4.5 Article

A game-theoretic approach of cyberattack resilient constraint-following control for cyber-physical systems

Related references

Note: Only part of the references are listed.
Article Acoustics

Optimal robust constraints-following control for rail vehicle virtual coupling

Xinrong Zhang et al.

Summary: This paper presents the robust control problem of rail vehicle virtual coupling platoon and designs a robust controller based on the Udwadia-Kalaba equation. By introducing the concept of virtual coupling and establishing the dynamics model, the control objective is ensured. Through state transformation and constraint-following design, the controller achieves uniform boundedness and satisfies the bidirectional restriction of spatial constraint and spacing error. Numerical simulations validate the effectiveness of the proposed methods.

JOURNAL OF VIBRATION AND CONTROL (2023)

Article Robotics

Detection of Nonrandom Sign-Based Behavior for Resilient Coordination of Robotic Swarms

Paul J. Bonczek et al.

Summary: This study proposes a runtime monitoring framework that detects and isolates hidden attacks within a multirobot system by monitoring changes in the signed residual. It triggers alarms when an attack is discovered.

IEEE TRANSACTIONS ON ROBOTICS (2022)

Article Engineering, Civil

Path Tracking Control for Underactuated Vehicles With Matched-Mismatched Uncertainties: An Uncertainty Decomposition Based Constraint-Following Approach

Zeyu Yang et al.

Summary: This paper proposes a robust path tracking control method using a constraint-following approach to guide underactuated autonomous vehicles towards desired paths. By decomposing uncertainties and estimating matched uncertainty, a robust control method is designed to achieve excellent tracking performance even in the presence of time-varying uncertainties.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Leader-follower Stackelberg game oriented adaptive robust constraint-following control design for fuzzy exoskeleton robot systems

Siyang Yang et al.

Summary: In this paper, an adaptive robust constraint-following control scheme based on leader-follower Stackelberg game is proposed for uncertain mechanical systems. The proposed method is successfully applied to a lower limb exoskeleton robot system for rehabilitation training.

INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Anti-saturation resilient control of cyber-physical systems under actuator attacks

Yue Zhao et al.

Summary: This paper presents a resilient control strategy for cyber-physical systems (CPSs) under actuator saturation caused by cyberattacks. The strategy includes an extended state observer and an anti-saturation resilient controller to estimate and resist attacks while maintaining system stability and resilience.

INFORMATION SCIENCES (2022)

Article Automation & Control Systems

Cooperative Game Approach to Robust Control Design for Fuzzy Dynamical Systems

Rongrong Yu et al.

Summary: This study uses fuzzy set theory to describe uncertain dynamical systems and proposes a robust control method. By using cooperative game and performance indices, the optimal solution can be found while ensuring control performance.

IEEE TRANSACTIONS ON CYBERNETICS (2022)

Article Automation & Control Systems

Accelerated Dual Neural Network Controller for Visual Servoing of Flexible Endoscopic Robot With Tracking Error, Joint Motion, and RCM Constraints

Zhiwei Cui et al.

Summary: This study focuses on the requirements for endoscope in minimally invasive surgery and proposes a dual neural network (DNN) controller for a flexible endoscopic robot (FER) with 10 DOF. A control scheme involving tracking error, joint motion, and RCM constraints is established and a DNN solver with adjustable parameters is designed to improve convergence rate and antinoise ability. Simulations and experiments verify the effectiveness of the control scheme.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2022)

Article Automation & Control Systems

Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging

Satadru Dey et al.

Summary: This article addresses the cybersecurity challenges associated with the large scale deployment of plug-in electric vehicles (PEVs) by exploring control-oriented approaches. Two algorithms for detecting cyberattacks on PEV battery packs during charging are discussed, including a static detector and a dynamic detector. A filter-based design approach for the dynamic detector is proposed to consider stability, robustness, and attack sensitivity as multiobjective criteria. Theoretical analysis and simulation studies show the effectiveness of the algorithms in detecting denial-of-charging (DoC) and overcharging attacks, indicating the superiority of the dynamic detector.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2021)

Article Automation & Control Systems

An Efficient Blockchain-Based Authentication Scheme for Energy-Trading in V2G Networks

Shubhani Aggarwal et al.

Summary: Vehicle-to-grid (V2G) networks enable energy-trading between EVs and CSs in the smart grid, but face security and privacy challenges. Researchers propose a blockchain-based solution to ensure secure transactions.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Adaptive constraint-following control for uncertain nonlinear mechanical systems with measurement error

Zeyu Yang et al.

Summary: This study introduces an adaptive constraint-following control scheme for an uncertain nonlinear mechanical system, which aims to approximately follow prescribed constraints using adaptive control. Through Lyapunov minimax analysis, it is demonstrated that the resulting control ensures the uniform boundedness and uniform ultimate boundedness of the system, despite uncertainties and measurement errors.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2021)

Article Engineering, Biomedical

Non-invasive wearable seizure detection using long-short-term memory networks with transfer learning

Mona Nasseri et al.

Summary: The study developed an adaptively trained deep neural network algorithm that combined wrist-worn device data and transfer learning method to effectively detect motor and non-motor seizures in various environments. The performance of the algorithm was evaluated multiple times, showing better results in detecting motor seizures.

JOURNAL OF NEURAL ENGINEERING (2021)

Article Engineering, Electrical & Electronic

Wireless Networked Multirobot Systems in Smart Factories

Kwang-Cheng Chen et al.

Summary: Smart manufacturing based on AI and ICT will be a major driver of the digital economy in the coming decades. To achieve flexible production, it is essential to holistically integrate wireless networking, computing, and automatic control technologies. This article discusses the challenges of this complex system engineering from a wireless networking perspective.

PROCEEDINGS OF THE IEEE (2021)

Article Automation & Control Systems

MAS-Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks

Chao Deng et al.

Summary: This article proposes a new distributed resilient control approach for cyber-physical systems with communication delays and DoS attacks. Adaptive distributed observers and adaptive distributed resilient observers are designed by introducing buffer and resilient mechanisms to eliminate heterogeneous behavior caused by communication delays and resist DoS attacks.

IEEE TRANSACTIONS ON CYBERNETICS (2021)

Article Computer Science, Information Systems

Vulnerability Assessment of 6G-Enabled Smart Grid Cyber-Physical Systems

Muhammad Tariq et al.

Summary: The proposed graphics-processing-unit-enabled adaptive robust state estimator aims to address the vulnerability of cyber-physical systems to cyberattacks caused by next-generation wireless communication and networking technologies. It provides online parametric state estimation through two levels of estimation, improving system reliability for secure communication and load management. The algorithm demonstrates lower time complexity and higher accuracy in estimating system state variables during or after cyberattacks compared to existing techniques.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

6G Cellular Networks and Connected Autonomous Vehicles

Jianhua He et al.

Summary: This article discusses the research on 6G as well as the rapid evolution of V2X to CAV and key technologies of 6G. It explores two complementary research directions, 6G for CAVs and CAVs for 6G.

IEEE NETWORK (2021)

Article Automation & Control Systems

Resilient Control of Cyber-Physical System Using Nonlinear Encoding Signal Against System Integrity Attacks

Youngjun Joo et al.

Summary: This article presents an attack-resilient control structure for enhancing the security of a cyber-physical system against stealthy system integrity attacks. The proposed structure can detect stealthy attacks and maintain nominal performance, while using chaotic oscillators for secure communication to prevent eavesdropping of transmitted signals. Resilience against malicious attacks and robustness under time delay and nonlinear components of the CPS structure are investigated, and simulations for validation are performed on a quadruple-tank process.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2021)

Article Automation & Control Systems

Dynamic Decentralized Periodic Event-Triggered Control for Wireless Cyber-Physical Systems

Anqi Fu et al.

Summary: This paper introduces the method of Dynamic DPETC (DDPETC) by adding dynamic variables to improve decentralized periodic event-triggered control systems, ensuring the dependence of control systems on local information, and improving system stability and performance. In specific implementation, controllers make control action decisions based on local sensor data, and the transmission of control actions is determined by ETMs.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2021)

Article Automation & Control Systems

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems

Beibei Li et al.

Summary: The study introduces a novel federated deep learning scheme named DeepFed for detecting cyber threats against industrial CPSs. By designing a new intrusion detection model and federated learning framework, the research successfully achieves secure detection of various cyber threats.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack

Jinliang Liu et al.

Summary: This article investigates the problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. A new model of hybrid cyber attack is established for filter design, and an adaptive event-triggered scheme is applied to save communication resource. Moreover, a novel adaptive-event-triggered filtering error model is established and sufficient conditions for system stability are obtained through Lyapunov stability theory and linear matrix inequality technique.

IEEE TRANSACTIONS ON CYBERNETICS (2021)

Article Engineering, Electrical & Electronic

Cross-Layer Distributed Control Strategy for Cyber Resilient Microgrids

Quan Zhou et al.

Summary: The paper proposes a cross-layer control strategy to enhance microgrid resilience against cyberattacks, which can maintain normal microgrid operations when there are no cyberattacks and effectively mitigate the impacts of cyberattacks. The stability of the proposed control strategy is demonstrated under different scenarios, and its effectiveness against cyberattacks is validated through simulations in a 12-bus microgrid system.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Automation & Control Systems

A survey on attack detection, estimation and control of industrial cyber-physical systems

Dan Zhang et al.

Summary: The paper surveys recent advances on security issues of industrial cyber-physical systems (ICPSs), focusing on two typical types of attacks - Denial-of-Service (DoS) attack and Deception attack. Recent results on attack detection, estimation, and control of ICPSs are presented. Current studies are classified and summarized based on different system modeling and analysis methods, discussing advantages and disadvantages of various methodologies. Potential future research directions on secure ICPSs are also highlighted.

ISA TRANSACTIONS (2021)

Article Computer Science, Information Systems

WEDMS: An advanced mean shift clustering algorithm for LDoS attacks detection

Dan Tang et al.

AD HOC NETWORKS (2020)

Article Automation & Control Systems

Observer-Based Control for Cyber-Physical Systems With Periodic DoS Attacks via a Cyclic Switching Strategy

Yanzheng Zhu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2020)

Article Automation & Control Systems

Designing Robust Control for Mechanical Systems: Constraint Following and Multivariable Optimization

Qinqin Sun et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Resilient Model Predictive Control of Cyber-Physical Systems Under DoS Attacks

Qi Sun et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Mechanical

Cooperative game-oriented optimal design in constraint-following control of mechanical systems

Qinqin Sun et al.

NONLINEAR DYNAMICS (2020)

Editorial Material Computer Science, Information Systems

Special issue: Advances and trends on cognitive cyber-physical systems

Flavia C. Delicato et al.

AD HOC NETWORKS (2019)

Article Computer Science, Information Systems

Stackelberg Game-Theoretic Low Probability of Intercept Performance Optimization for Multistatic Radar System

Chenguang Shi et al.

ELECTRONICS (2019)

Article Computer Science, Information Systems

Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework

Huanhuan Yuan et al.

INFORMATION SCIENCES (2018)

Article Automation & Control Systems

A delay-aware cyber-physical architecture for wide-area control of power systems

Damoon Soudbakhsh et al.

CONTROL ENGINEERING PRACTICE (2017)