these vulnerabilities, the lab has developed encrypted control architectures using somewhat homomorphic encryption (SHE) techniques. Our approach encrypts the entire motion control scheme—including sensor signals, model parameters, and feedback gains—and performs computations directly on the encrypted data . This includes:

1) Encrypted model reference adaptive control with false data injection attack resilience via SHE-based overflow traps
2) Encrypted coordinate transformations for secure robotic teleoperation using parallelized SHE
3) Encrypted feedback linearization for nonlinear robot dynamics that preserves control performance while securing sensitive data

Our work applies geometric approaches and group theory to address the mathematical structure of system dynamics, particularly for nonlinear robotic systems. Current projects include research on “A Geometric Approach for Generalized Encrypted Control of Networked Dynamical Systems” funded by the NSF CMMI Program, which extends these security principles to broader networked control applications.

References

[1] J. Ueda and J. Blevins, “Affine Transformation-based Perfectly Undetectable False Data Injection Attacks on Remote Manipulator Kinematic Control with Attack Detector,” IEEE Robotics and Automation Letters, vol. 9, no. 7, pp. 8690-8697, 2024.
DOI: 10.1109/LRA.2024.3451397

[2] J. Ueda and H. Kwon, “Perfectly Undetectable Reflection and Scaling False Data Injection Attacks via Affine Transformation on Mobile Robot Trajectory Tracking Control,” arXiv preprint, 2024.
arXiv:2408.10177

[3] B. Kwon, S. Kosieradzki, J. Blevins, and J. Ueda, “Encrypted Coordinate Transformation via Parallelized Somewhat Homomorphic Encryption for Robotic Teleoperation,” 2023 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), Seattle, WA, 2023.
DOI: 10.1109/AIM.2023.10196122

[4] K. Teranishi, K. Kogiso, and J. Ueda, “Encrypted feedback linearization and motion control for manipulator with somewhat homomorphic encryption,” IEEE/ASME International Conference on Advanced Intelligent Mechatronics, Boston, 2020.
DOI: 10.1109/AIM43001.2020.9158986

[5] S. Kosieradzki, X. Zhao, H. Kawase, K. Kogiso, and J. Ueda, “Secure Teleoperation Control Using Somewhat Homomorphic Encryption,” IFAC 2022 Modeling, Estimation, and Control Conference (MECC 2022), 2022.

[6] X. Zhao, S. Kosieradzki, and J. Ueda, “Distributed Simulation of Encrypted Dynamics via Functional Mockup Units,” 2023 IEEE/SICE International Symposium on System Integrations (SII 2023), 2023.

[7] S. Kosieradzki, Y. Qiu, K. Kogiso, and J. Ueda, “Rewrite Rules for Automated Depth Reduction of Encrypted Control Expressions with Somewhat Homomorphic Encryption,” Proceedings of the 2022 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM 2022), 2022.

[8] H. Kawase, W. Meinhold, and J. Ueda, “Encrypted Classification for Prevention of Adversarial Perturbation and Individual Identification in Health-Monitoring,” 2023 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM 2023), Seattle, WA, 2023.

[9] Y. Qiu and J. Ueda, “Encrypted motion control of a teleoperation system with security-enhanced controller by deception,” ASME 2019 Dynamic Systems and Control Conference, 2019.

[10] J. Blevins and J. Ueda, “Encrypted Model Reference Adaptive Control with False Data Injection Attack Resilience via Somewhat Homomorphic Encryption-Based Overflow Trap,” IEEE Transactions on Industrial Cyber-Physical Systems, 2025.
TechRxiv. DOI: 10.36227/techrxiv.172469519.92808714/v1

Comments are closed.