11 research outputs found

    A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

    Get PDF
    In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft

    Virtual Sensors and Actuators

    Get PDF
    This chapter introduces the design of virtual sensors and actuators using the classical eigenvalue assignment approach, widely used for the design of controllers and observers in state-space. It presents a linear matrix inequality (LMI)-based procedure. The attractiveness of this solution is that the virtual sensor/actuator technique described so far can be extended easily to work with the nonlinear systems described by convex representations, such as the linear parameter varying system. The chapter illustrates the virtual sensor and actuator approach using a well-known case study: the four-tank system. It also presents a separate formulation of virtual sensors/virtual actuators. The main advantage of the LMI-based design is the fact that it enables the extension of the virtual sensor/actuator technique to linear parameter varying systems. The chapter concludes with a presentation of the conclusions and some outlooks on the current trends of virtual sensors and actuators.acceptedVersio

    Fault-Tolerant Control Based on Virtual Actuator and Sensor for Discrete-Time Descriptor Systems

    Get PDF
    This article proposes a fault-tolerant control (FTC) strategy based on virtual actuator and sensor for discrete-time descriptor systems subject to actuator and sensor faults. The fault-tolerant closed-loop system, which includes the nominal controller and observer, as well as the virtual actuator and the virtual sensor, hides the effects of faults. When an observer-based state-feedback law is considered, the existence of algebraic loop may prevent the practical implementation due to the current algebraic states depending on the current control input, that affects also the implementation of the virtual actuator/sensor. To deal with this issue, an observer-based delayed feedback controller and a delayed virtual actuator are proposed for discrete-time descriptor systems. Furthermore, the satisfaction of the separation principle is shown, and an improved admissibility condition is developed for the design of the controller and virtual actuator/sensor. Finally, some simulation results including an electrical circuit are used to demonstrate the applicability of the proposed methods.acceptedVersio

    A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

    No full text
    In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.This work has been partially funded by the Spanish State Research Agency (AEI) and the European Regional Development Fund (ERFD) through the projects SCAV (ref. MINECO DPI2017-88403-R) and DEOCS (ref. MINECO DPI2016-76493). This work has been also supported by the AEI through the Maria de Maeztu Seal of Excellence to IRI (MDM-2016- 0656) and the grant Juan de la Cierva-Formacion (FJCI-2016-29019)
    corecore