1,000 research outputs found

    A Multi-Observer Based Estimation Framework for Nonlinear Systems under Sensor Attacks

    Full text link
    We address the problem of state estimation and attack isolation for general discrete-time nonlinear systems when sensors are corrupted by (potentially unbounded) attack signals. For a large class of nonlinear plants and observers, we provide a general estimation scheme, built around the idea of sensor redundancy and multi-observer, capable of reconstructing the system state in spite of sensor attacks and noise. This scheme has been proposed by others for linear systems/observers and here we propose a unifying framework for a much larger class of nonlinear systems/observers. Using the proposed estimator, we provide an isolation algorithm to pinpoint attacks on sensors during sliding time windows. Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: text overlap with arXiv:1806.0648

    An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks

    Full text link
    We address the problem of state estimation, attack isolation, and control of discrete-time linear time-invariant systems under (potentially unbounded) actuator and sensor false data injection attacks. Using a bank of unknown input observers, each observer leading to an exponentially stable estimation error (in the attack-free case), we propose an observer-based estimator that provides exponential estimates of the system state in spite of actuator and sensor attacks. Exploiting sensor and actuator redundancy, the estimation scheme is guaranteed to work if a sufficiently small subset of sensors and actuators are under attack. Using the proposed estimator, we provide tools for reconstructing and isolating actuator and sensor attacks; and a control scheme capable of stabilizing the closed-loop dynamics by switching off isolated actuators. Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: substantial text overlap with arXiv:1811.1015

    A secure state estimation algorithm for nonlinear systems under sensor attacks

    Full text link
    The state estimation of continuous-time nonlinear systems in which a subset of sensor outputs can be maliciously controlled through injecting a potentially unbounded additive signal is considered in this paper. Analogous to our earlier work for continuous-time linear systems in \cite{chong2015observability}, we term the convergence of the estimates to the true states in the presence of sensor attacks as `observability under MM attacks', where MM refers to the number of sensors which the attacker has access to. Unlike the linear case, we only provide a sufficient condition such that a nonlinear system is observable under MM attacks. The condition requires the existence of asymptotic observers which are robust with respect to the attack signals in an input-to-state stable sense. We show that an algorithm to choose a compatible state estimate from the state estimates generated by the bank of observers achieves asymptotic state reconstruction. We also provide a constructive method for a class of nonlinear systems to design state observers which have the desirable robustness property. The relevance of this study is illustrated on monitoring the safe operation of a power distribution network.Comment: This paper has been accepted for publication at the 59th IEEE Conference on Decision and Control, 202

    Control Theory in Engineering

    Get PDF
    The subject matter of this book ranges from new control design methods to control theory applications in electrical and mechanical engineering and computers. The book covers certain aspects of control theory, including new methodologies, techniques, and applications. It promotes control theory in practical applications of these engineering domains and shows the way to disseminate researchers’ contributions in the field. This project presents applications that improve the properties and performance of control systems in analysis and design using a higher technical level of scientific attainment. The authors have included worked examples and case studies resulting from their research in the field. Readers will benefit from new solutions and answers to questions related to the emerging realm of control theory in engineering applications and its implementation

    A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks

    Get PDF
    Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of vehicles on the highway to form in closely-coupled automated platoons to increase highway capacity and safety, and decrease fuel consumption and CO2 emissions. The underlying mechanism behind CACC is the use of Vehicle-to-Vehicle (V2V) wireless communication networks to transmit acceleration commands to adjacent vehicles in the platoon. However, the use of V2V networks leads to increased vulnerabilities against faults and cyberattacks at the communication channels. Communication networks serve as new access points for malicious agents trying to deteriorate the platooning performance or even cause crashes. Here, we address the problem of increasing robustness of CACC schemes against cyberattacks by the use of multiple V2V networks and a data fusion algorithm. The idea is to transmit acceleration commands multiple times through different communication networks (channels) to create redundancy at the receiver side. We exploit this redundancy to obtain attack-free estimates of acceleration commands. To accomplish this, we propose a data-fusion algorithm that takes data from all channels, returns an estimate of the true acceleration command, and isolates compromised channels. Note, however, that using estimated data for control introduces uncertainty into the loop and thus decreases performance. To minimize performance degradation, we propose a robust HH_{\infty} controller that reduces the joint effect of estimation errors and sensor/channel noise in the platooning performance (tracking performance and string stability). We present simulation results to illustrate the performance of our approach

    A control-theoretical fault prognostics and accommodation framework for a class of nonlinear discrete-time systems

    Get PDF
    Fault diagnostics and prognostics schemes (FDP) are necessary for complex industrial systems to prevent unscheduled downtime resulting from component failures. Existing schemes in continuous-time are useful for diagnosing complex industrial systems and no work has been done for prognostics. Therefore, in this dissertation, a systematic design methodology for model-based fault prognostics and accommodation is undertaken for a class of nonlinear discrete-time systems. This design methodology, which does not require any failure data, is introduced in six papers. In Paper I, a fault detection and prediction (FDP) scheme is developed for a class of nonlinear system with state faults by assuming that all the states are measurable. A novel estimator is utilized for detecting a fault. Upon detection, an online approximator in discrete-time (OLAD) and a robust adaptive term are activated online in the estimator wherein the OLAD learns the unknown fault dynamics while the robust adaptive term ensures asymptotic performance guarantee. A novel update law is proposed for tuning the OLAD parameters. Additionally, by using the parameter update law, time to reach an a priori selected failure threshold is derived for prognostics. Subsequently, the FDP scheme is used to estimate the states and detect faults in nonlinear input-output systems in Paper II and to nonlinear discrete-time systems with both state and sensor faults in Paper III. Upon detection, a novel fault isolation estimator is used to identify the faults in Paper IV. It was shown that certain faults can be accommodated via controller reconfiguration in Paper V. Finally, the performance of the FDP framework is demonstrated via Lyapunov stability analysis and experimentally on the Caterpillar hydraulics test-bed in Paper VI by using an artificial immune system as an OLAD --Abstract, page iv
    corecore