243 research outputs found
Recent advances on filtering and control for nonlinear stochastic complex systems with incomplete information: A survey
This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2012 Hindawi PublishingSome recent advances on the filtering and control problems for nonlinear stochastic complex systems with incomplete information are surveyed. The incomplete information under consideration mainly includes missing measurements, randomly varying sensor delays, signal quantization, sensor saturations, and signal sampling. With such incomplete information, the developments on various filtering and control issues are reviewed in great detail. In particular, the addressed nonlinear stochastic complex systems are so comprehensive that they include conventional nonlinear stochastic systems, different kinds of complex networks, and a large class of sensor networks. The corresponding filtering and control technologies for such nonlinear stochastic complex systems are then discussed. Subsequently, some latest results on the filtering and control problems for the complex systems with incomplete information are given. Finally, conclusions are drawn and several possible future research directions are pointed out.This work was supported in part by the National Natural Science Foundation of China under Grant nos. 61134009, 61104125, 61028008, 61174136, 60974030, and 61074129, the Qing Lan Project of Jiangsu Province of China, the Project sponsored by SRF for ROCS of SEM of China, the Engineering and Physical Sciences Research Council EPSRC of the UK under Grant GR/S27658/01, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany
Optimized state feedback regulation of 3DOF helicopter system via extremum seeking
In this paper, an optimized state feedback regulation of a 3 degree of freedom (DOF) helicopter is designed via extremum seeking (ES) technique. Multi-parameter ES is applied to optimize the tracking performance via tuning State Vector Feedback with Integration of the Control Error (SVFBICE).
Discrete multivariable version of ES is developed to minimize a cost function that measures the performance of the controller. The cost function is a function of the error between the actual and desired axis positions. The controller parameters are updated online as the optimization takes place. This method significantly decreases the time in obtaining optimal controller parameters. Simulations were conducted for the online optimization under both fixed and varying operating conditions. The results demonstrate the usefulness of using ES for preserving the maximum attainable performance
Multi-Rate Observers for Model-Based Process Monitoring
Very often, critical quantities related to safety, product quality and economic performance of a chemical process cannot be measured on line. In an attempt to overcome the challenges caused by inadequate on-line measurements, state estimation provides an alternative approach to reconstruct the unmeasured state variables by utilizing available on-line measurements and a process model. Chemical processes usually possess strong nonlinearities, and involve different types of measurements. It remains a challenging task to incorporate multiple measurements with different sampling rates and different measurement delays into a unified estimation algorithmic framework. This dissertation seeks to present developments in the field of state estimation by providing the theoretical advances in multi-rate multi-delay observer design. A delay-free multi-rate observer is first designed in linear systems under asynchronous sampling. Sufficient and explicit conditions in terms of maximum sampling period are derived to guarantee exponential stability of the observer, using Lyapunov’s second method. A dead time compensation approach is developed to compensate for the effect of measurement delay. Based on the multi-rate formulation, optimal multi-rate observer design is studied in two classes of linear systems where optimal gain selection is performed by formulating and solving an optimization problem. Then a multi-rate observer is developed in nonlinear systems with asynchronous sampling. The input-to-output stability is established for the estimation errors with respect to measurement errors using the Karafyllis-Jiang vector small-gain theorem. Measurement delay is also accounted for in the observer design using dead time compensation. Both the multi-rate designs in linear and nonlinear systems provide robustness with respect to perturbations in the sampling schedule. Multi-rate multi-delay observer is shown to be effective for process monitoring in polymerization reactors. A series of three polycondensation reactors and an industrial gas-phase polyethylene reactor are used to evaluate the observer performance. Reliable on-line estimates are obtained from the multi-rate multi-delay observer through simulation
Adapting nearest neighbors-based monitoring methods to irregularly sampled measurements
Prognostics and Health Management Society. All rights reserved.Irregularly spaced measurements are a common quality problem in real data and preclude the use of several feature extraction methods, which were developed for measurements with constant sampling intervals. Feature extraction methods based on nearest neighbors of embedded vectors are an example of such methods. This paper proposes the use of a timebased construction of embedded vectors and a weighted similarity metric within nearest neighbor-based methods in order to extend their applicability to irregularly sampled measurements. The proposed idea is demonstrated within a method of univariate detection of transient or spiky disturbances. The result obtained with an irregularly sampled measurement is benchmarked by the original regularly sampled measurement. Although the method was originally implemented for off-line analysis, the paper also discusses modifications to enable its on-line implementation
34th Midwest Symposium on Circuits and Systems-Final Program
Organized by the Naval Postgraduate School Monterey California. Cosponsored by the IEEE Circuits and Systems Society.
Symposium Organizing Committee: General Chairman-Sherif Michael, Technical Program-Roberto Cristi, Publications-Michael Soderstrand, Special Sessions- Charles W. Therrien, Publicity: Jeffrey Burl, Finance: Ralph Hippenstiel, and Local Arrangements: Barbara Cristi
샘플 데이터로 표현되는 사이버-물리 시스템의 취약점 분석 및 검출 불가능한 공격에 대한 방어 기법
학위논문 (박사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 심형보.The rapid evolution of communication network and computation speed has led to the emergence of cyber-physical systems in which the traditional physical plants are controlled remotely using digital controllers.
Unfortunately, however, the separation between the plant and controller with a network communication provides a new chance for external adversaries to intrude control systems, which are highly connected to human life and social infrastructures. For this reason, among various issues of the cyber-physical system, security problems have gained particular attention to control engineers these days. This dissertation presents new theoretical vulnerabilities undetectable from the conventional anomaly detector, which arise due to the mixture of continuous- and discrete-time components on cyber-physical systems, and addresses countermeasures against such vulnerabilities. Specific subjects dealt with in the dissertation are listed as follows:
1) Zero dynamics attacks can be lethal to cyber-physical systems because they can be harmful to physical plants and impossible to detect. Fortunately, if the given continuous-time physical system is minimum phase, the attack is not so effective even if it cannot be detected. However, the situation can become unfavorable if one uses digital control by sampling the sensor measurement and using a zero-order hold for actuation because of the `sampling zeros.' When the continuous-time system has a relative degree greater than two and the sampling period is small, the sampled-data system must have unstable zeros, so that the cyber-physical system becomes vulnerable to `sampling zero dynamics attack.' In this dissertation, we present an idea to neutralize the zero dynamics attack for single-input and single-output sampled-data systems by shifting the unstable discrete-time zeros into stable ones. This idea is realized by employing the so-called `generalized hold' which replaces a standard zero-order hold. It is shown that, under mild assumptions, a generalized hold exists which places the discrete-time zeros at desired positions. Furthermore, we formulate the design problem as an optimization problem whose performance index is related to the inter-sample behavior of the physical plant, and propose an optimal gain which alleviates the performance degradation caused by generalized hold as much as possible, and in order to verify the theoretical results, we apply the proposed strategy to a DC/DC converter with an electrical circuit.
2) The zero dynamics attack has usually been studied as a type of actuator attack, but it can harm the physical plant through the sensor network. Specifically, when the system monitors abnormal behavior of the plant using the anomaly detector (fault detector), one can generate zero dynamics attack on the sensor network deceiving the anomaly detector by regarding the output of the plant and residual of the anomaly detector as a new input and output of a target system. It is noticed that this sensor attack is not so effective when the plant is stable even if the attack is still undetectable. Noting this point, we propose to reexamine the generalized hold as a countermeasure against the undetectable sensor attack. That is, using the fact that the output feedback passing through the generalized hold can stabilize the unstable systems by selecting an appropriate hold function, we show that the plant can be safe from the undetectable sensor attack. Furthermore, to relieve the performance degradation of the use of generalized hold feedback, we employ a discrete-time linear quadratic regulator minimizing a continuous-time cost function.
3) In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behavior between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. This type of attack is always constructible when the sampled-data system has an input redundancy, i.e., the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.디지털 장치들의 연산 속도와 네트워크 전송 속도의 급진적인 발전으로 고전적인 제어 시스템이 네트워크를 통해 원격으로 제어되는 사이버-물리 시스템(cyber-physical systems)이 등장하기 시작했다. 이러한 사이버-물리 시스템은 제어기와 제어 대상의 분리라는 특성상 외부의 악의적인 공격신호로 부터 공격당할 수 있는 잠재적인 위험에 노출되어 있으며 파워플랜트의 원격감시제어(SCADA, Supervisory Control And Data Acquisition)와 같은 사회 기반 시설과도 밀접한 연관이 있어 그 보안성에 관한 연구의 필요성이 강조되고 있다. 본 논문은 사이버-물리 시스템이 연속시간으로 이루어진 물리 플랜트(physical plant)와 디지털 제어기로 이루어져 있다는 사실로부터 이를 영차홀드(zero-order hold)와 샘플러(sampler)로 이산화(discretize)되는 샘플-데이터 시스템으로 표현하고, 연속시간과 이산시간의 결합으로 부터 발생할 수 있는 사이버 공격에 대한 이론적인 취약점을 분석하고 그에 대한 해결책을 제시한다.
구체적으로 본 논문에서는 다음의 세 가지 주제들을 다룬다. 첫 번째로, 본 논문은 시스템의 불안정한(unstable) 영점(zero)의 정보를 이용하여 입력 네트워크를 통해 주입될 경우 검출불가능(undetectable)한 영동역학 공격(zero dynamics attack)이 샘플 데이터 시스템에서 발생하는 샘플링 영점(sampling zero)을 이용하여도 가능하다는 점을 밝힌다. 그리고 영차홀드 대신 일반화된 홀드(generalized hold)를 이용할 경우 이산시간 시스템의 이산시간 영점을 모두 안정한(stable)한 영역으로 할당할 수 있다는 사실에 근거하여 영동역학 공격에 대한 근본적인 대응책으로 영차홀드를 일반화된 홀드로 대체하는 방안을 제안한다. 추가적으로, 일반화된 홀드를 이용할 경우 발생하는 성능저하를 최소화 하기 위해 볼록(convex) 최적화 문제로 일반화된 홀드를 설계하는 방법을 제시한다. 다른 한편, 이산시간 시스템의 출력 센서 네트워크를 입력 그리고 고장 검출기(fault detector)의 잔여신호(residual)를 출력으로 하는 시스템의 영동역학을 이용하여 검출 불가능한 센서 공격이 가능함을 보이고, 이에 대한 해결책으로 이산시간 출력 부터 연속시간 입력까지 일반화된 홀드를 이용한 피드백 루프를 추가하여 공격의 효과를 무효화하는 방법을 제안한다. 또한 이러한 피드백 루프로 인한 제어 성능 저하를 최소화하기 위해 연속시간 비용함수를 최소화하는 이산시간 최적 제어기법의 이용을 제안한다. 마지막으로, 영차홀드와 샘플러의 동작주기가 같지 않은 다중 입출력(MIMO) 샘플-데이터 시스템을 쌓인 시스템(lifted system)으로 표현쌓을 때 출력대비 입력 여유분이 많을 경우, 입력 네트워크를 통하여 검출 불가능한 공격을 가능하게 하는 충분조건을 찾고, 이를 활용하여 공격신호를 생성하는 설계법을 제안한다.1 Introduction 1
1.1 Overview of Security Issues on Cyber-Physical Systems 1
1.2 Contributions and Outline of Dissertation 4
1.3 Preliminary: Characterization of detectable and undetectable attacks 8
2 Use of Generalized Hold in Sampled-data Systems to Counteract Zero Dynamics Attack 13
2.1 Zero Dynamics Attack with Normal Form 13
2.1.1 Continuous-time Linear Systems 13
2.1.2 Sampled-data Linear Systems 16
2.1.3 Simulation Result: Zero Dynamics Attack on Sampling Zeros 18
2.1.4 Existing Countermeasures Against Zero Dynamics Attack 19
2.2 Optimal Generalized Hold Function to Neutralize Zero Dynamics Attack 22
2.2.1 Shifting discrete-time zeros by generalized hold 23
2.2.2 Design of optimal generalized hold function with security guaranteed 27
2.2.3 Simulation Results: Effect of Optimal Generalized Hold 34
2.3 Illustrative Example for Closed-loop System 36
2.4 Experiment: DC/DC Converter with Electrical Circuit 39
2.4.1 Simulation Results 43
2.4.2 Experiment Results 44
2.5 Study on the Effect of Generalized Hold on Intrinsic Zeros of Nonlinear Systems under Fast Sampling 47
3 Use of Generalized Hold Feedback in Sampled-data Systems to Counteract Zero-dynamics Sensor Attack 57
3.1 Undetectable Sensor Attack and its lethality 57
3.1.1 Construction of Zero Dynamics Sensor Attack 58
3.1.2 Simulation Results: Magnetic Levitation of a Steel Ball 61
3.2 Strategy to Neutralize Zero Dynamics Sensor Attack and Relieve Performance Degradation 63
3.2.1 Employing the generalized hold feedback to neutralize zero dynamics sensor attack 64
3.2.2 Simulation Results: Effectiveness of the Generalized Hold 69
3.2.3 DLQR under Consideration of Inter-sample Behavior 71
3.2.4 Simulation Results: Effectiveness of DLQR with Continuous-time Performance Index 77
4 Masking Attack for Sampled-data System via Input Redundancy 79
4.1 Problem Formulation 79
4.2 Design of Masking Attack with Zero-stealthy and Disruptive Properties 83
4.2.1 Clustering the Time Frame 86
4.2.2 Conditions for Masking Attack Design 90
4.2.3 Off-line Construction of Attack Signal 93
4.2.4 Practical Stealthiness of Masking Attack with R \in R 97
4.3 Simulation Results 99
4.3.1 Numerical Example: R = 1 with δ = 0 99
4.3.2 X-38 Vehicle: R = 4 with δ = 0 102
4.3.3 Numerical Example: R = 0.4 with δ = 0.75 105
5 Conclusion of Dissertation 111
BIBLIOGRAPHY 113
국문초록 121Docto
State estimation, system identification and adaptive control for networked systems
A networked control system (NCS) is a feedback control system that has its control loop physically connected via real-time communication networks. To meet the demands of `teleautomation', modularity, integrated diagnostics, quick maintenance and decentralization of control, NCSs have received remarkable attention worldwide during the past decade. Yet despite their distinct advantages, NCSs are suffering from network-induced constraints such as time delays and packet dropouts, which may degrade system performance. Therefore, the network-induced constraints should be incorporated into the control design and related studies.
For the problem of state estimation in a network environment, we present the strategy of simultaneous input and state estimation to compensate for the effects of unknown input missing. A sub-optimal algorithm is proposed, and the stability properties are proven by analyzing the solution of a Riccati-like equation.
Despite its importance, system identification in a network environment has been studied poorly before. To identify the parameters of a system in a network environment, we modify the classical Kalman filter to obtain an algorithm that is capable of handling missing output data caused by the network medium. Convergence properties of the algorithm are established under the stochastic framework.
We further develop an adaptive control scheme for networked systems. By employing the proposed output estimator and parameter estimator, the designed adaptive control can track the expected signal. Rigorous convergence analysis of the scheme is performed under the stochastic framework as well
- …