1,000 research outputs found
A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks
We address the problem of state estimation and attack isolation for general
discrete-time nonlinear systems when sensors are corrupted by (potentially
unbounded) attack signals. For a large class of nonlinear plants and observers,
we provide a general estimation scheme, built around the idea of sensor
redundancy and multi-observer, capable of reconstructing the system state in
spite of sensor attacks and noise. This scheme has been proposed by others for
linear systems/observers and here we propose a unifying framework for a much
larger class of nonlinear systems/observers. Using the proposed estimator, we
provide an isolation algorithm to pinpoint attacks on sensors during sliding
time windows. Simulation results are presented to illustrate the performance of
our tools.Comment: arXiv admin note: text overlap with arXiv:1806.0648
An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks
We address the problem of state estimation, attack isolation, and control of
discrete-time linear time-invariant systems under (potentially unbounded)
actuator and sensor false data injection attacks. Using a bank of unknown input
observers, each observer leading to an exponentially stable estimation error
(in the attack-free case), we propose an observer-based estimator that provides
exponential estimates of the system state in spite of actuator and sensor
attacks. Exploiting sensor and actuator redundancy, the estimation scheme is
guaranteed to work if a sufficiently small subset of sensors and actuators are
under attack. Using the proposed estimator, we provide tools for reconstructing
and isolating actuator and sensor attacks; and a control scheme capable of
stabilizing the closed-loop dynamics by switching off isolated actuators.
Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: substantial text overlap with arXiv:1811.1015
A secure state estimation algorithm for nonlinear systems under sensor attacks
The state estimation of continuous-time nonlinear systems in which a subset
of sensor outputs can be maliciously controlled through injecting a potentially
unbounded additive signal is considered in this paper. Analogous to our earlier
work for continuous-time linear systems in \cite{chong2015observability}, we
term the convergence of the estimates to the true states in the presence of
sensor attacks as `observability under attacks', where refers to the
number of sensors which the attacker has access to. Unlike the linear case, we
only provide a sufficient condition such that a nonlinear system is observable
under attacks. The condition requires the existence of asymptotic observers
which are robust with respect to the attack signals in an input-to-state stable
sense. We show that an algorithm to choose a compatible state estimate from the
state estimates generated by the bank of observers achieves asymptotic state
reconstruction. We also provide a constructive method for a class of nonlinear
systems to design state observers which have the desirable robustness property.
The relevance of this study is illustrated on monitoring the safe operation of
a power distribution network.Comment: This paper has been accepted for publication at the 59th IEEE
Conference on Decision and Control, 202
Control Theory in Engineering
The subject matter of this book ranges from new control design methods to control theory applications in electrical and mechanical engineering and computers. The book covers certain aspects of control theory, including new methodologies, techniques, and applications. It promotes control theory in practical applications of these engineering domains and shows the way to disseminate researchers’ contributions in the field. This project presents applications that improve the properties and performance of control systems in analysis and design using a higher technical level of scientific attainment. The authors have included worked examples and case studies resulting from their research in the field. Readers will benefit from new solutions and answers to questions related to the emerging realm of control theory in engineering applications and its implementation
A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks
Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of vehicles on the highway to form in closely-coupled automated platoons to increase highway capacity and safety, and decrease fuel consumption and CO2 emissions. The underlying mechanism behind CACC is the use of Vehicle-to-Vehicle (V2V) wireless communication networks to transmit acceleration commands to adjacent vehicles in the platoon. However, the use of V2V networks leads to increased vulnerabilities against faults and cyberattacks at the communication channels. Communication networks serve as new access points for malicious agents trying to deteriorate the platooning performance or even cause crashes. Here, we address the problem of increasing robustness of CACC schemes against cyberattacks by the use of multiple V2V networks and a data fusion algorithm. The idea is to transmit acceleration commands multiple times through different communication networks (channels) to create redundancy at the receiver side. We exploit this redundancy to obtain attack-free estimates of acceleration commands. To accomplish this, we propose a data-fusion algorithm that takes data from all channels, returns an estimate of the true acceleration command, and isolates compromised channels. Note, however, that using estimated data for control introduces uncertainty into the loop and thus decreases performance. To minimize performance degradation, we propose a robust controller that reduces the joint effect of estimation errors and sensor/channel noise in the platooning performance (tracking performance and string stability). We present simulation results to illustrate the performance of our approach
A control-theoretical fault prognostics and accommodation framework for a class of nonlinear discrete-time systems
Fault diagnostics and prognostics schemes (FDP) are necessary for complex industrial systems to prevent unscheduled downtime resulting from component failures. Existing schemes in continuous-time are useful for diagnosing complex industrial systems and no work has been done for prognostics. Therefore, in this dissertation, a systematic design methodology for model-based fault prognostics and accommodation is undertaken for a class of nonlinear discrete-time systems. This design methodology, which does not require any failure data, is introduced in six papers. In Paper I, a fault detection and prediction (FDP) scheme is developed for a class of nonlinear system with state faults by assuming that all the states are measurable. A novel estimator is utilized for detecting a fault. Upon detection, an online approximator in discrete-time (OLAD) and a robust adaptive term are activated online in the estimator wherein the OLAD learns the unknown fault dynamics while the robust adaptive term ensures asymptotic performance guarantee. A novel update law is proposed for tuning the OLAD parameters. Additionally, by using the parameter update law, time to reach an a priori selected failure threshold is derived for prognostics. Subsequently, the FDP scheme is used to estimate the states and detect faults in nonlinear input-output systems in Paper II and to nonlinear discrete-time systems with both state and sensor faults in Paper III. Upon detection, a novel fault isolation estimator is used to identify the faults in Paper IV. It was shown that certain faults can be accommodated via controller reconfiguration in Paper V. Finally, the performance of the FDP framework is demonstrated via Lyapunov stability analysis and experimentally on the Caterpillar hydraulics test-bed in Paper VI by using an artificial immune system as an OLAD --Abstract, page iv
- …