-
作者:He, Xingkang; Ren, Xiaoqiang; Sandberg, Henrik; Johansson, Karl Henrik
作者单位:Royal Institute of Technology; Royal Institute of Technology; Shanghai University
摘要:In this article, we study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily manipulate the observations for a time-varying and unknown subset of the sensors. We first propose a recursive distributed filter consisting of two steps at each update. The first step employs a saturation-like scheme, which gives a small gain if the innovation is large corresponding to a potential attac...
-
作者:Subramanian, Venkat Ram; Lamperski, Andrew; Salapaka, V. Murti
作者单位:University of Minnesota System; University of Minnesota Twin Cities
摘要:Complex networked systems can be modeled and represented as graphs, with nodes representing the agents and the links describing the dynamic coupling between them. The fundamental objective of network identification for dynamic systems is to identify causal influence pathways. However, dynamically related data streams that originate from different sources are prone to corruption caused by asynchronous time-stamps, packet drops, and noise. In this article, we show that identifying causal structu...
-
作者:Avila, Daniel; Junca, Mauricio
作者单位:Universite Catholique Louvain; Universidad de los Andes (Colombia)
摘要:We consider a Markov control model in discrete time with countable both state space and action space. Using the value function of a suitable long-run average reward problem, we study various reachability/controllability problems. First, we characterize the domain of attraction and escape set of the system, and a generalization called p-domain of attraction, using the aforementioned value function. Next, we solve the problem of maximizing the probability of reaching a set A while avoiding a set...
-
作者:Guo, Nian; Kostina, Victoria
作者单位:California Institute of Technology
摘要:We consider the following communication scenario. An encoder causally observes the Wiener process and decides when and what to transmit about it. A decoder estimates the process using causally received codewords in real time. We determine the causal encoding and decoding policies that jointly minimize the mean-square estimation error, under the long-term communication rate constraint of R bits per second. We show that an optimal encoding policy can be implemented as a causal sampling policy fo...
-
作者:Oymak, Samet; Ozay, Necmiye
作者单位:University of California System; University of California Riverside; University of Michigan System; University of Michigan
摘要:Weconsider the problem of learning a realization for a linear time-invariant (LTI) dynamical system from input/output data. Given a single input/output trajectory, we provide finite time analysis for learning the system's Markov parameters, from which a balanced realization is estimated using the classical Ho-Kalman algorithm. By proving a robustness result for the Ho-Kalman algorithm and combining it with the sample complexity results for Markov parameters, we show how much data are needed to...
-
作者:Zhong, Qing-Chang; Stefanello, Marcio
作者单位:Illinois Institute of Technology; Universidade Federal do Pampa
摘要:In this article, a control framework is proposed to render a power electronic system passive by adopting the port-Hamiltonian (pH) systems theory. The system has a power electronic converter, either grid-tied or islanded. The control framework consists of a lossless interconnection block and three control channels. It makes the power converter behave as a virtual synchronous machine (VSM). The three channels are designed to, respectively, generate the frequency and the flux of the VSM and a th...
-
作者:Moulay, Emmanuel; Lechappe, Vincent; Bernuau, Emmanuel; Plestan, Franck
作者单位:Universite de Poitiers; Institut National des Sciences Appliquees de Lyon - INSA Lyon; Centre National de la Recherche Scientifique (CNRS); Universite Claude Bernard Lyon 1; Universite Paris Saclay; AgroParisTech; INRAE; Nantes Universite; Ecole Centrale de Nantes
摘要:This article deals with robust fixed-time stability and stabilization. First, new global robust fixed-time stability results are proposed for scalar systems by using constant and variable exponent coefficients. Then, they are applied to global robust fixed-time stabilization of a class of uncertain nonlinear second-order systems by using sliding-mode control. All the results are illustrated in simulation.
-
作者:van der Sanden, Bram; Geilen, Marc; Reniers, Michel; Basten, Twan
作者单位:Eindhoven University of Technology
摘要:A key challenge in the synthesis and subsequent analysis of supervisory controllers is the impact of state-space explosion caused by concurrency. The main bottleneck is often the memory needed to store the composition of plant and requirement automata and the resulting supervisor. Partial-order reduction (POR) is a well-established technique that alleviates this issue in the field of model checking. It does so by exploiting redundancy in the model with respect to the properties of interest. Fo...
-
作者:Xu, Wenying; Wang, Zidong; Hu, Liang; Kurths, Juergen
作者单位:Southeast University - China; Shandong University of Science & Technology; Brunel University; University of Essex; Potsdam Institut fur Klimafolgenforschung; Lobachevsky State University of Nizhni Novgorod
摘要:This article is concerned with the security issue in the state estimation problem for a networked control system (NCS). A new model of joint false data injection (FDI) attack is established wherein attacks are injected to both the remote estimator and the communication channels. Such a model is general that includes most existing FDI attack models as special cases. The joint FDI attacks are subjected to limited access and/or resource constraints, and this gives rise to a few attack scenarios t...
-
作者:Zhang, Kangkang; Keliris, Christodoulos; Parisini, Thomas; Polycarpou, Marios M.
作者单位:University of Cyprus; University of Cyprus; Imperial College London; University of Trieste
摘要:This article proposes a stealthy integrity attack generation methodology for a class of nonlinear cyber-physical systems. Geometric control theory and stability theory of incremental systems are used to design an attack generation scheme with stealthiness properties. An attack model is proposed as a closed-loop dynamical system with an arbitrary input signal. This model is developed based on a controlled invariant subspace that results from geometric control theory and is decoupled with the sy...