Resilient Cooperative Control of Cyber Physical Systems

نویسنده

  • Xenofon Koutsoukos
چکیده

The advance of embedded systems and networking technology has facilitated a paradigm shift in engineering system design, from centralized to distributed. This shift has lead to significant interest in the design and analysis of multi-agent networks. A multi-agent network, or networked multi-agent system, consists of a set of agents, or nodes that may represent processors, robots, and so on. The agents are equipped with sensing and/or communicating, along with computational resources and possibly actuation. Through a network, the agents share information in order to achieve specific group objectives. Examples of group objectives include consensus, synchronization, formation control, and cooperative load transport. In order for the group objectives to be achieved, distributed algorithms are used to coordinate the behavior of the agents. One of the fundamental challenges in the design of networked multi-agent systems is that the coordination algorithms use only local information, i.e., information obtained by the individual agent through sensor measurements, calculations, or communication with neighbors in the network. Another challenge lies in the fact that not only is each agent a dynamical system, but the network itself is dynamic. Therefore, the distributed algorithms must be designed to handle time-varying network topologies. Information may not be able to be relayed across the dynamic network in a reliable manner. A third challenge is caused by uncertainties introduced by the network and in the implementation of the control and coordination algorithms. More importantly, multi-agent networks, like all large-scale distributed systems, have many entry points for malicious attacks or intrusions. If one or more of the agents are compromised in a security breach, it is crucial for the networked system to continue operating with minimal degradation in performance and the success of the global objective should be assured. To achieve this, it is necessary for the cooperative algorithms to be designed in such a way that they can withstand the compromise of a subset of the nodes and still guarantee some notion of correct behavior at a minimum level of performance. We refer to such a multi-agent network as being resilient to adversaries. This summary describes a framework for resilient cooperative control in networked multi-agent systems using low complexity distributed algorithms for solving consensus and synchronization problems in dynamical systems. The framework combines methods from distributed computing and control engineering to devise coordination algorithms that ensure that group objectives such as consensus and synchronization are satisfied even in the presence of adversaries. The work can contribute to providing scalable computational methods for resilient cooperative control in the presence of adversaries while ensuring robustness to real-world system behavior and interactions in dynamic networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

A Methodology for Unified Assessment of Physical and Geographical Dependencies of Wide Area Measurement Systems in Smart Grids

Wide Area Measurement Systems (WAMS) enable real time monitoring and control of smart grids by combining digital measurement devices, communication and control systems. As WAMS consist of various infrastructures, they imply complex dependencies among their underlying systems and components of different types, such as cyber, physical and geographical dependencies. Although several works exist in...

متن کامل

Towards Resilient Cyber-Physical Energy Systems

In this paper, we develop a system-of-systems framework to address cyber-physical resilience, the ability to withstand the combined presence of both cyber attacks and physical faults. This framework incorporates a definition of resilience, a resilience metric as well as a resilient control design methodology. The resilient control architecture utilizes a hybrid optimal control methodology combi...

متن کامل

Cyber-Physical Systems Security for the Smart Grid

The integration of Information Technology (IT) systems (computations and communications–the cyber world) with sensor and actuation data (the physical world), can introduce new, and fundamentally different approaches to security research in the growing field of Cyber-Physical Systems (CPS), when compared to other purely-cyber systems. In our earlier work [4, 2, 1, 3], we have shown that because ...

متن کامل

Resilient Control and Safety for Multi-Agent Cyber-Physical Systems

I develop novel intelligent approximation algorithms for solving modern problems of CyberPhysical Systems (CPS), such as control and verification, by combining advanced statistical methods. it is important for the control algorithms underlying the class of multi-agent CPS to be resilient to various kinds of attacks. I designed a very general adaptive receding-horizon synthesis approach to plann...

متن کامل

Y 9 . ET 1 . 3 Implementation of Secure Energy Management against Cyber / physical Attacks for

1. Project Goals ● Develop a resilient cyber-physical control strategy for FREEDM system to secure the energy scheduling and physical operation: ○ Extending to cyber-physical security: Explore possible attacks on both energy scheduling and physical operation, analyze the impacts in terms of economic benefit and system stability. ○ Interaction between cyber/physical layer detection: Investigate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012