A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) at...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Neurocomputing (Amsterdam) 2019-11, Vol.365, p.21-30
Hauptverfasser: Rotondo, Damiano, Sánchez, Helem Sabina, Puig, Vicenç, Escobet, Teresa, Quevedo, Joseba
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 30
container_issue
container_start_page 21
container_title Neurocomputing (Amsterdam)
container_volume 365
creator Rotondo, Damiano
Sánchez, Helem Sabina
Puig, Vicenç
Escobet, Teresa
Quevedo, Joseba
description In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.
doi_str_mv 10.1016/j.neucom.2019.06.050
format Article
fullrecord <record><control><sourceid>csuc_cross</sourceid><recordid>TN_cdi_csuc_recercat_oai_recercat_cat_2072_370081</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S092523121930935X</els_id><sourcerecordid>oai_recercat_cat_2072_370081</sourcerecordid><originalsourceid>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</originalsourceid><addsrcrecordid>eNp9UNtKAzEUDKJgrf6BD_mBXZPsJcmLUOoVCgpeXkNMztJtt5uSZFv692ZpwTcfDsPAzBxmELqlJKeE1nervIfBuE3OCJU5qXNSkTM0oYKzTDBRn6MJkazKWEHZJboKYUUI5ZTJCQozvGt9HHSHtUkQncd6u_VOmyVuEolLwAHM4AEb10fvOuwa3EPcO78Gixfv3zgcQoRNwENvwePt0AXI9q2NS7xxduh0TLoH94F1jNqswzW6aHTS3Jxwir6eHj_nL9ni7fl1PltkppBlzDjImv40lEtubEEqQXVVibKkQkqwrCjKEhqtK1FbTseaJTG2LnhdyQSVKKaIHnNNGIzyYMAbHZXT7R8ZjxHOVMEJETR5ypPHuxA8NGrr2432B0WJGsdWK3UcW41jK1KrNHay3R9tkPrsWvAqmBZ6A7ZNr6Kyrv0_4BeQs4re</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><source>Recercat</source><source>Elsevier ScienceDirect Journals</source><creator>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</creator><creatorcontrib>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</creatorcontrib><description>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</description><identifier>ISSN: 0925-2312</identifier><identifier>EISSN: 1872-8286</identifier><identifier>DOI: 10.1016/j.neucom.2019.06.050</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Classificació INSPEC ; Cyber attacks ; Cyber-physical systems ; Cybernetics ; Denial-of-service ; Energy constraints ; Informàtica ; Linear parameter varying systems ; Networked control systems ; Switched systems ; Virtual actuators ; Àrees temàtiques de la UPC</subject><ispartof>Neurocomputing (Amsterdam), 2019-11, Vol.365, p.21-30</ispartof><rights>2019 Elsevier B.V.</rights><rights>Attribution-NonCommercial-NoDerivs 3.0 Spain info:eu-repo/semantics/openAccess &lt;a href="http://creativecommons.org/licenses/by-nc-nd/3.0/es/"&gt;http://creativecommons.org/licenses/by-nc-nd/3.0/es/&lt;/a&gt;</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</citedby><cites>FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</cites><orcidid>0000-0002-8855-5582 ; 0000-0002-6364-6429</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S092523121930935X$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>230,314,776,780,881,3537,26951,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Rotondo, Damiano</creatorcontrib><creatorcontrib>Sánchez, Helem Sabina</creatorcontrib><creatorcontrib>Puig, Vicenç</creatorcontrib><creatorcontrib>Escobet, Teresa</creatorcontrib><creatorcontrib>Quevedo, Joseba</creatorcontrib><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><title>Neurocomputing (Amsterdam)</title><description>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</description><subject>Classificació INSPEC</subject><subject>Cyber attacks</subject><subject>Cyber-physical systems</subject><subject>Cybernetics</subject><subject>Denial-of-service</subject><subject>Energy constraints</subject><subject>Informàtica</subject><subject>Linear parameter varying systems</subject><subject>Networked control systems</subject><subject>Switched systems</subject><subject>Virtual actuators</subject><subject>Àrees temàtiques de la UPC</subject><issn>0925-2312</issn><issn>1872-8286</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>XX2</sourceid><recordid>eNp9UNtKAzEUDKJgrf6BD_mBXZPsJcmLUOoVCgpeXkNMztJtt5uSZFv692ZpwTcfDsPAzBxmELqlJKeE1nervIfBuE3OCJU5qXNSkTM0oYKzTDBRn6MJkazKWEHZJboKYUUI5ZTJCQozvGt9HHSHtUkQncd6u_VOmyVuEolLwAHM4AEb10fvOuwa3EPcO78Gixfv3zgcQoRNwENvwePt0AXI9q2NS7xxduh0TLoH94F1jNqswzW6aHTS3Jxwir6eHj_nL9ni7fl1PltkppBlzDjImv40lEtubEEqQXVVibKkQkqwrCjKEhqtK1FbTseaJTG2LnhdyQSVKKaIHnNNGIzyYMAbHZXT7R8ZjxHOVMEJETR5ypPHuxA8NGrr2432B0WJGsdWK3UcW41jK1KrNHay3R9tkPrsWvAqmBZ6A7ZNr6Kyrv0_4BeQs4re</recordid><startdate>20191106</startdate><enddate>20191106</enddate><creator>Rotondo, Damiano</creator><creator>Sánchez, Helem Sabina</creator><creator>Puig, Vicenç</creator><creator>Escobet, Teresa</creator><creator>Quevedo, Joseba</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>XX2</scope><orcidid>https://orcid.org/0000-0002-8855-5582</orcidid><orcidid>https://orcid.org/0000-0002-6364-6429</orcidid></search><sort><creationdate>20191106</creationdate><title>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</title><author>Rotondo, Damiano ; Sánchez, Helem Sabina ; Puig, Vicenç ; Escobet, Teresa ; Quevedo, Joseba</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c394t-7e961bf1797cd30581a558441899ed23344efaa586d71828640cd637659d63583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Classificació INSPEC</topic><topic>Cyber attacks</topic><topic>Cyber-physical systems</topic><topic>Cybernetics</topic><topic>Denial-of-service</topic><topic>Energy constraints</topic><topic>Informàtica</topic><topic>Linear parameter varying systems</topic><topic>Networked control systems</topic><topic>Switched systems</topic><topic>Virtual actuators</topic><topic>Àrees temàtiques de la UPC</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rotondo, Damiano</creatorcontrib><creatorcontrib>Sánchez, Helem Sabina</creatorcontrib><creatorcontrib>Puig, Vicenç</creatorcontrib><creatorcontrib>Escobet, Teresa</creatorcontrib><creatorcontrib>Quevedo, Joseba</creatorcontrib><collection>CrossRef</collection><collection>Recercat</collection><jtitle>Neurocomputing (Amsterdam)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rotondo, Damiano</au><au>Sánchez, Helem Sabina</au><au>Puig, Vicenç</au><au>Escobet, Teresa</au><au>Quevedo, Joseba</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks</atitle><jtitle>Neurocomputing (Amsterdam)</jtitle><date>2019-11-06</date><risdate>2019</risdate><volume>365</volume><spage>21</spage><epage>30</epage><pages>21-30</pages><issn>0925-2312</issn><eissn>1872-8286</eissn><abstract>In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.neucom.2019.06.050</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-8855-5582</orcidid><orcidid>https://orcid.org/0000-0002-6364-6429</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0925-2312
ispartof Neurocomputing (Amsterdam), 2019-11, Vol.365, p.21-30
issn 0925-2312
1872-8286
language eng
recordid cdi_csuc_recercat_oai_recercat_cat_2072_370081
source Recercat; Elsevier ScienceDirect Journals
subjects Classificació INSPEC
Cyber attacks
Cyber-physical systems
Cybernetics
Denial-of-service
Energy constraints
Informàtica
Linear parameter varying systems
Networked control systems
Switched systems
Virtual actuators
Àrees temàtiques de la UPC
title A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T14%3A01%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-csuc_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20virtual%20actuator%20approach%20for%20the%20secure%20control%20of%20networked%20LPV%20systems%20under%20pulse-width%20modulated%20DoS%20attacks&rft.jtitle=Neurocomputing%20(Amsterdam)&rft.au=Rotondo,%20Damiano&rft.date=2019-11-06&rft.volume=365&rft.spage=21&rft.epage=30&rft.pages=21-30&rft.issn=0925-2312&rft.eissn=1872-8286&rft_id=info:doi/10.1016/j.neucom.2019.06.050&rft_dat=%3Ccsuc_cross%3Eoai_recercat_cat_2072_370081%3C/csuc_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S092523121930935X&rfr_iscdi=true