14,470 research outputs found
A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks
The paper considers a problem of detecting and mitigating biasing attacks on
networks of state observers targeting cooperative state estimation algorithms.
The problem is cast within the recently developed framework of distributed
estimation utilizing the vector dissipativity approach. The paper shows that a
network of distributed observers can be endowed with an additional attack
detection layer capable of detecting biasing attacks and correcting their
effect on estimates produced by the network. An example is provided to
illustrate the performance of the proposed distributed attack detector.Comment: Accepted for publication in Automatic
- …