A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) at...
Gespeichert in:
Veröffentlicht in: | Neurocomputing (Amsterdam) 2019-11, Vol.365, p.21-30 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 30 |
---|---|
container_issue | |
container_start_page | 21 |
container_title | Neurocomputing (Amsterdam) |
container_volume | 365 |
creator | Rotondo, Damiano Sánchez, Helem Sabina Puig, Vicenç Escobet, Teresa Quevedo, Joseba |
description | In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy. |
doi_str_mv | 10.1016/j.neucom.2019.06.050 |
format | Article |
fullrecord | <record><control><sourceid>csuc_cross</sourceid><recordid>TN_cdi_csuc_recercat_oai_recercat_cat_2072_370081</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S092523121930935X</els_id><sourcerecordid>oai_recercat_cat_2072_370081</sourcerecordid><originalsourceid>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</originalsourceid><addsrcrecordid>eNp9UNtKAzEUDKJgrf6BD_mBXZPsJcmLUOoVCgpeXkNMztJtt5uSZFv692ZpwTcfDsPAzBxmELqlJKeE1nervIfBuE3OCJU5qXNSkTM0oYKzTDBRn6MJkazKWEHZJboKYUUI5ZTJCQozvGt9HHSHtUkQncd6u_VOmyVuEolLwAHM4AEb10fvOuwa3EPcO78Gixfv3zgcQoRNwENvwePt0AXI9q2NS7xxduh0TLoH94F1jNqswzW6aHTS3Jxwir6eHj_nL9ni7fl1PltkppBlzDjImv40lEtubEEqQXVVibKkQkqwrCjKEhqtK1FbTseaJTG2LnhdyQSVKKaIHnNNGIzyYMAbHZXT7R8ZjxHOVMEJETR5ypPHuxA8NGrr2432B0WJGsdWK3UcW41jK1KrNHay3R9tkPrsWvAqmBZ6A7ZNr6Kyrv0_4BeQs4re</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><source>Recercat</source><source>Elsevier ScienceDirect Journals</source><creator>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</creator><creatorcontrib>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</creatorcontrib><description>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</description><identifier>ISSN: 0925-2312</identifier><identifier>EISSN: 1872-8286</identifier><identifier>DOI: 10.1016/j.neucom.2019.06.050</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Classificació INSPEC ; Cyber attacks ; Cyber-physical systems ; Cybernetics ; Denial-of-service ; Energy constraints ; Informàtica ; Linear parameter varying systems ; Networked control systems ; Switched systems ; Virtual actuators ; Àrees temàtiques de la UPC</subject><ispartof>Neurocomputing (Amsterdam), 2019-11, Vol.365, p.21-30</ispartof><rights>2019 Elsevier B.V.</rights><rights>Attribution-NonCommercial-NoDerivs 3.0 Spain info:eu-repo/semantics/openAccess <a href="http://creativecommons.org/licenses/by-nc-nd/3.0/es/">http://creativecommons.org/licenses/by-nc-nd/3.0/es/</a></rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</citedby><cites>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</cites><orcidid>0000-0002-8855-5582 ; 0000-0002-6364-6429</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S092523121930935X$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>230,314,776,780,881,3537,26951,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Rotondo, Damiano</creatorcontrib><creatorcontrib>Sánchez, Helem Sabina</creatorcontrib><creatorcontrib>Puig, Vicenç</creatorcontrib><creatorcontrib>Escobet, Teresa</creatorcontrib><creatorcontrib>Quevedo, Joseba</creatorcontrib><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><title>Neurocomputing (Amsterdam)</title><description>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</description><subject>Classificació INSPEC</subject><subject>Cyber attacks</subject><subject>Cyber-physical systems</subject><subject>Cybernetics</subject><subject>Denial-of-service</subject><subject>Energy constraints</subject><subject>Informàtica</subject><subject>Linear parameter varying systems</subject><subject>Networked control systems</subject><subject>Switched systems</subject><subject>Virtual actuators</subject><subject>Àrees temàtiques de la UPC</subject><issn>0925-2312</issn><issn>1872-8286</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>XX2</sourceid><recordid>eNp9UNtKAzEUDKJgrf6BD_mBXZPsJcmLUOoVCgpeXkNMztJtt5uSZFv692ZpwTcfDsPAzBxmELqlJKeE1nervIfBuE3OCJU5qXNSkTM0oYKzTDBRn6MJkazKWEHZJboKYUUI5ZTJCQozvGt9HHSHtUkQncd6u_VOmyVuEolLwAHM4AEb10fvOuwa3EPcO78Gixfv3zgcQoRNwENvwePt0AXI9q2NS7xxduh0TLoH94F1jNqswzW6aHTS3Jxwir6eHj_nL9ni7fl1PltkppBlzDjImv40lEtubEEqQXVVibKkQkqwrCjKEhqtK1FbTseaJTG2LnhdyQSVKKaIHnNNGIzyYMAbHZXT7R8ZjxHOVMEJETR5ypPHuxA8NGrr2432B0WJGsdWK3UcW41jK1KrNHay3R9tkPrsWvAqmBZ6A7ZNr6Kyrv0_4BeQs4re</recordid><startdate>20191106</startdate><enddate>20191106</enddate><creator>Rotondo, Damiano</creator><creator>Sánchez, Helem Sabina</creator><creator>Puig, Vicenç</creator><creator>Escobet, Teresa</creator><creator>Quevedo, Joseba</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>XX2</scope><orcidid>https://orcid.org/0000-0002-8855-5582</orcidid><orcidid>https://orcid.org/0000-0002-6364-6429</orcidid></search><sort><creationdate>20191106</creationdate><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><author>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Classificació INSPEC</topic><topic>Cyber attacks</topic><topic>Cyber-physical systems</topic><topic>Cybernetics</topic><topic>Denial-of-service</topic><topic>Energy constraints</topic><topic>Informàtica</topic><topic>Linear parameter varying systems</topic><topic>Networked control systems</topic><topic>Switched systems</topic><topic>Virtual actuators</topic><topic>Àrees temàtiques de la UPC</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rotondo, Damiano</creatorcontrib><creatorcontrib>Sánchez, Helem Sabina</creatorcontrib><creatorcontrib>Puig, Vicenç</creatorcontrib><creatorcontrib>Escobet, Teresa</creatorcontrib><creatorcontrib>Quevedo, Joseba</creatorcontrib><collection>CrossRef</collection><collection>Recercat</collection><jtitle>Neurocomputing (Amsterdam)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rotondo, Damiano</au><au>Sánchez, Helem Sabina</au><au>Puig, Vicenç</au><au>Escobet, Teresa</au><au>Quevedo, Joseba</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</atitle><jtitle>Neurocomputing (Amsterdam)</jtitle><date>2019-11-06</date><risdate>2019</risdate><volume>365</volume><spage>21</spage><epage>30</epage><pages>21-30</pages><issn>0925-2312</issn><eissn>1872-8286</eissn><abstract>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.neucom.2019.06.050</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-8855-5582</orcidid><orcidid>https://orcid.org/0000-0002-6364-6429</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0925-2312 |
ispartof | Neurocomputing (Amsterdam), 2019-11, Vol.365, p.21-30 |
issn | 0925-2312 1872-8286 |
language | eng |
recordid | cdi_csuc_recercat_oai_recercat_cat_2072_370081 |
source | Recercat; Elsevier ScienceDirect Journals |
subjects | Classificació INSPEC Cyber attacks Cyber-physical systems Cybernetics Denial-of-service Energy constraints Informàtica Linear parameter varying systems Networked control systems Switched systems Virtual actuators Àrees temàtiques de la UPC |
title | A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T14%3A01%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-csuc_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20virtual%20actuator%20approach%20for%20the%20secure%20control%20of%20networked%20LPV%20systems%20under%20pulse-width%20modulated%20DoS%20attacks&rft.jtitle=Neurocomputing%20(Amsterdam)&rft.au=Rotondo,%20Damiano&rft.date=2019-11-06&rft.volume=365&rft.spage=21&rft.epage=30&rft.pages=21-30&rft.issn=0925-2312&rft.eissn=1872-8286&rft_id=info:doi/10.1016/j.neucom.2019.06.050&rft_dat=%3Ccsuc_cross%3Eoai_recercat_cat_2072_370081%3C/csuc_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S092523121930935X&rfr_iscdi=true |