53 research outputs found
A distributed networked approach for fault detection of large-scale systems
Networked systems present some key new challenges in the development of fault diagnosis architectures. This paper proposes a novel distributed networked fault detection methodology for large-scale interconnected systems. The proposed formulation incorporates a synchronization methodology with a filtering approach in order to reduce the effect of measurement noise and time delays on the fault detection performance. The proposed approach allows the monitoring of multi-rate systems, where asynchronous and delayed measurements are available. This is achieved through the development of a virtual sensor scheme with a model-based re-synchronization algorithm and a delay compensation strategy for distributed fault diagnostic units. The monitoring architecture exploits an adaptive approximator with learning capabilities for handling uncertainties in the interconnection dynamics. A consensus-based estimator with timevarying weights is introduced, for improving fault detectability in the case of variables shared among more than one subsystem. Furthermore, time-varying threshold functions are designed to prevent false-positive alarms. Analytical fault detectability sufficient conditions are derived and extensive simulation results are presented to illustrate the effectiveness of the distributed fault detection technique
Distributed fault diagnosis for process and sensor faults in a class of interconnected input-output nonlinear discrete-time systems
This paper presents a distributed fault diagnosis scheme able to deal with process and sensor faults in an integrated way for a
class of interconnected input–output nonlinear uncertain discrete-time systems. A robust distributed fault detection scheme
is designed, where each interconnected subsystem is monitored by its respective fault detection agent, and according to the
decisions of these agents, further information regarding the type of the fault can be deduced. As it is shown, a process fault
occurring in one subsystem can only be detected by its corresponding detection agent whereas a sensor fault in a subsystem
can be detected by either its corresponding detection agent or the detection agent of another subsystem that is affected by the
subsystem where the sensor fault occurred. This discriminating factor is exploited for the derivation of a high-level isolation
scheme.Moreover, process and sensor fault detectability conditions characterising quantitatively the class of detectable faults
are derived. Finally, a simulation example is used to illustrate the effectiveness of the proposed distributed fault detection
scheme
Optimal topology for distributed fault detection of large-scale systems
© 2015, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.The paper deals with the problem of defining the optimal topology for a distributed fault detection architecture for non-linear large-scale systems. A stochastic modelbased framework for diagnosis is formulated. The system structural graph is decomposed into subsystems and each subsystem is monitored by one local diagnoser. It is shown that overlapping of subsystems allows to improve the detectability properties of the monitoring architecture. Based on this theoretical result, an optimal decomposition design method is proposed, able to define the minimum number of detection units needed to guarantee the detectability of certain faults while minimizing the communication costs subject to some computation cost constraints. An algorithmic procedure is presented to solve the proposed optimal decomposition problem. Preliminary simulation results show the potential of the proposed approach
Stealthy integrity attacks for a class of nonlinear cyber-physical systems
This paper proposes a stealthy integrity attack generation methodology for a class of nonlinear cyber-physical systems. Geometric control theory and stability theory of incremental systems are used to design an attack generation scheme with stealthiness properties. An attack model is proposed as a closed-loop dynamical system with an arbitrary input signal. This model is developed based on a controlled invariant subspace that results from geometric control theory and is decoupled with the system outputs and the nonlinear function. The presence of the arbitrary signal in the attack model provides an additional degree of freedom and constitutes a novel component compared with existing results. The stealthiness property of the attack model is rigorously investigated based on the incremental stability of the closed-loop control system, and the incremental input-to-state stability of the anomaly detector. As a result, a sufficient condition in terms of the initial condition of the attack model is derived to guarantee stealthiness. Finally, a case study is presented to illustrate the effectiveness of the developed attack generation scheme
Cooperative constrained control of distributed agents with nonlinear dynamics and delayed information exchange: A stabilizing receding-horizon approach
This paper addresses the problem of cooperative control of a team of distributed agents with decoupled nonlinear discrete-time dynamics, which operate in a common environment and exchange-delayed information between them. Each agent is assumed to evolve in discrete-time, based on locally computed control laws, which are computed by exchanging delayed state information with a subset of neighboring agents. The cooperative control problem is formulated in a receding-horizon framework, where the control laws depend on the local state variables (feedback action) and on delayed information gathered from cooperating neighboring agents (feedforward action). A rigorous stability analysis exploiting the input-to-state stability properties of the receding-horizon local control laws is carried out. The stability of the team of agents is then proved by utilizing small-gain theorem results
Neural Adaptive Control of a Robot Joint Using Secondary Encoders
Using industrial robots for machining applications in flexible manufacturing
processes lacks a high accuracy. The main reason for the deviation is the
flexibility of the gearbox. Secondary Encoders (SE) as an additional, high precision
angle sensor offer a huge potential of detecting gearbox deviations. This paper
aims to use SE to reduce gearbox compliances with a feed forward, adaptive
neural control. The control network is trained with a second network for system
identification. The presented algorithm is capable of online application and optimizes
the robot accuracy in a nonlinear simulation
Passive attack detection for a class of stealthy intermittent integrity attacks
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyber-physical systems subject to process disturbances and measurement noise. A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model. The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values. In order to help detect such attacks, a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change, due to the attack, at a time prior to the attack occurrence time. A key characteristic of this residual is that its magnitude increases every time a new attack occurs. To estimate this unknown residual, an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices. The smoother design guarantees robustness with respect to process disturbances and measurement noise, and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices. The adaptive threshold is designed based on the estimated backward-in-time residual, and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology. Finally, a simulation example is used to demonstrate the effectiveness of the developed methodology
Identification of sensor replay attacks and physical faults for cyber-physical systems
This letter proposes a threat discrimination methodology for distinguishing between sensor replay attacks and sensor bias faults, based on the specially designed watermark integrated with adaptive estimation. For each threat type, a watermark is designed based on the changes that the threat imposes on the system. Threat discrimination conditions are rigorously investigated to characterize quantitatively the class of attacks and faults that can be discriminated by the proposed scheme. A simulation is presented to illustrate the effectiveness of our approach
Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event-triggered data communication, aiming to identify sensor bias faults from two possible types of threats: replay attacks and sensor bias faults. Event-triggered adaptive estimation and backward-in-time signal processing are the main techniques used. Specifically, distinct incremental systems of the event-triggered cyber-physical system resulting from the considered threat types are established for each threat type, and the difference between their inputs are found and utilized to discriminate the threats. An event-triggered adaptive estimator is then designed by using the event-triggered sampled data based on the system in the attack case, allowing to reconstruct the unknown increments in both the threat cases. The backward-in-time model of the incremental system in the replay attack case is proposed as the signal processor to process the reconstructions of the increments. Such a model can utilize the aforementioned input difference between the incremental systems such that its output has distinct quantitative properties in the attack case and in the fault case. The fault discrimination condition is rigorously investigated and characterizes quantitatively the class of distinguishable sensor bias faults. Finally, a numerical simulation is presented to illustrate the effectiveness of the proposed methodology
Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event-triggered data communication, aiming to identify sensor bias faults from two possible types of threats: replay attacks and sensor bias faults. Event-triggered adaptive estimation and backward-in-time signal processing are the main techniques used. Specifically, distinct incremental systems of the event-triggered cyber-physical system resulting from the considered threat types are established for each threat type, and the difference between their inputs are found and utilized to discriminate the threats. An event-triggered adaptive estimator is then designed by using the event-triggered sampled data based on the system in the attack case, allowing to reconstruct the unknown increments in both the threat cases. The backward-in-time model of the incremental system in the replay attack case is proposed as the signal processor to process the reconstructions of the increments. Such a model can utilize the aforementioned input difference between the incremental systems such that its output has distinct quantitative properties in the attack case and in the fault case. The fault discrimination condition is rigorously investigated and characterizes quantitatively the class of distinguishable sensor bias faults. Finally, a numerical simulation is presented to illustrate the effectiveness of the proposed methodology
- …