An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks

Size: px
Start display at page:

Download "An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks"

Transcription

1 258 IEEE/CAA JOURNAL OF AUTOMATICA SINICA VOL 2 NO 3 JULY 25 An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks Yumei Li Holger Voos Mohamed Darouach Changchun Hua Abstract In order to compromise a target control system successfully hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system However the problem of detecting multiple cyber-attacks has been hardly investigated so far Therefore this paper deals with the detection of multiple stochastic cyber-attacks aiming at multiple communication channels of a control system Our goal is to design a detector for the control system under multiple cyberattacks Based on frequency-domain transformation technique auxiliary detection tools an algebraic detection approach is proposed By applying the presented approach residual information caused by different attacks is obtained respectively anomalies in the control system are detected Sufficient necessary conditions guaranteeing the detectability of the multiple stochastic cyber-attacks are obtained The presented detection approach is simple straightforward Finally two simulation examples are provided the simulation results show that the detection approach is effective feasible Index Terms Cyber-attack detection control system multiple stochastic cyber-attacks I INTRODUCTION AS networks become ubiquitous more more industrial control systems are connected to open public networks control systems are increased the risk of exposure to cyber-attacks Control systems are vulnerable to cyber-threats successful attacks on them can cause serious consequences [ 3 Therefore the security safety issues in controlled systems have been recently realized they are currently attracting considerable attention [4 2 Some researchers focused on the cyber security of water systems [3 6 7 Further works considered cyber-attacks on smart grid systems [4 8 2 In order to detect as well as identify isolate these cyber-attacks as early as possible different detection approaches were presented For example [3 investigated the problem of false data injection attacks against state estimation in electric power grids [4 proposed a model predictive approach for cyber-attack detection [5 presented a stochastic cyber-attack detection scheme based on frequency-domain transformation technique [6 considered robust H cyber-attacks estimation for control systems [7 Manuscript received September 3 24; accepted January This work was supported by the Fonds National de la Recherche Luxembourg (CO/IS/265 (SeSaNet)) National Natural Science Foundation of China ( ) Recommended by Associate Editor Xinping Guan Citation: Yumei Li Holger Voos Mohamed Darouach Changchun Hua An algebraic detection approach for control systems under multiple stochastic cyber-attacks IEEE/CAA Journal of Automatica Sinica 25 2(3): Yumei Li Holger Voos are with the Interdisciplinary Centre for Security Reliability Trust (SnT) University of Luxembourg Luxembourg L-272 Luxembourg ( yumeili@unilu; holgervoos@unilu) Mohamed Darouach is with the Centre de la Recherche en Automatique de Nancy (CRAN) Universite de Lorraine Longwy 544 France ( modar@ptlu) Changchun Hua is with the Institute of Electrical Engineering Yanshan University Qinhuangdao 664 China ( cch@ysueducn) proposed a detection algorithm by investigating the frequency spectrum distribution of the network traffic References [8 2 used consensus dynamics in networked multi-agent systems including malicious agents As far as we know no existing literatures deal with the problem of multiple cyberattacks In practice however hackers might attempt to launch multiple attacks aiming at multiple communication channels of a control system in order to create attacks that are more stealthy thus more likely to succeed When a hacker launches two or more cyber-attacks against a control process usually it is claimed that the control system suffers from multiple cyber-attacks The fact that no research currently deals with the detection of multiple cyber-attacks on a control process motivates our research in detection of multiple cyberattacks This paper deals with the problem to detect multiple stochastic cyber-attacks aiming at multiple communication channels of a control system We present an algebraic detection approach based on the frequency-domain transformation The basic idea is to use appropriate observers to generate residual information related to cyber-attacks An anomaly detector for the control system under multiple stochastic cyber-attacks stochastic disturbances is derived The main contributions in the paper are as follows We first propose a control system with multiple stochastic cyber-attacks that satisfy a Markovian stochastic process In addition we also introduce the stochastic attack models that are aiming at a specific controller comm input channel or sensor measurement output channel Second based on the frequency-domain transformation technique auxiliary detection tools the error dynamics of the control system is transformed into algebraic equations We consider possible cyber-attacks as non-zero solutions of the algebraic equations the residuals as their constant vectors By analyzing the ranks of the stochastic system matrix the auxiliary stochastic system matrices the residual information caused by attacks from different communication channel is obtained respectively Furthermore based on the obtained residual information we are able to determine the detectability of these cyber-attacks The sufficient necessary conditions guaranteeing that these attacks are detectable or undetectable are obtained Finally we provide two simulation examples to illustrate the effectiveness of our results In Example we consider a control system with stochastic noises We detect possible stochastic cyber-attacks which are aiming at three different controller comm input channels on the actuator In Example 2 we use the quadruple-tank process (QTP) as described in [2 We also detect two possible cyber-attacks on the QTP These simulation results show that the proposed attack detection approach is effective feasible For convenience we adopt the following notations: E{ } is the mathematical expectation operator; dim( ) denotes the di-

2 LI et al: AN ALGEBRAIC DETECTION APPROACH FOR CONTROL SYSTEMS UNDER MULTIPLE STOCHASTIC CYBER-ATTACKS 259 mension of given vector; L 2 Ϝ([ ); R n ) is the space of nonanticipative stochastic processes II PROBLEM STATEMENT Consider the following control system with multiple stochastic cyber-attacks aiming at specific controller comm input channels sensor measurement output channels ( ) n ẋ(t) = Ax(t) + B u(t) + α i (t)f i a a i (t) + E w(t) x() = x n 2 y(t) = C x(t) + β j (t)h j a s j(t) + E 2 v(t) () j= where x(t) R r is the state vector u(t) R m is the control input y(t) R p is the measurement output a a i (t) R i = n a s j (t) R j = n 2 denote the actuator cyber-attack aiming at the i-th controller comm input channel the sensor cyber-attack aiming at the j-th sensor measurement output channel respectively A B C E E 2 are known constant matrices w(t) v(t) are stochastic noises (w(t) v(t) L 2 Ϝ([ ); R n )) f i h j are the attacked coefficients α i (t) β i (t) are Markovian stochastic processes with the binary state ( or ) which satisfy the following probability E{α i (t)} = Prob {α i (t) = } = ρ i E{β j (t)} = Prob {β j (t) = } = σ j i = n m j = n 2 r (2) Herein the event α i (t) = (or β j (t) = ) shows that the i-th controller comm input channel on the actuator (or the j-th sensor measurement output channel on the sensor) is subject to an actuator cyber-attack a a i (t) (or a sensor cyberattack a s j (t)); α i(t) = (or β j (t) = ) means no attack on the i-th (or the j-th)channel ρ i [ (or σ j [ ) reflects the occurrence probability of the event that the actuator (or the sensor) of the system is subject to a cyber-attack a a i (t) (or a s j (t)) α i(t) β j (t) are independent from each other they are also independent from the stochastic noises w(t) v(t) the initial state x The control input matrix B the output state matrix C are expressed as the following column vector groups respectively B = [ b b i b m C = [ c c j c r (3) where b i is the i-th column vector of matrix B c j is the j-th column vector of matrix C And the control input u(t) the system state x(t) are written as u(t) = u (t) u 2 (t) u m (t) x(t) = x (t) x 2 (t) x r (t) (4) A Modeling a Stochastic Cyber-attacks on a Specified Communication Channel In order to increase the success chance of an attack to intrude more stealthily hackers may attempt to launch stochastic cyber-attacks aiming at one or several special communication channels of a control system In a stochastic data denial-of-service (DoS) attack the objective of hackers is to prevent the actuator from receiving control comms or the controller from receiving sensor measurements Therefore by compromising devices preventing them from sending data attacking the routing protocols jamming the communication channels flooding the communication network with rom data so on hackers can launch a stochastic data DoS attack that satisfies Markovian stochastic processes In a stochastic data deception attack hackers attempt to prevent the actuator or the sensor from receiving an integrity data by sending false information ũ(t) u(t) or ỹ(t) y(t) from controllers or sensors The false information includes: injection of a bias data that cannot be detected in the system or an incorrect time of observing a measurement; a wrong sender identity an incorrect control input or an incorrect sensor measurement The hacker can launch these attacks by compromising some controllers or sensors or by obtaining the secret keys In this work we model stochastic data DoS attacks stochastic data deception attacks which hackers possibly launch on a control system aiming at a specific controller comm input channel or sensor measurement output channel ) A stochastic DoS attack preventing the actuators from receiving control comm of the i-th control channel can be modelled as α i (t) { } t t i = n m f i = (5) m a a i (t) = u i (t) 2) A stochastic DoS attack preventing the sensors from receiving sensor measure of the j-th output channel can be modelled as β j (t) { } t t j = n 2 r h j = (6) a s j(t) = x j r Moreover if the following conditions are satisfied: m α i (t)f i a a i (t) = u(t) (7) r β j (t)h j a s j(t) = x(t) (8) j=

3 26 IEEE/CAA JOURNAL OF AUTOMATICA SINICA VOL 2 NO 3 JULY 25 these stochastic attacks mentioned above completely deny the services on the actuator on the sensors respectively 3) A stochastic data deception attack preventing the actuator from a correct control input of the i-th control channel can be modelled as α i (t) { } t t i = n m f i = (9) m a a i (t) = u i (t) + d a i (t) or a a i (t) = d a i (t) 4) A stochastic data deception attack preventing the sensor from a correct sensor measurement of the j-th output channel can be modelled as β j (t) { } t t j = n 2 r h j = () r a s j(t) = x j + d s j(t) or a s j(t) = d s j(t) where d a i (t) ds j (t) are deceptive data that hackers attempt to launch on the actuator the sensor respectively Now let T d a i y(s) = C(sI A) b i which is the transfer function from the attack d a i (t) to output measure y(t) When hackers launch a data deception attack a a i (t) = da i (t) on the actuator to make T d a i y(s) = a zero dynamic attack occurs on the actuator Obviously a zero dynamic attack is undetectable In addition it is not possible for a hacker to launch a zero dynamic attack on the sensor since the transfer function from the attack d s j (t) to output y(t) is T d s j y (s) = c j Remark In the stochastic attack models (5) () the attacked coefficients f i h j are column vectors Herein only the element in the i-th row is the rest elements are in f i which implies that only the i-th control channel of a control system is attacked Similarly only the element in the j-th row is the rest elements are in h j which implies that only the j-th output channel of a control system is attacked Remark 2 To attack a target hackers may launch multiple attacks aiming at multiple communication channels so that the aggression opportunities are increased the attack target is compromised more stealthily successfully For example in order to effectively disturb the formation control of multivehicle systems a hacker could launch multiple stochastic cyber-attacks which are respectively aiming at different communication links among these vehicles or aiming at multiple controller comm input channels of a single vehicle Obviously the detection isolation of multiple cyber-attacks are very important in the formation control of multi-vehicle systems Therefore the research on multiple cyber-attacks is significant requires further research III MAIN RESULTS In this section we present the approach to the anomaly detection We assume that the following conditions are satisfied: ) the pair (A B) is controllable; 2) (A C) is observable For simplification of the discussion we ignore the influence of control inputs in the remainder of this paper because they do not affect the residual when there are no modeling errors in the system transfer matrix Therefore system () can be rewritten as follows: n ẋ(t) = Ax(t) + α i (t)bf i a a i (t) + E w(t) x() = x n 2 y(t) = Cx(t) + β j (t)ch j a s j(t) + E 2 v(t) () j= We set up the following anomaly detector: x(t) = A x(t) + Br(t) x() = r(t) = y(t) C x(t) (2) where B is the detector gain matrix r(t) represents the output residual Let e(t) = x(t) x(t) then we obtain the following error dynamics: ė(t) = Ae(t) + F i a i (t) + E d(t) with the matrices the vectors r(t) = Ce(t) + A = (A BC) H i a i (t) + E 2 d(t) (3) H i = [ β i (t)ch i F i = [ α i (t)bf i β i (t) BCh i E = [ E BE 2 E 2 = [ E 2 (4) a i (t) = [ [ a a i (t) w(t) a s i (t) d(t) = v(t) where cyber-attacks a a i (t) as i (t) i = n the vectors describing the attacked coefficients f i h i i = n satisfy the following conditions n max{n n 2 } { a a n +(t) = a a n +2(t) = = a a n(t) = n = n 2 > n a s n 2+(t) = a s n 2+2(t) = = a s n(t) = n = n > n 2 { f n+ = f n+2 = = f n = n = n 2 > n h n2+ = h n2+2 = = h n = n = n > n 2 Before presenting the main results we give the following definition lemma

4 LI et al: AN ALGEBRAIC DETECTION APPROACH FOR CONTROL SYSTEMS UNDER MULTIPLE STOCHASTIC CYBER-ATTACKS 26 Definition For anomaly detector error dynamics if a cyber-attack on a control system leads to zero output residual then the cyber-attack is undetectable If T dr (s) = C(sI A) E + E 2 denotes the transfer function from stochastic disturbance d(t) to output residual r(t) the robust stability condition of error dynamic (3) is given in term of the following lemma Lemma [6 When all stochastic events α i (t) = β i (t) = (i = n) there are the following conclusions: ) The error dynamics (3) without disturbances is asymptotically stable if there exists a symmetric positive definite matrix P > a matrix X such that the following linear matrix inequality (LMI) holds Ψ = A T P + P A C T X T XC + C T C < (5) 2) The error dynamics (3) with disturbances d(t) ( d(t) L 2 Ϝ([ ); R n )) is robustly stable if T dr (s) < if there exists a symmetric positive definite matrix P > a matrix X such that the following LMI holds Ψ P E XE 2 + C T E 2 I < (6) I + E2 T E 2 When the LMIs above are solvable the detector gain matrix is given by B = P X A Algebraic Detection Scheme for Multiple Stochastic Cyberattacks Aiming at Multiple Communication Channels In this section using the frequency-domain description of the system we transform the error dynamics (3) into the following equation: where X(s) = Q(s)X(s) = B(s) (7) [ A si F Q(s) = F n E C H H n E 2 e(s) a (s) a n (s) d(s) B(s) = ( r(s) ) Further in order to obtain effective results we introduce the mathematical expectation of the stochastic matrix Q(s) as follows: [ A si E(F E(Q(s)) = ) E(F n ) E (8) C E(H ) E(H n ) E 2 where E(F i ) = [ ρ i Bf i σ i BChi E(H i ) = [ σ i Ch i i = n Then the system (7) can be described as E(Q(s))X(s) = B(s) (9) the equation (9) can be rewritten as E(Q(s))X(s) = E( Q i (s))x i (s) = B i (s) where E( Q i (s)) = X i (s) = B i (s) = r(s) = e(s) a i (s) d(s) ( r i (s) r i (s) A si n C n ) E(F i ) E(H i ) E n E 2 n Consider the following stochastic matrix: [ A si E(F i ) E E(Q i (s)) = C E(H i ) E 2 Since ranke( Q i (s)) = ranke(q i (s)) we introduce the following auxiliary error dynamics ė(t) = Ae(t) + F i a i (t) + E d(t) r(t) = Ce(t) + H i a i (t) + E 2 d(t) i = n (2) the auxiliary stochastic equations E(Q i (s))x i = B i (s) i = n (2) Remark 3 Here since the matrices F i H i include the stochastic parameters α i (t) β i (t) the system matrix Q(s) correspondingly includes these stochastic parameters E(Q(s)) E(Q i (s)) include stochastic probabilities ρ i σ i as well which take values in [ Therefore they are stochastic matrices Remark 4 In this work we introduce the auxiliary mathematical tools (2) (2) The auxiliary error dynamics (2) represents the fact that the control system is only subjected to a stochastic cyber-attack a i (t) on the i-th communication channel Applying the auxiliary equation (2) we can obtain the information of residual r i (t) that is caused by the cyber-attack a i (t) In addition the detector gain matrix B can be determined according to Lemma Now applying the rank of the stochastic matrix we obtain the following theorem Theorem For system () we assume that all of these stochastic matrices E(Q(s)) E(Q i (s)) (i = n) have full column normal rank All of these cyber-attacks a i (s) (i = n ( a i (s) G)) when s = z are undetectable if only if there exists z such that ranke(q(z )) < dim(x(z )) (22) ranke(q i (z )) < dim(x i (z )) i = n (23) Herein G is a set of undetectable cyber-attacks Proof (If) Assume that there exists z C such that conditions (22) (23) hold for all a i (z ) G it becomes obvious that z is an invariant zero [22 of the detector error system (3)

5 262 IEEE/CAA JOURNAL OF AUTOMATICA SINICA VOL 2 NO 3 JULY 25 the auxiliary system (2) Then all of the equations in (9) (2) are homogeneous ie B(z ) = B i (z ) = Therefore the output residual r i (z ) = i = n r(z ) = n r i(z ) = as well By Definition all of these cyber-attacks a i (s) i n when s = z are undetectable (Only if) Assume that all of these cyber-attacks a i (s) i = n when s = z are undetectable then there must exist a z C such that the residual r i (z ) = r(z ) = n r i(z ) = Therefore all of the equations in (9) (2) are homogeneous If we assume that all of matrices E(Q(z )) E(Q i (z )) have full column rank then all of these homogeneous equations have only have one zero solution However this contradicts with the conditions that X s=z X i s=z i = n are solutions to (9) (2) respectively Therefore the assumptions are false only conditions (22) (23) are true Theorem 2 For system () we assume that all of stochastic matrices E(Q(s)) E(Q i (s)) (i = n) have full column normal rank All of these cyber-attacks a i (s) (i = n ( a i (s) G)) are detectable if only if the following conditions always hold for any z C: ranke(q(z )) = dim(x(z )) (24) ranke(q i (z )) = dim(x i (z )) i = n (25) Herein G is a set of detectable cyber-attacks Proof (If) Assuming that conditions (24) (25) always hold for any z C it is obvious that the stochastic matrices E(Q(z )) E(Q i (z )) (i = n) have full column rank Then the equation E(Q(z ))X(z ) = B(z ) (26) the auxiliary stochastic equations E(Q i (z ))X i = B i (z ) i = n (27) have one only one solution In the following we proof by contradiction Assume that residual r(z ) = r i (z ) = i = n then equations (26) (27) has one only one zero solution ie X s=z = X i s=z = i = n However this violates the given condition a i (z ) G ie X s=z X i s=z i = n Therefore r(z ) r i (z ) i = n these cyber-attacks a i (s) ( a i (s) G) i = n for any s = z are detectable (Only if) Assume that there exists a z C which satisfies conditions (22) (23) Since all of the stochastic matrices E(Q(s)) E(Q i (s)) (i = n) have full column ranks according to Theorem these cyber-attacks a i (s) i = n are undetectable as s = z However this is in contradiction with the given condition that all of these cyber-attacks a i (s) i = n are detectable for any s = z Therefore the assumption is false only ranke(q(z )) = dim(x(z )) ranke(q i (z )) = dim(x i (z )) i = n are true Furthermore we can obtain the following corollary according to Theorem Theorem 2 Corollary For system () assume that all of stochastic matrices E(Q(s)) E(Q i (s)) (i = n) have full column normal rank If there exists z C such that ranke(q(z )) < dim(x(z )) (28) then there are the following conclusions ) The cyber-attack a i (z ) ( a i (s) G) is detectable if only if ranke(q i (z )) = dim(x i (z )) (29) 2) The cyber-attack a j (z ) ( a j (s) G) is undetectable if only if ranke(q j (z )) < dim(x j (z )) (3) IV SIMULATION RESULTS In this section we provide two simulation examples to illustrate the effectiveness of our results In Example we consider a control system under three stochastic cyber-attacks a stochastic noise We detect two possible stochastic data DoS attacks a possible stochastic data deception attack which are aiming at three controller comm input channels on the actuator In Example 2 we use the laboratory process as presented in [2 which consists of four interconnected water tanks We will also detect possible cyber-attacks on QTP controlled through a wireless communication network Example Consider the following system with a stochastic noise w(t) ẋ(t) = Ax(t) + Bu(t) + E w(t) x() = x (3) y(t) = Cx(t) with the following parameters: 8 2 A = B = E = 4 7 C =

6 LI et al: AN ALGEBRAIC DETECTION APPROACH FOR CONTROL SYSTEMS UNDER MULTIPLE STOCHASTIC CYBER-ATTACKS 263 Assume that it is subjected to two stochastic data DoS attacks a stochastic data deception attack on the actuator aiming at three controller comm input channels ie α (t) { } t t f = a a (t) = u (t) (32) α 2 (t) { } t t f 2 = (33) a a 2(t) = u 2 (t) + b a 2(t) α 3 (t) { } t t Fig The time responses of the residual the system state under the noise f 3 = a a 3(t) = u 3 (t) (34) As mentioned before we ignore the control input since it does not affect the residual By applying Lemma the robust detector gain matrix can be obtained as follows: B = Set the initial conditions as x() = [ T x() = [ T When the stochastic events α (t) = α 2 (t) = α 3 (t) = occur the system is not under any cyber-attacks Fig displays the time responses of the residual the system state under stochastic noise w(t) only which shows that the system is robustly stable When the stochastic events α (t) = α 2 (t) = α 3 (t) = occur the system is under multiple cyber-attacks We take the attack probabilities ρ = ρ 2 = 8 ρ 3 = 5 the stochastic matrix rank(e(q(s))) = 9 rank(e(q(z ))) = 9 rank(e(q i (z ))) = 7 (i = 2 3) which shows that rank(e(q(z ))) rank(e(q i (z ))) (i = 2 3) have always full column rank for any z According to Theorem 2 the three attacks are detectable Fig 2 displays the noise signal the attack signals while Fig 3 shows the time responses of the residual the system state under three attacks noise Fig 4 Fig 5 Fig 6 give the time responses of the residual under the attack a a (t) a a 2(t) a a 3(t) respectively Simultaneously they show the corresponding attack signals The simulation results underline that these cyber-attacks can be effectively detected if the conditions in Theorem 2 are satisfied Example 2 Consider the model of the QTP in [2 ẋ = Ax + Bu (35) y = Cx Fig 2 The noise signal the attack signals with the following parameters: A = [ 5 C = B = Assume that it is subjected to two stochastic data deception attacks on the actuator ie α (t) { } t t [ f = (36) a a (t) = b a (t)

7 264 IEEE/CAA JOURNAL OF AUTOMATICA SINICA VOL 2 NO 3 JULY 25 Fig 3 The time responses of the residual the system state under three attacks noise Fig 6 The time responses of the residual under attack a a 3(t) the attack signal a a 3(t) Fig 4 The time responses of the residual under attack a a (t) the attack signal a a (t) Fig 7 The time responses of the residual the system state without attacks α 2 (t) { } t t [ f 2 = (37) Fig 5 The time responses of the residual under attack a a 2(t) the attack signal a a 2(t) a a 2(t) = b a 2(t) The detector gain matrix can be obtained as follows: B = We set the initial conditions as x() = [ T x() = [ 4 5 T When the stochastic events α (t) = α 2 (t) = occur Fig 7 visualizes that the system (35) is asymptotically stable When the stochastic events α (t) = α 2 (t) = occur the attack probabilities are ρ = 8 ρ 2 = 5 we have stochastic matrix rank(e(q(s))) = 6 however there exists a z = 27 such that rank(e(q(z ))) = 5 rank(e(q i (z ))) = 5 (i = 2) Aiming at two different con-

8 LI et al: AN ALGEBRAIC DETECTION APPROACH FOR CONTROL SYSTEMS UNDER MULTIPLE STOCHASTIC CYBER-ATTACKS 265 trol channels it is possible for the hacker to launch two stochastic data deception attacks as follows: b a (t) = 74e 27t b a 2(t) = e 27t such that the transfer function from attacks to residual is zero Therefore it is difficult to detect these stealthy attacks Fig 8 displays the time responses of the residual the system state under the two attacks a a (t) a a 2(t) which shows that these attacks when s = z = 27 could not be detected by original model However applying the auxiliary tools (2) (2) according to Corollary these attacks can also be detected Fig 9 displays the attack signal a a (t) the responses of the residual under this attack Fig shows the attack signal a a 2(t) the responses of residual under this attack Obviously applying Corollary the two stochastic data deception attacks can be detected effectively Fig The time responses of residual under the attack a a 2(t) the attack signal a a 2(t) because hackers might launch multiple attacks aiming at one target so that the aggression opportunities are increased the attack target can be compromised more stealthily successfully For example the hacker is able to simultaneously launch DoS attacks deception attacks replay attacks that are respectively aiming at different communication channels of a control system The main work here is focused on novel cyber-attack detection schemes that allow the detection of multiple stochastic attacks in order to protect control systems against a wide range of possible attack models We give two simulation examples the results of which demonstrate that the detection approaches proposed in this paper are feasible effective REFERENCES Fig 8 The time responses of the residual the system state under attacks a a (t) a a 2(t) [ Bier V Oliveros S Samuelson L Choosing what to protect: strategic defensive allocation against an unknown attacker Journal of Public Economic Theory 27 9(4): [2 Amin S Schwartz G A Sastry S S Security of interdependent identical networked control systems Automatica 23 49(): [3 Slay J Miller M Lessons learned from the Maroochy water breach Critical Infrastructure Protection : [4 Andersson G Esfahani P M Vrakopoulou M Margellos K Lygeros J Teixeira A Dan G Serg H Johansson K H Cyber-security of SCADA systems Session: Cyber-Physical System Security in a Smart Grid Environment 2 [5 Mo Y L Sinopoli B False data injection attacks in control systems In: Proceedings of the st Workshop on Secure Control Systems Stockholm Sweden 2 Fig 9 The time responses of residual under the attack a a (t) the attack signal a a (t) V CONCLUSION This paper presents a cyber-attack detection approach for control systems under multiple stochastic cyber-attacks disturbances The proposed problem is significant in practice [6 Amin S Litrico X Sastry S Bayen A M Cyber security of water SCADA systems: (I) analysis experimentation of stealthy deception attacks IEEE Transactions on Control Systems Technology 23 2(5): [7 Eliades D G Polycarpou M M A fault diagnosis security framework for water systems IEEE Transactions on Control Systems Technology 2 8(6): [8 Metke A R Ekl R L Security technology for smart grid networks IEEE Transactions on Smart Grid 2 (): 99 7

9 266 IEEE/CAA JOURNAL OF AUTOMATICA SINICA VOL 2 NO 3 JULY 25 [9 Sridhar S Hahn A Govindarasu M Cyber-physical system security for the electric power grid Proceedings of the IEEE 22 (): [ Mohsenian-Rad A H Leon-Garcia A Distributed internet-based load altering attacks against smart power grids IEEE Transactions on Smart Grid 2 2(4): [ Sardana A Joshi R C Dual-level attack detection characterization for networks under DDoS In: Proceedings of the 2 International Conference on Availability Reliability Security Krakow: IEEE [2 Weimer J Kar S Johansson K H Distributed detection isolation of topology attacks in power networks In: Proceedings of the 22 HiCoNS 2 Beijing China [3 Liu Y Reiter M K Ning P False data injection attacks against state estimation in electric power grids In: Proceedings of the 29 ACM Conference on Computer Communications Security Chicago IL USA: ACM [4 Rosich A Voos H Li Y M Darouach M A model predictive approach for cyber-attack detection mitigation in control systems In: Proceedings of the 52nd Annual Conference on Decision Control Firenze: IEEE [5 Li Y M Voos H Rosich A Darouach M A stochastic cyber-attack detection scheme for stochastic control systems based on frequencydomain transformation technique In: Proceedings of the 8th International Conference on Network System Security Xi an China: Springer [6 Li Y M Voos H Darouach M Robust H fault estimation for control systems under stochastic cyber-attacks In: Proceedings of the 33rd Chinese Control Conference Nanjing China: ORBilu [7 Hashim F Kibria M R Jamalipour A Detection of DoS DDoS attacks in NGMN using frequency domain analysis In: Proceedings of the 4th Asia-Pacific Conference on Communications Tokyo: IEEE 28 5 [8 Sundaram S Hadjicostis C N Distributed function calculation via linear iterative strategies in the presence of malicious agents IEEE Transactions on Automatic Control 2 56(7): [9 Teixeira A Sberg H Johansson K H Networked control systems under cyber attacks with applications to power networks In: Proceedings of the 2 American Control Conference Baltimore MD: IEEE [2 Pasqualetti F Bichi A Bullo F Consensus computation in unreliable networks: a system theoretic approach IEEE Transactions on Automatic Control 22 57(): 9 4 [2 Johansson K H The quadruple-tank process: a multivariable laboratory process with an adjustable zero IEEE Transactions on Control Systems Technology 2 8(3): Yumei Li received her Ph D degree in control theory control engineering from Yanshan University China in 29 She is currently a research associate at the Interdisciplinary Centre of Security Reliability Trust (SnT) at the University of Luxembourg Her research interests include intelligent control stochastic systems secure resilient automation control systems distributed control cooperative control of multiagent system Corresponding author of this paper Holger Voos studied electrical engineering at Saarl University Germany received his Ph D degree in automatic control from the Technical University of Kaiserslautern Germany in 22 He is currently a professor at the University of Luxembourg in the Faculty of Science Technology Communication Research Unit of Engineering Sciences He is the head of the Automatic Control Research Group of the Automation Robotics Research Group at the Interdisciplinary Centre of Security Reliability Trust (SnT) at the University of Luxembourg His research interests include distributed networked control model predictive control safe secure automation systems with applications in mobile space robotics energy systems biomedicine Mohamed Darouach graduated from Ecole Mohammadia d Ingnieurs Rabat Morocco in 978 received the Docteur Ingnieur Doctor of Sciences degrees from Nancy University France in respectively From 978 to 986 he was associate professor professor of automatic control at Ecole Hassania des Travaux Publics Casablanca Morocco Since 987 he is a professor at University de Lorraine He has been a vice director of the Research Center in Automatic Control of Nancy (CRAN UMR 739 Nancy-University CNRS) from 25 to 23 He obtained a degree Honoris Causa from the Technical University of IASI Since in 2 He is a member of the Scientific Council of Luxembourg University Since 23 he is a vice director of the University Institute of Technology of Longwy (University de Lorraine) He held invited positions at University of Alberta Edmonton His research interests include span theoretical control observers design control of large-scale uncertain systems with applications Changchun Hua received his Ph D degree from Yanshan University China in 25 He was a research fellow in National University of Singapore Carleton University Canada University of Duisburg-Essen Germany Now he is a professor at Yanshan University China His research interests include nonlinear control systems control systems design over network teleoperation systems intelligent control [22 Zhou K M Doyle J C Glover K Robust Optimal Control Upper Saddle River NJ USA: Prentice-Hall Inc 996

Dynamic State Estimation in the Presence of Compromised Sensory Data

Dynamic State Estimation in the Presence of Compromised Sensory Data 2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015. Osaka, Japan Dynamic State Estimation in the Presence of Compromised Sensory Data Yorie Nakahira, Yilin Mo Abstract

More information

Coding Sensor Outputs for Injection Attacks Detection

Coding Sensor Outputs for Injection Attacks Detection 53rd IEEE Conference on Decision and Control December 15-17, 2014 Los Angeles, California, USA Coding Sensor Outputs for Injection Attacks Detection Fei Miao Quanyan Zhu Miroslav Pajic George J Pappas

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Control Systems Security Metrics and Risk Management

Control Systems Security Metrics and Risk Management KTH ROYAL INSTITUTE OF TECHNOLOGY Control Systems Security Metrics and Risk Management Henrik Sandberg hsan@kth.se Department of Automatic Control, KTH, Stockholm, Sweden DISC Summer School, The Hague,

More information

Distributed Detection of Cyber Attacks and Faults for Power Systems

Distributed Detection of Cyber Attacks and Faults for Power Systems Preprints of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 214 Distributed Detection of Cyber Attacks and Faults for Power Systems Hiroaki

More information

Antagonistic Control

Antagonistic Control Antagonistic Control Thomas Lipp and Stephen Boyd March 6, 25 Abstract In antagonistic control we find an input sequence that maximizes (or at least makes large) an objective that is minimized in typical

More information

Resilient Distributed Optimization Algorithm against Adversary Attacks

Resilient Distributed Optimization Algorithm against Adversary Attacks 207 3th IEEE International Conference on Control & Automation (ICCA) July 3-6, 207. Ohrid, Macedonia Resilient Distributed Optimization Algorithm against Adversary Attacks Chengcheng Zhao, Jianping He

More information

Revealing Stealthy Attacks in Control Systems

Revealing Stealthy Attacks in Control Systems Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Revealing Stealthy Attacks in Control Systems André Teixeira, Iman Shames, Henrik Sandberg, and Karl H. Johansson

More information

A graph-theoretical characterization of power network vulnerabilities

A graph-theoretical characterization of power network vulnerabilities A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo Abstract This work is concerned with the security of a power network against

More information

On the Failure of Power System Automatic Generation Control due to Measurement Noise

On the Failure of Power System Automatic Generation Control due to Measurement Noise 1 On the Failure of Power System Automatic Generation Control due to Measurement Noise Jiangmeng Zhang and Alejandro. D. Domínguez-García University of Illinois at Urbana-Champaign Urbana, Illinois 6181

More information

Quantifying Cyber-Security for Networked Control Systems

Quantifying Cyber-Security for Networked Control Systems Quantifying Cyber-Security for Networked Control Systems André Teixeira 1, Kin Cheong Sou 2, Henrik Sandberg 1, and Karl H. Johansson 1 1 ACCESS Linnaeus Centre and Automatic Control Lab, KTH Royal Institute

More information

Complements to Full Order Observers Design for Linear Systems with Unknown Inputs

Complements to Full Order Observers Design for Linear Systems with Unknown Inputs Author manuscript, published in "Applied Mathematics Letters 22, 7 (29) 117-1111" DOI : 1.116/j.aml.28.11.4 omplements to Full Order Observers Design for Linear Systems with Unknown Inputs M. Darouach

More information

MRAGPC Control of MIMO Processes with Input Constraints and Disturbance

MRAGPC Control of MIMO Processes with Input Constraints and Disturbance Proceedings of the World Congress on Engineering and Computer Science 9 Vol II WCECS 9, October -, 9, San Francisco, USA MRAGPC Control of MIMO Processes with Input Constraints and Disturbance A. S. Osunleke,

More information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information Dynamic Attack Detection in Cyber-Physical 1 Systems with Side Initial State Information Yuan Chen, Soummya Kar, and José M. F. Moura arxiv:1503.07125v1 math.oc] 24 Mar 2015 Abstract This paper studies

More information

ANOMALY DETECTION IN LIQUID PIPELINES USING MODELING, CO-SIMULATION AND DYNAMICAL ESTIMATION

ANOMALY DETECTION IN LIQUID PIPELINES USING MODELING, CO-SIMULATION AND DYNAMICAL ESTIMATION Chapter 8 ANOMALY DETECTION IN LIQUID PIPELINES USING MODELING, CO-SIMULATION AND DYNAMICAL ESTIMATION Saed Alajlouni and Vittal Rao Abstract Historically, supervisory control and data acquisition (SCADA)

More information

Robust Output Feedback Control for Fractional Order Nonlinear Systems with Time-varying Delays

Robust Output Feedback Control for Fractional Order Nonlinear Systems with Time-varying Delays IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 3, NO. 4, OCTOBER 06 477 Robust Output Feedback Control for Fractional Order Nonlinear Systems with Time-varying Delays Changchun Hua, Tong Zhang, Yafeng Li,

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Secure Control Against Replay Attacks

Secure Control Against Replay Attacks Secure Control Against Replay Attacks Bruno Sinopoli, Yilin Mo Department of Electrical and Computer Engineering, Carnegie Mellon Trust Autumn 2009 Conference Bruno Sinopoli (Carnegie Mellon) Secure Control

More information

Actuator Fault diagnosis: H framework with relative degree notion

Actuator Fault diagnosis: H framework with relative degree notion Actuator Fault diagnosis: H framework with relative degree notion D Ichalal B Marx D Maquin J Ragot Evry Val d Essonne University, IBISC-Lab, 4, rue de Pevoux, 92, Evry Courcouronnes, France (email: dalilichalal@ibiscuniv-evryfr

More information

Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang and Horacio J.

Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang and Horacio J. 604 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 56, NO. 3, MARCH 2009 Robust Gain Scheduling Synchronization Method for Quadratic Chaotic Systems With Channel Time Delay Yu Liang

More information

Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks

Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks Iman Shames 1 André H. Teixeira 2 Henrik Sandberg 2 Karl H. Johansson 2 1 The Australian National

More information

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 12, December 2013 pp. 4793 4809 CHATTERING-FREE SMC WITH UNIDIRECTIONAL

More information

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids 1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,

More information

False Data Injection Attacks in Control Systems

False Data Injection Attacks in Control Systems False Data Injection Attacks in Control Systems Yilin Mo, Bruno Sinopoli Department of Electrical and Computer Engineering, Carnegie Mellon University First Workshop on Secure Control Systems Bruno Sinopoli

More information

H State-Feedback Controller Design for Discrete-Time Fuzzy Systems Using Fuzzy Weighting-Dependent Lyapunov Functions

H State-Feedback Controller Design for Discrete-Time Fuzzy Systems Using Fuzzy Weighting-Dependent Lyapunov Functions IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL 11, NO 2, APRIL 2003 271 H State-Feedback Controller Design for Discrete-Time Fuzzy Systems Using Fuzzy Weighting-Dependent Lyapunov Functions Doo Jin Choi and PooGyeon

More information

Attack-Resilient H 2, H, and l 1 State Estimator

Attack-Resilient H 2, H, and l 1 State Estimator Attack-Resilient H, H, and l State Estimator Yorie Nakahira, Student Member, IEEE, and Yilin Mo, Member, IEEE, Abstract This paper considers the secure state estimation problem for noisy systems in the

More information

Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters

Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters William Niemira Rakesh B. Bobba Peter Sauer William H. Sanders University of Illinois at Urbana-Champaign

More information

A new robust delay-dependent stability criterion for a class of uncertain systems with delay

A new robust delay-dependent stability criterion for a class of uncertain systems with delay A new robust delay-dependent stability criterion for a class of uncertain systems with delay Fei Hao Long Wang and Tianguang Chu Abstract A new robust delay-dependent stability criterion for a class of

More information

Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach

Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach Florian Dörfler, Fabio Pasqualetti, and Francesco Bullo Abstract Future power grids will be required to

More information

Research on Consistency Problem of Network Multi-agent Car System with State Predictor

Research on Consistency Problem of Network Multi-agent Car System with State Predictor International Core Journal of Engineering Vol. No.9 06 ISSN: 44-895 Research on Consistency Problem of Network Multi-agent Car System with State Predictor Yue Duan a, Linli Zhou b and Yue Wu c Institute

More information

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities Research Journal of Applied Sciences, Engineering and Technology 7(4): 728-734, 214 DOI:1.1926/rjaset.7.39 ISSN: 24-7459; e-issn: 24-7467 214 Maxwell Scientific Publication Corp. Submitted: February 25,

More information

Design of Unknown Input Functional Observers for Delayed Singular Systems with State Variable Time Delay

Design of Unknown Input Functional Observers for Delayed Singular Systems with State Variable Time Delay WSEAS TRANSACTONS on SYSTEMS and CONTROL M. Khadhraoui M. Ezzine H. Messaoud M. Darouach Design of Unknown nput Functional Observers for Delayed Singular Systems State Variable Time Delay M. Khadhraoui

More information

Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights

Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights International Journal of Automation and Computing 3, June 05, 33-39 DOI: 0.007/s633-05-0889-7 Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights Hui-Na

More information

Performance of Flocking-Based Control Schemes in Smart Grid Applications

Performance of Flocking-Based Control Schemes in Smart Grid Applications Performance of Flocking-Based Control Schemes in Smart Grid Applications Abdallah K. Farraj Eman M. Hammad Jin Wei Deepa Kundur Karen L. Butler-Purry Department of Electrical and Computer Engineering,

More information

State estimation of uncertain multiple model with unknown inputs

State estimation of uncertain multiple model with unknown inputs State estimation of uncertain multiple model with unknown inputs Abdelkader Akhenak, Mohammed Chadli, Didier Maquin and José Ragot Centre de Recherche en Automatique de Nancy, CNRS UMR 79 Institut National

More information

Adaptive Dynamic Inversion Control of a Linear Scalar Plant with Constrained Control Inputs

Adaptive Dynamic Inversion Control of a Linear Scalar Plant with Constrained Control Inputs 5 American Control Conference June 8-, 5. Portland, OR, USA ThA. Adaptive Dynamic Inversion Control of a Linear Scalar Plant with Constrained Control Inputs Monish D. Tandale and John Valasek Abstract

More information

Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer

Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer Preprints of the 19th World Congress The International Federation of Automatic Control Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer Fengming Shi*, Ron J.

More information

Security of Cyber-Physical Systems

Security of Cyber-Physical Systems KTH ROYAL INSTITUTE OF TECHNOLOGY Security of Cyber-Physical Systems Henrik Sandberg hsan@kth.se Department of Automatic Control, KTH, Stockholm, Sweden 7th ocps PhD School on Cyber-Physical Systems, Lucca,

More information

Robust Observer for Uncertain T S model of a Synchronous Machine

Robust Observer for Uncertain T S model of a Synchronous Machine Recent Advances in Circuits Communications Signal Processing Robust Observer for Uncertain T S model of a Synchronous Machine OUAALINE Najat ELALAMI Noureddine Laboratory of Automation Computer Engineering

More information

Tracking Control of a Class of Differential Inclusion Systems via Sliding Mode Technique

Tracking Control of a Class of Differential Inclusion Systems via Sliding Mode Technique International Journal of Automation and Computing (3), June 24, 38-32 DOI: 7/s633-4-793-6 Tracking Control of a Class of Differential Inclusion Systems via Sliding Mode Technique Lei-Po Liu Zhu-Mu Fu Xiao-Na

More information

Sufficient Conditions for Controllability and Observability of Serial and Parallel Concatenated Linear Systems

Sufficient Conditions for Controllability and Observability of Serial and Parallel Concatenated Linear Systems Sufficient Conditions for Controllability and Observability of Serial and Parallel Concatenated Linear Systems M. I. García-Planas J. L. Domínguez-García and L. E. Um Abstract This paper deals with the

More information

IN Part-I paper [1], the proposed control protocol under. Strategic Topology Switching for Security Part II: Detection & Switching Topologies

IN Part-I paper [1], the proposed control protocol under. Strategic Topology Switching for Security Part II: Detection & Switching Topologies 1 Strategic Topology Switching for Security Part II: Detection & Switching Topologies Yanbing Mao, Emrah Akyol, and Ziang Zhang arxiv:1711.11181v1 cs.ma 3 Nov 17 Abstract This two-part paper considers

More information

A ROBUST ITERATIVE LEARNING OBSERVER BASED FAULT DIAGNOSIS OF TIME DELAY NONLINEAR SYSTEMS

A ROBUST ITERATIVE LEARNING OBSERVER BASED FAULT DIAGNOSIS OF TIME DELAY NONLINEAR SYSTEMS Copyright IFAC 15th Triennial World Congress, Barcelona, Spain A ROBUST ITERATIVE LEARNING OBSERVER BASED FAULT DIAGNOSIS OF TIME DELAY NONLINEAR SYSTEMS Wen Chen, Mehrdad Saif 1 School of Engineering

More information

On Design of Reduced-Order H Filters for Discrete-Time Systems from Incomplete Measurements

On Design of Reduced-Order H Filters for Discrete-Time Systems from Incomplete Measurements Proceedings of the 47th IEEE Conference on Decision and Control Cancun, Mexico, Dec. 9-11, 2008 On Design of Reduced-Order H Filters for Discrete-Time Systems from Incomplete Measurements Shaosheng Zhou

More information

Delay-Dependent Stability Criteria for Linear Systems with Multiple Time Delays

Delay-Dependent Stability Criteria for Linear Systems with Multiple Time Delays Delay-Dependent Stability Criteria for Linear Systems with Multiple Time Delays Yong He, Min Wu, Jin-Hua She Abstract This paper deals with the problem of the delay-dependent stability of linear systems

More information

Consensus-Based Distributed Optimization with Malicious Nodes

Consensus-Based Distributed Optimization with Malicious Nodes Consensus-Based Distributed Optimization with Malicious Nodes Shreyas Sundaram Bahman Gharesifard Abstract We investigate the vulnerabilities of consensusbased distributed optimization protocols to nodes

More information

ROBUST PASSIVE OBSERVER-BASED CONTROL FOR A CLASS OF SINGULAR SYSTEMS

ROBUST PASSIVE OBSERVER-BASED CONTROL FOR A CLASS OF SINGULAR SYSTEMS INTERNATIONAL JOURNAL OF INFORMATON AND SYSTEMS SCIENCES Volume 5 Number 3-4 Pages 480 487 c 2009 Institute for Scientific Computing and Information ROBUST PASSIVE OBSERVER-BASED CONTROL FOR A CLASS OF

More information

MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY

MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Jrl Syst Sci & Complexity (2009) 22: 722 731 MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Yiguang HONG Xiaoli WANG Received: 11 May 2009 / Revised: 16 June 2009 c 2009

More information

Delay-dependent stability and stabilization of neutral time-delay systems

Delay-dependent stability and stabilization of neutral time-delay systems INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL Int. J. Robust Nonlinear Control 2009; 19:1364 1375 Published online 6 October 2008 in Wiley InterScience (www.interscience.wiley.com)..1384 Delay-dependent

More information

LINEAR QUADRATIC OPTIMAL CONTROL BASED ON DYNAMIC COMPENSATION. Received October 2010; revised March 2011

LINEAR QUADRATIC OPTIMAL CONTROL BASED ON DYNAMIC COMPENSATION. Received October 2010; revised March 2011 International Journal of Innovative Computing, Information and Control ICIC International c 22 ISSN 349-498 Volume 8, Number 5(B), May 22 pp. 3743 3754 LINEAR QUADRATIC OPTIMAL CONTROL BASED ON DYNAMIC

More information

CYBER-Physical Systems (CPS) are systems that smoothly

CYBER-Physical Systems (CPS) are systems that smoothly 1 Optimal Linear Cyber-Attack on Remote State Estimation Ziyang Guo, Dawei Shi, Karl Henrik Johansson, Ling Shi Abstract Recent years have witnessed the surge of interest of security issues in cyber-physical

More information

Model reduction of interconnected systems

Model reduction of interconnected systems Model reduction of interconnected systems A Vandendorpe and P Van Dooren 1 Introduction Large scale linear systems are often composed of subsystems that interconnect to each other Instead of reducing the

More information

Unbiased minimum variance estimation for systems with unknown exogenous inputs

Unbiased minimum variance estimation for systems with unknown exogenous inputs Unbiased minimum variance estimation for systems with unknown exogenous inputs Mohamed Darouach, Michel Zasadzinski To cite this version: Mohamed Darouach, Michel Zasadzinski. Unbiased minimum variance

More information

Consensus Control of Multi-agent Systems with Optimal Performance

Consensus Control of Multi-agent Systems with Optimal Performance 1 Consensus Control of Multi-agent Systems with Optimal Performance Juanjuan Xu, Huanshui Zhang arxiv:183.941v1 [math.oc 6 Mar 18 Abstract The consensus control with optimal cost remains major challenging

More information

Cherry-Picking Control Nodes and Sensors in Dynamic Networks

Cherry-Picking Control Nodes and Sensors in Dynamic Networks Cherry-Picking Control Nodes and Sensors in Dynamic Networks Mixed-Integer Programming, Heuristics, Challenges Ahmad F. Taha, with Sebastian Nugroho, Nikolaos Gatsis, Ram Krishnan March 2, 2018 Electrical

More information

Condition monitoring for the quadruple water tank system using H-infinity Kalman Filtering

Condition monitoring for the quadruple water tank system using H-infinity Kalman Filtering MATEC Web of Conferences 88, 0008 (08) ICEAF-V 08 https://doi.org/0.0/matecconf/08880008 Condition monitoring for the quadruple water tank system using H-infinity Kalman Filtering Gerasimos Rigatos,, Dimitrios

More information

PI OBSERVER DESIGN FOR DISCRETE-TIME DECOUPLED MULTIPLE MODELS. Rodolfo Orjuela, Benoît Marx, José Ragot and Didier Maquin

PI OBSERVER DESIGN FOR DISCRETE-TIME DECOUPLED MULTIPLE MODELS. Rodolfo Orjuela, Benoît Marx, José Ragot and Didier Maquin PI OBSERVER DESIGN FOR DISCRETE-TIME DECOUPLED MULTIPLE MODELS Rodolfo Orjuela Benoît Marx José Ragot and Didier Maquin Centre de Recherche en Automatique de Nancy UMR 739 Nancy-Université CNRS 2 Avenue

More information

Robust Anti-Windup Compensation for PID Controllers

Robust Anti-Windup Compensation for PID Controllers Robust Anti-Windup Compensation for PID Controllers ADDISON RIOS-BOLIVAR Universidad de Los Andes Av. Tulio Febres, Mérida 511 VENEZUELA FRANCKLIN RIVAS-ECHEVERRIA Universidad de Los Andes Av. Tulio Febres,

More information

Krylov Techniques for Model Reduction of Second-Order Systems

Krylov Techniques for Model Reduction of Second-Order Systems Krylov Techniques for Model Reduction of Second-Order Systems A Vandendorpe and P Van Dooren February 4, 2004 Abstract The purpose of this paper is to present a Krylov technique for model reduction of

More information

Applied Mathematics Letters. Complements to full order observer design for linear systems with unknown inputs

Applied Mathematics Letters. Complements to full order observer design for linear systems with unknown inputs pplied Mathematics Letters 22 (29) 117 1111 ontents lists available at ScienceDirect pplied Mathematics Letters journal homepage: www.elsevier.com/locate/aml omplements to full order observer design for

More information

Dynamic Attacks on Power Systems Economic Dispatch

Dynamic Attacks on Power Systems Economic Dispatch Dynamic Attacks on Power Systems Economic Dispatch Jinsub Kim School of Electrical Engineering and Computer Science Oregon State University, Corvallis, OR 9733 Email: {insub.kim}@oregonstate.edu Lang Tong

More information

Design of State Observer for a Class of Non linear Singular Systems Described by Takagi-Sugeno Model

Design of State Observer for a Class of Non linear Singular Systems Described by Takagi-Sugeno Model Contemporary Engineering Sciences, Vol. 6, 213, no. 3, 99-19 HIKARI Ltd, www.m-hikari.com Design of State Observer for a Class of Non linear Singular Systems Described by Takagi-Sugeno Model Mohamed Essabre

More information

Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren, Member, IEEE

Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren, Member, IEEE IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 57, NO. 1, JANUARY 2012 33 Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren,

More information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr

More information

Auxiliary signal design for failure detection in uncertain systems

Auxiliary signal design for failure detection in uncertain systems Auxiliary signal design for failure detection in uncertain systems R. Nikoukhah, S. L. Campbell and F. Delebecque Abstract An auxiliary signal is an input signal that enhances the identifiability of a

More information

On resilient consensus against replay attacks in operator-vehicle networks

On resilient consensus against replay attacks in operator-vehicle networks 22 American Control Conference Fairmont Queen Elizabeth, Montréal, Canada June 27-June 29, 22 On resilient consensus against replay attacks in operator-vehicle networks Minghui Zhu and Sonia Martínez Abstract

More information

A NOVEL OPTIMAL PROBABILITY DENSITY FUNCTION TRACKING FILTER DESIGN 1

A NOVEL OPTIMAL PROBABILITY DENSITY FUNCTION TRACKING FILTER DESIGN 1 A NOVEL OPTIMAL PROBABILITY DENSITY FUNCTION TRACKING FILTER DESIGN 1 Jinglin Zhou Hong Wang, Donghua Zhou Department of Automation, Tsinghua University, Beijing 100084, P. R. China Control Systems Centre,

More information

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components Applied Mathematics Volume 202, Article ID 689820, 3 pages doi:0.55/202/689820 Research Article Convex Polyhedron Method to Stability of Continuous Systems with Two Additive Time-Varying Delay Components

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

A Cross-Associative Neural Network for SVD of Nonsquared Data Matrix in Signal Processing

A Cross-Associative Neural Network for SVD of Nonsquared Data Matrix in Signal Processing IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 12, NO. 5, SEPTEMBER 2001 1215 A Cross-Associative Neural Network for SVD of Nonsquared Data Matrix in Signal Processing Da-Zheng Feng, Zheng Bao, Xian-Da Zhang

More information

Resilient Adaptive Control with Application to Vehicle Cruise Control

Resilient Adaptive Control with Application to Vehicle Cruise Control Resilient Adaptive Control with Application to Vehicle Cruise Control James Weimer, Nicola Bezzo, Miroslav Pajic, George Pappas, Oleg Sokolsky, and Insup Lee School of Engineering and Applied Sciences

More information

Norm invariant discretization for sampled-data fault detection

Norm invariant discretization for sampled-data fault detection Automatica 41 (25 1633 1637 www.elsevier.com/locate/automatica Technical communique Norm invariant discretization for sampled-data fault detection Iman Izadi, Tongwen Chen, Qing Zhao Department of Electrical

More information

The norms can also be characterized in terms of Riccati inequalities.

The norms can also be characterized in terms of Riccati inequalities. 9 Analysis of stability and H norms Consider the causal, linear, time-invariant system ẋ(t = Ax(t + Bu(t y(t = Cx(t Denote the transfer function G(s := C (si A 1 B. Theorem 85 The following statements

More information

TWO KINDS OF HARMONIC PROBLEMS IN CONTROL SYSTEMS

TWO KINDS OF HARMONIC PROBLEMS IN CONTROL SYSTEMS Jrl Syst Sci & Complexity (2009) 22: 587 596 TWO KINDS OF HARMONIC PROBLEMS IN CONTROL SYSTEMS Zhisheng DUAN Lin HUANG Received: 22 July 2009 c 2009 Springer Science + Business Media, LLC Abstract This

More information

Observer-based sampled-data controller of linear system for the wave energy converter

Observer-based sampled-data controller of linear system for the wave energy converter International Journal of Fuzzy Logic and Intelligent Systems, vol. 11, no. 4, December 211, pp. 275-279 http://dx.doi.org/1.5391/ijfis.211.11.4.275 Observer-based sampled-data controller of linear system

More information

OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL

OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL Gang FENG Department of Mechanical and Biomedical Engineering City University of Hong Kong July 25, 2014 Department

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

Time and Frequency domain design of Functional Filters

Time and Frequency domain design of Functional Filters 21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeA17.3 Time and Frequency domain design of Functional Filters M. Ezzine, M. Darouach, H. Souley Ali and H. Messaoud

More information

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π Borhan M. Sanandaji Eilyan Bitar Kameshwar Poolla and Tyrone L. Vincent Abstract We present an analysis of

More information

Zeros and zero dynamics

Zeros and zero dynamics CHAPTER 4 Zeros and zero dynamics 41 Zero dynamics for SISO systems Consider a linear system defined by a strictly proper scalar transfer function that does not have any common zero and pole: g(s) =α p(s)

More information

Competitive Interaction Design of Cooperative Systems Against Attacks

Competitive Interaction Design of Cooperative Systems Against Attacks This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TAC.28.279364,

More information

An Uncertain Control Model with Application to. Production-Inventory System

An Uncertain Control Model with Application to. Production-Inventory System An Uncertain Control Model with Application to Production-Inventory System Kai Yao 1, Zhongfeng Qin 2 1 Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China 2 School of Economics

More information

Robust Anti-Windup Controller Synthesis: A Mixed H 2 /H Setting

Robust Anti-Windup Controller Synthesis: A Mixed H 2 /H Setting Robust Anti-Windup Controller Synthesis: A Mixed H /H Setting ADDISON RIOS-BOLIVAR Departamento de Sistemas de Control Universidad de Los Andes Av. ulio Febres, Mérida 511 VENEZUELA SOLBEN GODOY Postgrado

More information

Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries

Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries Aritra Mitra and Shreyas Sundaram Abstract We study the problem of distributed state estimation

More information

Multi-Robotic Systems

Multi-Robotic Systems CHAPTER 9 Multi-Robotic Systems The topic of multi-robotic systems is quite popular now. It is believed that such systems can have the following benefits: Improved performance ( winning by numbers ) Distributed

More information

Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems

Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems M. ISABEL GARCÍA-PLANAS Universitat Politècnica de Catalunya Departament de Matèmatiques Minería 1, Esc. C, 1-3,

More information

Design of observers for Takagi-Sugeno fuzzy models for Fault Detection and Isolation

Design of observers for Takagi-Sugeno fuzzy models for Fault Detection and Isolation Design of observers for Takagi-Sugeno fuzzy models for Fault Detection and Isolation Abdelkader Akhenak, Mohammed Chadli, José Ragot and Didier Maquin Institut de Recherche en Systèmes Electroniques Embarqués

More information

Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays

Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays 136 IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 4, NO. 1, JANUARY 2017 Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays Yiming Wu and Xiongxiong He Abstract This paper

More information

Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays

Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays International Journal of Automation and Computing 7(2), May 2010, 224-229 DOI: 10.1007/s11633-010-0224-2 Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delays

More information

False Data Injection Attacks in Control Systems

False Data Injection Attacks in Control Systems False Data Injection Attacs in Control Systems Yilin Mo, Bruno Sinopoli Abstract This paper analyzes the effects of false data injection attacs on Control System. We assume that the system, equipped with

More information

Linear Discrete-time State Space Realization of a Modified Quadruple Tank System with State Estimation using Kalman Filter

Linear Discrete-time State Space Realization of a Modified Quadruple Tank System with State Estimation using Kalman Filter Journal of Physics: Conference Series PAPER OPEN ACCESS Linear Discrete-time State Space Realization of a Modified Quadruple Tank System with State Estimation using Kalman Filter To cite this article:

More information

Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation

Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation Coordinated Variable Structure Switching in Smart Power Systems: Attacks and Mitigation Shan Liu, Deepa Kundur, Takis Zourntos and Karen Butler-Purry Department of Electrical and Computer Engineering Texas

More information

FINITE HORIZON ROBUST MODEL PREDICTIVE CONTROL USING LINEAR MATRIX INEQUALITIES. Danlei Chu, Tongwen Chen, Horacio J. Marquez

FINITE HORIZON ROBUST MODEL PREDICTIVE CONTROL USING LINEAR MATRIX INEQUALITIES. Danlei Chu, Tongwen Chen, Horacio J. Marquez FINITE HORIZON ROBUST MODEL PREDICTIVE CONTROL USING LINEAR MATRIX INEQUALITIES Danlei Chu Tongwen Chen Horacio J Marquez Department of Electrical and Computer Engineering University of Alberta Edmonton

More information

Detection and Identification of Data Attacks in Power System

Detection and Identification of Data Attacks in Power System 2012 American Control Conference Fairmont Queen Elizabeth, Montréal, Canada June 27-June 29, 2012 Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik

More information

Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude

Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude SICE Journal of Control, Measurement, and System Integration, Vol 6, No 1, pp 007 013, January 2013 Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude MingHui

More information

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning

Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning Detection and Mitigation of Cyber-Attacks Using Game Theory and Learning João P. Hespanha Kyriakos G. Vamvoudakis Cyber Situation Awareness Framework Mission Cyber-Assets Simulation/Live Security Exercises

More information

L 2 -induced Gains of Switched Systems and Classes of Switching Signals

L 2 -induced Gains of Switched Systems and Classes of Switching Signals L 2 -induced Gains of Switched Systems and Classes of Switching Signals Kenji Hirata and João P. Hespanha Abstract This paper addresses the L 2-induced gain analysis for switched linear systems. We exploit

More information

Prediction-based adaptive control of a class of discrete-time nonlinear systems with nonlinear growth rate

Prediction-based adaptive control of a class of discrete-time nonlinear systems with nonlinear growth rate www.scichina.com info.scichina.com www.springerlin.com Prediction-based adaptive control of a class of discrete-time nonlinear systems with nonlinear growth rate WEI Chen & CHEN ZongJi School of Automation

More information

Controllers design for two interconnected systems via unbiased observers

Controllers design for two interconnected systems via unbiased observers Preprints of the 19th World Congress The nternational Federation of Automatic Control Cape Town, South Africa. August 24-29, 214 Controllers design for two interconnected systems via unbiased observers

More information

While using the input and output data fu(t)g and fy(t)g, by the methods in system identification, we can get a black-box model like (In the case where

While using the input and output data fu(t)g and fy(t)g, by the methods in system identification, we can get a black-box model like (In the case where ESTIMATE PHYSICAL PARAMETERS BY BLACK-BOX MODELING Liang-Liang Xie Λ;1 and Lennart Ljung ΛΛ Λ Institute of Systems Science, Chinese Academy of Sciences, 100080, Beijing, China ΛΛ Department of Electrical

More information