Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks

Modern networked control systems are cyber-physical systems (CPSs), in which the cyber space is tightly integrated with the physical world and human intervention. Forming the basis of future smart ...

[1]  L. Chisci,et al.  Feasibility in predictive control of constrained linear systems: the output feedback case , 2002 .

[2]  Proceedings of the 1st ACM Workshop on Cyber-Physical System Security , 2015, CPSS@ASIACSS.

[3]  David Q. Mayne,et al.  Robust output feedback model predictive control of constrained linear systems , 2006, Autom..

[4]  Marilyn Wolf,et al.  Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.

[5]  Yan Song,et al.  RMPC-based security problem for polytopic uncertain system subject to deception attacks and persistent disturbances , 2017 .

[6]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[8]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[9]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[10]  Guang-Hong Yang,et al.  Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.

[11]  Basil Kouvaritakis,et al.  Stabilizable regions of receding horizon predictive control with input constraints , 1999 .

[12]  Luigi Chisci,et al.  Systems with persistent disturbances: predictive control with restricted constraints , 2001, Autom..

[13]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[14]  B. Kouvaritakis,et al.  Receding horizon output feedback control for linear systems with input saturation , 2001 .

[15]  Lei Shu,et al.  Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges , 2018, IEEE Access.

[16]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[17]  Mohamed Darouach,et al.  A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.

[18]  Maria Letizia Corradini,et al.  A sliding-mode scheme for monitoring malicious attacks in cyber-physical systems , 2017 .

[19]  Dan Ye,et al.  Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology , 2020, IEEE Transactions on Cybernetics.

[20]  Huiping Li,et al.  Output feedback predictive control for constrained linear systems with intermittent measurements , 2013, Syst. Control. Lett..

[21]  Aiko Pras,et al.  Exploiting traffic periodicity in industrial control networks , 2016, Int. J. Crit. Infrastructure Prot..

[22]  Nils Ole Tippenhauer,et al.  On Attacker Models and Profiles for Cyber-Physical Systems , 2016, ESORICS.

[23]  David Q. Mayne,et al.  Constrained model predictive control: Stability and optimality , 2000, Autom..

[24]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[25]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[26]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[27]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.