4,896 research outputs found
A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
A review of convex approaches for control, observation and safety of linear parameter varying and Takagi-Sugeno systems
This paper provides a review about the concept of convex systems based on Takagi-Sugeno, linear parameter varying (LPV) and quasi-LPV modeling. These paradigms are capable of hiding the nonlinearities by means of an equivalent description which uses a set of linear models interpolated by appropriately defined weighing functions. Convex systems have become very popular since they allow applying extended linear techniques based on linear matrix inequalities (LMIs) to complex nonlinear systems. This survey aims at providing the reader with a significant overview of the existing LMI-based techniques for convex systems in the fields of control, observation and safety. Firstly, a detailed review of stability, feedback, tracking and model predictive control (MPC) convex controllers is considered. Secondly, the problem of state estimation is addressed through the design of proportional, proportional-integral, unknown input and descriptor observers. Finally, safety of convex systems is discussed by describing popular techniques for fault diagnosis and fault tolerant control (FTC).Peer ReviewedPostprint (published version
Recommended from our members
Observer-based H∞ control for systems with repeated scalar nonlinearities and multiple packet losses
This paper is concerned with the H∞ control problem for a class of systems with repeated scalar nonlinearities and multiple missing measurements. The nonlinear system is described by a discrete-time state equation involving a repeated scalar nonlinearity, which typically appears in recurrent neural networks. The measurement missing phenomenon is assumed to occur, simultaneously, in the communication channels from the sensor to the controller and from the controller to the actuator, where the missing probability for each sensor/actuator is governed by an individual random variable satisfying a certain probabilistic distribution in the interval [0 1]. Attention is focused on the analysis and design of an observer-based feedback controller such that the closed-loop control system is stochastically stable and preserves a guaranteed H∞ performance. Sufficient conditions are obtained for the existence of admissible controllers. It is shown that the controller design problem under consideration is solvable if certain linear matrix inequalities (LMIs) are feasible. Three examples are provided to illustrate the effectiveness of the developed theoretical result
An Unknown Input Multi-Observer Approach for Estimation and Control under Adversarial Attacks
We address the problem of state estimation, attack isolation, and control of
discrete-time linear time-invariant systems under (potentially unbounded)
actuator and sensor false data injection attacks. Using a bank of unknown input
observers, each observer leading to an exponentially stable estimation error
(in the attack-free case), we propose an observer-based estimator that provides
exponential estimates of the system state in spite of actuator and sensor
attacks. Exploiting sensor and actuator redundancy, the estimation scheme is
guaranteed to work if a sufficiently small subset of sensors and actuators are
under attack. Using the proposed estimator, we provide tools for reconstructing
and isolating actuator and sensor attacks; and a control scheme capable of
stabilizing the closed-loop dynamics by switching off isolated actuators.
Simulation results are presented to illustrate the performance of our tools.Comment: arXiv admin note: substantial text overlap with arXiv:1811.1015
Stability and control synthesis for discrete-time linear systems subject to actuator saturation by output feedback
This paper presents sufficient conditions of asymptotic stability
for discrete-time linear systems subject to actuator saturations
with an output feedback law. The derived stability results are
given in terms of LMIs. A new proof is presented to
obtain previous conditions of asymptotic stability. A numerical
example is used to illustrate this technique by using a linear
optimization problem subject to LMI constraints
Issues in the design of switched linear systems : a benchmark study
In this paper we present a tutorial overview of some of the issues that arise in the design of switched linear control systems. Particular emphasis is given to issues relating to stability and control system realisation. A benchmark regulation problem is then presented. This problem is most naturally solved by means of a switched control design. The challenge to the community is to design a control system that meets the required performance specifications and permits the application of rigorous analysis techniques. A simple design solution is presented and the limitations of currently available analysis techniques are illustrated with reference to this example
- …