240 research outputs found
Event-triggered state observers for sparse sensor noise/attacks
This paper describes two algorithms for state reconstruction from sensor measurements that are corrupted with sparse, but otherwise arbitrary, 'noise.' These results are motivated by the need to secure cyber-physical systems against a malicious adversary that can arbitrarily corrupt sensor measurements. The first algorithm reconstructs the state from a batch of sensor measurements while the second algorithm is able to incorporate new measurements as they become available, in the spirit of a Luenberger observer. A distinguishing point of these algorithms is the use of event-triggered techniques to improve the computational performance of the proposed algorithms
Recommended from our members
Secure state estimation against sensor attacks in the presence of noise
We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over subsets of sensors to search for a sensor subset which is reliable for state estimation. To further improve the subset search time, we propose Satisfiability Modulo Theory-based techniques to exploit the combinatorial nature of searching over sensor subsets. Finally, as a result of independent interest, we give a coding theoretic view of attack detection and state estimation against sensor attacks in a noiseless dynamical system
Recommended from our members
Securing state reconstruction under sensor and actuator attacks: Theory and design
This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer
Lazy Abstraction-Based Controller Synthesis
We present lazy abstraction-based controller synthesis (ABCS) for
continuous-time nonlinear dynamical systems against reach-avoid and safety
specifications. State-of-the-art multi-layered ABCS pre-computes multiple
finite-state abstractions of varying granularity and applies reactive synthesis
to the coarsest abstraction whenever feasible, but adaptively considers finer
abstractions when necessary. Lazy ABCS improves this technique by constructing
abstractions on demand. Our insight is that the abstract transition relation
only needs to be locally computed for a small set of frontier states at the
precision currently required by the synthesis algorithm. We show that lazy ABCS
can significantly outperform previous multi-layered ABCS algorithms: on
standard benchmarks, lazy ABCS is more than 4 times faster
Recommended from our members
Cloud-Based Quadratic Optimization with Partially Homomorphic Encryption
This article develops a cloud-based protocol for a constrained quadratic optimization problem involving multiple parties, each holding private data. The protocol is based on the projected gradient ascent on the Lagrange dual problem and exploits partially homomorphic encryption and secure communication techniques. Using formal cryptographic definitions of indistinguishability, the protocol is shown to achieve computational privacy. We show the implementation results of the protocol and discuss its computational and communication complexity. We conclude this article with a discussion on privacy notions
Equivalence of switching linear systems by bisimulation
A general notion of hybrid bisimulation is proposed for the class of switching linear systems. Connections between the notions of bisimulation-based equivalence, state-space equivalence, algebraic and input–output equivalence are investigated. An algebraic characterization of hybrid bisimulation and an algorithmic procedure converging in a finite number of steps to the maximal hybrid bisimulation are derived. Hybrid state space reduction is performed by hybrid bisimulation between the hybrid system and itself. By specializing the results obtained on bisimulation, also characterizations of simulation and abstraction are derived. Connections between observability, bisimulation-based reduction and simulation-based abstraction are studied.\ud
\u
Simulation-based reachability analysis for nonlinear systems using componentwise contraction properties
A shortcoming of existing reachability approaches for nonlinear systems is
the poor scalability with the number of continuous state variables. To mitigate
this problem we present a simulation-based approach where we first sample a
number of trajectories of the system and next establish bounds on the
convergence or divergence between the samples and neighboring trajectories. We
compute these bounds using contraction theory and reduce the conservatism by
partitioning the state vector into several components and analyzing contraction
properties separately in each direction. Among other benefits this allows us to
analyze the effect of constant but uncertain parameters by treating them as
state variables and partitioning them into a separate direction. We next
present a numerical procedure to search for weighted norms that yield a
prescribed contraction rate, which can be incorporated in the reachability
algorithm to adjust the weights to minimize the growth of the reachable set
The homotopy theory of dg-categories and derived Morita theory
The main purpose of this work is the study of the homotopy theory of
dg-categories up to quasi-equivalences. Our main result provides a natural
description of the mapping spaces between two dg-categories and in
terms of the nerve of a certain category of -bimodules. We also prove
that the homotopy category is cartesian closed (i.e. possesses
internal Hom's relative to the tensor product). We use these two results in
order to prove a derived version of Morita theory, describing the morphisms
between dg-categories of modules over two dg-categories and as the
dg-category of -bi-modules. Finally, we give three applications of our
results. The first one expresses Hochschild cohomology as endomorphisms of the
identity functor, as well as higher homotopy groups of the \emph{classifying
space of dg-categories} (i.e. the nerve of the category of dg-categories and
quasi-equivalences between them). The second application is the existence of a
good theory of localization for dg-categories, defined in terms of a natural
universal property. Our last application states that the dg-category of
(continuous) morphisms between the dg-categories of quasi-coherent (resp.
perfect) complexes on two schemes (resp. smooth and proper schemes) is
quasi-equivalent to the dg-category of quasi-coherent complexes (resp. perfect)
on their product.Comment: 50 pages. Few mistakes corrected, and some references added. Thm.
8.15 is new. Minor corrections. Final version, to appear in Inventione
Communicating Processes with Data for Supervisory Coordination
We employ supervisory controllers to safely coordinate high-level
discrete(-event) behavior of distributed components of complex systems.
Supervisory controllers observe discrete-event system behavior, make a decision
on allowed activities, and communicate the control signals to the involved
parties. Models of the supervisory controllers can be automatically synthesized
based on formal models of the system components and a formalization of the safe
coordination (control) requirements. Based on the obtained models, code
generation can be used to implement the supervisory controllers in software, on
a PLC, or an embedded (micro)processor. In this article, we develop a process
theory with data that supports a model-based systems engineering framework for
supervisory coordination. We employ communication to distinguish between the
different flows of information, i.e., observation and supervision, whereas we
employ data to specify the coordination requirements more compactly, and to
increase the expressivity of the framework. To illustrate the framework, we
remodel an industrial case study involving coordination of maintenance
procedures of a printing process of a high-tech Oce printer.Comment: In Proceedings FOCLASA 2012, arXiv:1208.432
- …
