170 research outputs found

    Time-and event-driven communication process for networked control systems: A survey

    Get PDF
    Copyright © 2014 Lei Zou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.In recent years, theoretical and practical research topics on networked control systems (NCSs) have gained an increasing interest from many researchers in a variety of disciplines owing to the extensive applications of NCSs in practice. In particular, an urgent need has arisen to understand the effects of communication processes on system performances. Sampling and protocol are two fundamental aspects of a communication process which have attracted a great deal of research attention. Most research focus has been on the analysis and control of dynamical behaviors under certain sampling procedures and communication protocols. In this paper, we aim to survey some recent advances on the analysis and synthesis issues of NCSs with different sampling procedures (time-and event-driven sampling) and protocols (static and dynamic protocols). First, these sampling procedures and protocols are introduced in detail according to their engineering backgrounds as well as dynamic natures. Then, the developments of the stabilization, control, and filtering problems are systematically reviewed and discussed in great detail. Finally, we conclude the paper by outlining future research challenges for analysis and synthesis problems of NCSs with different communication processes.This work was supported in part by the National Natural Science Foundation of China under Grants 61329301, 61374127, and 61374010, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany

    Recent advances on filtering and control for nonlinear stochastic complex systems with incomplete information: A survey

    Get PDF
    This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2012 Hindawi PublishingSome recent advances on the filtering and control problems for nonlinear stochastic complex systems with incomplete information are surveyed. The incomplete information under consideration mainly includes missing measurements, randomly varying sensor delays, signal quantization, sensor saturations, and signal sampling. With such incomplete information, the developments on various filtering and control issues are reviewed in great detail. In particular, the addressed nonlinear stochastic complex systems are so comprehensive that they include conventional nonlinear stochastic systems, different kinds of complex networks, and a large class of sensor networks. The corresponding filtering and control technologies for such nonlinear stochastic complex systems are then discussed. Subsequently, some latest results on the filtering and control problems for the complex systems with incomplete information are given. Finally, conclusions are drawn and several possible future research directions are pointed out.This work was supported in part by the National Natural Science Foundation of China under Grant nos. 61134009, 61104125, 61028008, 61174136, 60974030, and 61074129, the Qing Lan Project of Jiangsu Province of China, the Project sponsored by SRF for ROCS of SEM of China, the Engineering and Physical Sciences Research Council EPSRC of the UK under Grant GR/S27658/01, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany

    Robust adaptive sampled-data control design for MIMO systems: Applications in cyber-physical security

    Get PDF
    This dissertation extends the L1 adaptive control theory to sampled-data (SD) framework. Multi-input multi-output non-square (underactuated) systems are considered with different sampling rates for inputs and outputs. The sampled-data framework allows to address non-minimum phase systems, subject to less restrictive assumptions as compared to continuous time framework. It is shown that the closed-loop system can recover the response of a continuous-time reference system as the sampling time of the SD controller tends to zero. In this thesis, the L1 sampled data adaptive controller is integrated with the Simplex fault-tolerant architecture for resilient control of cyber-physical systems (CPSs). Detection and mitigation of zero-dynamics attacks are addressed and validated in flight tests of a quadrotor in Intelligent Robotics Laboratory of UIUC. The experiments show that the multirate L1 controller can e effectively detect stealthy zero-dynamics attacks and recover the stability of the perturbed system, where the single-rate conventional L1 adaptive controller fails. From the perspective of applications, the dissertation considers navigation and control of autonomous vehicles and proposes a two-loop framework, in which the high-level reference commands are limited by a saturation function, while the low-level controller tracks the reference by compensating for disturbances and uncertainties. A class of nested, uncertain, multi-input multi-output (MIMO) systems subject to reference command saturation, possibly with non-minimum phase zeros, is considered. Robust stability and performance of the overall closed-loop system with command saturation and multirate L1 adaptive controller are analyzed. Finally, a systematic analysis and synthesis method is proposed for the optimal design of filters in the L1 adaptive output-feedback structure, where the lowpass filter is the key to the trade-off between the performance and robustness of the closed-loop system. An optimization problem is formulated using the constraint on the input time-delay margin and a cost-function based on mixed L1/H2-norm performance measure. The optimization problem can be efficiently solved using linear/quadratic programming. We note that the framework of this dissertation and the multi-loop problem formulation of navigation and control of autonomous systems provide suitable synthesis and analysis tools for autonomous cyber-physical systems (CPSs), including self-driving cars, unmanned aerial vehicles (UAVs), and industrial/medical robots, to name just a few. The SD design facilitates the implementation of control laws on digital computers in CPSs, where the input/output signals are available at discrete time instances with different sampling rates

    Security of cyber-physical systems: A control-theoretic perspective

    Get PDF
    Motivated by the attacks on control systems through the cyber (digital) part, we study how signal attacks injected through actuators and/or sensors affect control system stability and performance. We ask the questions: What are the different types and scenarios of signal attacks? When are the attacks stealthy and unbounded? How to compute the worst stealthy bounded attacks? How to defend against such attacks through controller design? How to identify and estimate signal attacks before significant performance loss happens? We answer the above questions in this thesis using tools from control theory. We show that it is necessary to use a sampled-data framework to accurately assess the vulnerabilities of control systems. In addition, we show that the most lethal attacks are related to the structure of the system (location of zeros and poles, number of inputs and outputs). We show that dual rate control is a powerful tool to defend against these vulnerabilities, and we provide a related controller design. Furthermore, we show that the worst stealthy bounded attacks can be computed by an iterative linear program, and we show how to lessen their effects through iterative controller design. Finally, we study the trade-off between control and estimation of signal attacks and provide several controller designs utilizing the power of dual rate sampling

    Reliable Decentralized Controller Design for Discrete/Continuous-Time, Sampled-Data, and Multirate Systems

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryJoint Services Electronics Program / N00014-90-J-1270American Electronics AssociationVLSI CorporationOpe

    샘플 데이터로 표현되는 사이버-물리 시스템의 취약점 분석 및 검출 불가능한 공격에 대한 방어 기법

    Get PDF
    학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 심형보.The rapid evolution of communication network and computation speed has led to the emergence of cyber-physical systems in which the traditional physical plants are controlled remotely using digital controllers. Unfortunately, however, the separation between the plant and controller with a network communication provides a new chance for external adversaries to intrude control systems, which are highly connected to human life and social infrastructures. For this reason, among various issues of the cyber-physical system, security problems have gained particular attention to control engineers these days. This dissertation presents new theoretical vulnerabilities undetectable from the conventional anomaly detector, which arise due to the mixture of continuous- and discrete-time components on cyber-physical systems, and addresses countermeasures against such vulnerabilities. Specific subjects dealt with in the dissertation are listed as follows: 1) Zero dynamics attacks can be lethal to cyber-physical systems because they can be harmful to physical plants and impossible to detect. Fortunately, if the given continuous-time physical system is minimum phase, the attack is not so effective even if it cannot be detected. However, the situation can become unfavorable if one uses digital control by sampling the sensor measurement and using a zero-order hold for actuation because of the `sampling zeros.' When the continuous-time system has a relative degree greater than two and the sampling period is small, the sampled-data system must have unstable zeros, so that the cyber-physical system becomes vulnerable to `sampling zero dynamics attack.' In this dissertation, we present an idea to neutralize the zero dynamics attack for single-input and single-output sampled-data systems by shifting the unstable discrete-time zeros into stable ones. This idea is realized by employing the so-called `generalized hold' which replaces a standard zero-order hold. It is shown that, under mild assumptions, a generalized hold exists which places the discrete-time zeros at desired positions. Furthermore, we formulate the design problem as an optimization problem whose performance index is related to the inter-sample behavior of the physical plant, and propose an optimal gain which alleviates the performance degradation caused by generalized hold as much as possible, and in order to verify the theoretical results, we apply the proposed strategy to a DC/DC converter with an electrical circuit. 2) The zero dynamics attack has usually been studied as a type of actuator attack, but it can harm the physical plant through the sensor network. Specifically, when the system monitors abnormal behavior of the plant using the anomaly detector (fault detector), one can generate zero dynamics attack on the sensor network deceiving the anomaly detector by regarding the output of the plant and residual of the anomaly detector as a new input and output of a target system. It is noticed that this sensor attack is not so effective when the plant is stable even if the attack is still undetectable. Noting this point, we propose to reexamine the generalized hold as a countermeasure against the undetectable sensor attack. That is, using the fact that the output feedback passing through the generalized hold can stabilize the unstable systems by selecting an appropriate hold function, we show that the plant can be safe from the undetectable sensor attack. Furthermore, to relieve the performance degradation of the use of generalized hold feedback, we employ a discrete-time linear quadratic regulator minimizing a continuous-time cost function. 3) In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behavior between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. This type of attack is always constructible when the sampled-data system has an input redundancy, i.e., the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.디지털 장치들의 연산 속도와 네트워크 전송 속도의 급진적인 발전으로 고전적인 제어 시스템이 네트워크를 통해 원격으로 제어되는 사이버-물리 시스템(cyber-physical systems)이 등장하기 시작했다. 이러한 사이버-물리 시스템은 제어기와 제어 대상의 분리라는 특성상 외부의 악의적인 공격신호로 부터 공격당할 수 있는 잠재적인 위험에 노출되어 있으며 파워플랜트의 원격감시제어(SCADA, Supervisory Control And Data Acquisition)와 같은 사회 기반 시설과도 밀접한 연관이 있어 그 보안성에 관한 연구의 필요성이 강조되고 있다. 본 논문은 사이버-물리 시스템이 연속시간으로 이루어진 물리 플랜트(physical plant)와 디지털 제어기로 이루어져 있다는 사실로부터 이를 영차홀드(zero-order hold)와 샘플러(sampler)로 이산화(discretize)되는 샘플-데이터 시스템으로 표현하고, 연속시간과 이산시간의 결합으로 부터 발생할 수 있는 사이버 공격에 대한 이론적인 취약점을 분석하고 그에 대한 해결책을 제시한다. 구체적으로 본 논문에서는 다음의 세 가지 주제들을 다룬다. 첫 번째로, 본 논문은 시스템의 불안정한(unstable) 영점(zero)의 정보를 이용하여 입력 네트워크를 통해 주입될 경우 검출불가능(undetectable)한 영동역학 공격(zero dynamics attack)이 샘플 데이터 시스템에서 발생하는 샘플링 영점(sampling zero)을 이용하여도 가능하다는 점을 밝힌다. 그리고 영차홀드 대신 일반화된 홀드(generalized hold)를 이용할 경우 이산시간 시스템의 이산시간 영점을 모두 안정한(stable)한 영역으로 할당할 수 있다는 사실에 근거하여 영동역학 공격에 대한 근본적인 대응책으로 영차홀드를 일반화된 홀드로 대체하는 방안을 제안한다. 추가적으로, 일반화된 홀드를 이용할 경우 발생하는 성능저하를 최소화 하기 위해 볼록(convex) 최적화 문제로 일반화된 홀드를 설계하는 방법을 제시한다. 다른 한편, 이산시간 시스템의 출력 센서 네트워크를 입력 그리고 고장 검출기(fault detector)의 잔여신호(residual)를 출력으로 하는 시스템의 영동역학을 이용하여 검출 불가능한 센서 공격이 가능함을 보이고, 이에 대한 해결책으로 이산시간 출력 부터 연속시간 입력까지 일반화된 홀드를 이용한 피드백 루프를 추가하여 공격의 효과를 무효화하는 방법을 제안한다. 또한 이러한 피드백 루프로 인한 제어 성능 저하를 최소화하기 위해 연속시간 비용함수를 최소화하는 이산시간 최적 제어기법의 이용을 제안한다. 마지막으로, 영차홀드와 샘플러의 동작주기가 같지 않은 다중 입출력(MIMO) 샘플-데이터 시스템을 쌓인 시스템(lifted system)으로 표현쌓을 때 출력대비 입력 여유분이 많을 경우, 입력 네트워크를 통하여 검출 불가능한 공격을 가능하게 하는 충분조건을 찾고, 이를 활용하여 공격신호를 생성하는 설계법을 제안한다.1 Introduction 1 1.1 Overview of Security Issues on Cyber-Physical Systems 1 1.2 Contributions and Outline of Dissertation 4 1.3 Preliminary: Characterization of detectable and undetectable attacks 8 2 Use of Generalized Hold in Sampled-data Systems to Counteract Zero Dynamics Attack 13 2.1 Zero Dynamics Attack with Normal Form 13 2.1.1 Continuous-time Linear Systems 13 2.1.2 Sampled-data Linear Systems 16 2.1.3 Simulation Result: Zero Dynamics Attack on Sampling Zeros 18 2.1.4 Existing Countermeasures Against Zero Dynamics Attack 19 2.2 Optimal Generalized Hold Function to Neutralize Zero Dynamics Attack 22 2.2.1 Shifting discrete-time zeros by generalized hold 23 2.2.2 Design of optimal generalized hold function with security guaranteed 27 2.2.3 Simulation Results: Effect of Optimal Generalized Hold 34 2.3 Illustrative Example for Closed-loop System 36 2.4 Experiment: DC/DC Converter with Electrical Circuit 39 2.4.1 Simulation Results 43 2.4.2 Experiment Results 44 2.5 Study on the Effect of Generalized Hold on Intrinsic Zeros of Nonlinear Systems under Fast Sampling 47 3 Use of Generalized Hold Feedback in Sampled-data Systems to Counteract Zero-dynamics Sensor Attack 57 3.1 Undetectable Sensor Attack and its lethality 57 3.1.1 Construction of Zero Dynamics Sensor Attack 58 3.1.2 Simulation Results: Magnetic Levitation of a Steel Ball 61 3.2 Strategy to Neutralize Zero Dynamics Sensor Attack and Relieve Performance Degradation 63 3.2.1 Employing the generalized hold feedback to neutralize zero dynamics sensor attack 64 3.2.2 Simulation Results: Effectiveness of the Generalized Hold 69 3.2.3 DLQR under Consideration of Inter-sample Behavior 71 3.2.4 Simulation Results: Effectiveness of DLQR with Continuous-time Performance Index 77 4 Masking Attack for Sampled-data System via Input Redundancy 79 4.1 Problem Formulation 79 4.2 Design of Masking Attack with Zero-stealthy and Disruptive Properties 83 4.2.1 Clustering the Time Frame 86 4.2.2 Conditions for Masking Attack Design 90 4.2.3 Off-line Construction of Attack Signal 93 4.2.4 Practical Stealthiness of Masking Attack with R \in R 97 4.3 Simulation Results 99 4.3.1 Numerical Example: R = 1 with δ = 0 99 4.3.2 X-38 Vehicle: R = 4 with δ = 0 102 4.3.3 Numerical Example: R = 0.4 with δ = 0.75 105 5 Conclusion of Dissertation 111 BIBLIOGRAPHY 113 국문초록 121Docto

    Integrated fault estimation and accommodation design for discrete-time Takagi-Sugeno fuzzy systems with actuator faults

    Get PDF
    This paper addresses the problem of integrated robust fault estimation (FE) and accommodation for discrete-time Takagi–Sugeno (T–S) fuzzy systems. First, a multiconstrained reduced-order FE observer (RFEO) is proposed to achieve FE for discrete-time T–S fuzzy models with actuator faults. Based on the RFEO, a new fault estimator is constructed. Then, using the information of online FE, a new approach for fault accommodation based on fuzzy-dynamic output feedback is designed to compensate for the effect of faults by stabilizing the closed-loop systems. Moreover, the RFEO and the dynamic output feedback fault-tolerant controller are designed separately, such that their design parameters can be calculated readily. Simulation results are presented to illustrate our contributions
    corecore