In this paper, the resilient control problem for constrained cyber–physical systems subject to false data injections is addressed. The core of the proposed approach consists in defining an ad-hoc versatile framework whose main feature consists in the ability of being geared to different classes of attacks. This is formally achieved by resorting to the receding horizon philosophy that is fully exploited for detection, countermeasures and control purposes. In particular, set-theoretic model predictive arguments are combined with the perturbation analysis and sequential quadratic programming to reduce as much as possible the occurrence of refresh procedures on the communication network when resilient command actions are no longer available. Further, one of its main merits consists in the dismissal of constructive assumptions existing in recent competitors. In this respect, the framework is customized for covert attacks by specifying actuation/detection phases and proving feasibility and closed-loop stability properties.

Cyber–physical systems subject to false data injections: A model predictive control framework for resilience operations

Franze G.;Famularo D.;Lucia W.;Tedesco F.
2023-01-01

Abstract

In this paper, the resilient control problem for constrained cyber–physical systems subject to false data injections is addressed. The core of the proposed approach consists in defining an ad-hoc versatile framework whose main feature consists in the ability of being geared to different classes of attacks. This is formally achieved by resorting to the receding horizon philosophy that is fully exploited for detection, countermeasures and control purposes. In particular, set-theoretic model predictive arguments are combined with the perturbation analysis and sequential quadratic programming to reduce as much as possible the occurrence of refresh procedures on the communication network when resilient command actions are no longer available. Further, one of its main merits consists in the dismissal of constructive assumptions existing in recent competitors. In this respect, the framework is customized for covert attacks by specifying actuation/detection phases and proving feasibility and closed-loop stability properties.
2023
Cyber attacks
Model predictive control
Networked control systems
Resilient control
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.11770/346339
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 6
social impact