Skip to main content
Log in

Poisoning attack on VIMT and its adverse effect

  • Original Article
  • Published:
Artificial Life and Robotics Aims and scope Submit manuscript

This article has been updated

Abstract

In recent years, various approaches have been proposed to design control systems that directly utilize data without mathematical plant models. Data-driven control involves updating or redesigning a controller using actual operating data, enabling fine-tuning control systems and achieving desired characteristics. However, the increasing prevalence of cyber-attacks targeting control systems presents significant societal challenges. A study by Russo and Proutiere (in Proceeding of American Control Conference (ACC), 2021) showed a poisoning approach targeting virtual reference feedback tuning, a data-driven control method. The study suggests that compromising the data used in the data-driven method may result in the closed-loop performance failing to achieve desired specifications and, in the worst case, destabilizing the control system. Hence, investigating the adverse effects of cyber-attacks on data employed in data-driven methods becomes crucial. This study explores the impact of a poisoning attack on the data used in the data-driven control method, specifically emphasizing virtual internal model tuning as a representative data-driven control approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from corresponding author. Restrictions apply to the availability of these data, which were used under license for this study. Data are available corresponding author with the permission of Hitachi Ltd.

Change history

  • 04 December 2023

    Article note was published incorrectly and corrected in this version.

Notes

  1. ServoTechno.corp.

References

  1. Russo A, Proutiere A (2021) Poisoning attack against data-driven control methods. In: Proceeding of American control conference (ACC), pp 3234–3241

  2. Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. IEEE Conference on Decision and Control, pp 6838–6843

  3. Fujita S, Hata K, Mochizuki A, Sawada K, Shin S, Hosokawa S (2021) OpenPLC-based control system testbed for PLC whitelisting system. Artif Life Robot 26:149–154

    Article  Google Scholar 

  4. Fujita J, Ogura T, Okochi K, Matsumoto N, Sawada K, Kaneko O (2021) The structured cyber-attack scenario expression model based on diamond model and adversarial states. IEEJ Trans Electron Inf Syst 142(3):328–338

    Google Scholar 

  5. Hjalmarsson H, Gevers M, Gunnarsson S, Lequin O (1998) Iterative feedback tuning: theory and applications. IEEE Control Syst Mag 18(4):26–41

    Article  Google Scholar 

  6. Campi MC, Lecchini A, Savaresi SM (2002) Virtual reference feedback tuning—a direct method for the design of feedback controllers—. Automatica 38(8):1337–1446

    Article  MathSciNet  Google Scholar 

  7. Souma S, Kaneko O, Fujii T (2004) A new approach to parameter tuning of controllers by using one-shot experimental data. Trans Inst Syst Control Inf Eng 17(12):528–536

    Google Scholar 

  8. Ikezaki T, Kaneko O (2019) A new approach to parameter tuning of controllers by using output data of closed loop system—a proposal of virtual internal model tuning—. IEEJ Trans Electron Inf Syst Jpn 39(7):780–785

    Google Scholar 

  9. Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure?. In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16–25

  10. Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings of the 29th international conference on machine learning (ICML), pp 1467–1474

  11. Teixeria A, Sou KC, Sandberg H, Johansson KH (2015) Secure control systems: a quantitative risk management approach. IEEE Control Syst Mag 35(1):24–45

    Article  MathSciNet  Google Scholar 

  12. The MathWorks, Inc., https://jp.mathworks.com/

Download references

Acknowledgements

This work is partially supported by JSPS Grants-in-Aid (B) 20H02169.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taichi Ikezaki.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was presented in part at the joint symposium of the 27th International Symposium on Artificial Life and Robotics, the 7th International Symposium on BioComplexity, and the 5th International Symposium on Swarm Behavior and Bio-Inspired Robotics (Online, January 25–27, 2022).

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ikezaki, T., Kaneko, O., Sawada, K. et al. Poisoning attack on VIMT and its adverse effect. Artif Life Robotics 29, 168–176 (2024). https://doi.org/10.1007/s10015-023-00914-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10015-023-00914-7

Keywords

Navigation