Mostra el registre d'ítem simple
A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
dc.contributor.author | Rotondo, Damiano |
dc.contributor.author | Sánchez, Helem Sabina |
dc.contributor.author | Puig Cayuela, Vicenç |
dc.contributor.author | Escobet Canal, Teresa |
dc.contributor.author | Quevedo Casín, Joseba Jokin |
dc.contributor.other | Institut de Robòtica i Informàtica Industrial |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Minera, Industrial i TIC |
dc.date.accessioned | 2020-02-07T16:10:05Z |
dc.date.available | 2020-02-07T16:10:05Z |
dc.date.issued | 2019-01-01 |
dc.identifier.citation | Rotondo, D. [et al.]. A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks. "Neurocomputing", 1 Gener 2019, vol. 365, núm. 6, p. 21-30. |
dc.identifier.issn | 0925-2312 |
dc.identifier.uri | http://hdl.handle.net/2117/177220 |
dc.description.abstract | In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy. |
dc.format.extent | 10 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica |
dc.subject.other | Cyber-physical systems |
dc.subject.other | cyber attacks |
dc.subject.other | denial-of-service |
dc.subject.other | energy constraints |
dc.subject.other | networked control systems |
dc.subject.other | linear parameter varying systems |
dc.subject.other | switched systems |
dc.subject.other | virtual actuators. |
dc.title | A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks |
dc.type | Article |
dc.contributor.group | Universitat Politècnica de Catalunya. SAC - Sistemes Avançats de Control |
dc.identifier.doi | 10.1016/j.neucom.2019.06.050 |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.inspec | Classificació INSPEC::Cybernetics |
dc.relation.publisherversion | https://www.sciencedirect.com/science/article/pii/S092523121930935X |
dc.rights.access | Open Access |
local.identifier.drac | 25816254 |
dc.description.version | Postprint (author's final draft) |
dc.relation.projectid | info:eu-repo/grantAgreement/MINECO/2PE/MDM-2016-0656 |
dc.relation.projectid | info:eu-repo/grantAgreement/CSIC/DEOCS/DPI2016-76493-C3-3-R |
local.citation.author | Rotondo, D.; Sánchez, H.; Puig, V.; Escobet, T.; Quevedo, J. |
local.citation.publicationName | Neurocomputing |
local.citation.volume | 365 |
local.citation.number | 6 |
local.citation.startingPage | 21 |
local.citation.endingPage | 30 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [353]
-
Articles de revista [1.397]
-
Articles de revista [509]
-
Articles de revista [376]