Constraining Attacker Capabilities Through Actuator Saturation
نویسندگان
چکیده
For LTI control systems, we provide mathematical tools – in terms of Linear Matrix Inequalities – for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide tools for designing new artificial limits on the actuators (smaller than their physical bounds) such that the new ellipsoidal bounds (and thus the new reachable sets) are as large as possible (in terms of volume) while guaranteeing that the dangerous states are not reachable. This guarantees that the new bounds cut as little as possible from the original reachable set to minimize the loss of system performance. Computer simulations using a platoon of vehicles are presented to illustrate the performance of our tools.
منابع مشابه
Fast Control of Linear Systems Subject to Input Constraints
Efficient design of high performance automatic control systems is extremely important for high technology systems. To get the best hardware cost-to-performance ratio, it is desirable to design a controller that takes full advantage of actuator capabilities, but this can lead to nonlinear behavior due to actuator saturation. The saturation nonlinearities in the system may have severe effects on ...
متن کاملRobust Controller Design Based on Sliding Mode Observer in The Presence of Uncertainties and Actuator Saturation
This paper studies the design of a robust output feedback controller subject to actuator saturation. For this purpose, a robust high-gain sliding mode observer is used to estimate the state variables. Moreover, the combination of Composite Nonlinear Feedback (CNF) and Integral Sliding Mode (ISM) controllers are used for robust output tracking. This controller consists of two parts, the CNF part...
متن کاملIncorporating attacker capabilities in risk estimation and mitigation
The risk exposure of a given threat to an information system is a function of the likelihood of the threat and the severity of its impacts. Existing methods for estimating threat likelihood assume that the attacker is able to cause a given threat, that exploits existing vulnerabilities, if s/he has the required opportunities (e.g., sufficient attack time) and means (e.g., tools and skills), whi...
متن کاملFault-Tolerant Attitude Control for Flexible Spacecraft with Input Saturation
Fault-tolerant constrained attitude controllers are proposed for flexible spacecraft in the presence of input saturation and actuator fault, as well as model uncertainty and external disturbance. Two input saturations, that is amplitude saturation and, amplitude and rate saturation are considered and simple and effective compensators are designed to deal with the effect of input saturation. Two...
متن کاملPath Following and Velocity Optimizing for an Omnidirectional Mobile Robot
In this paper, the path following controller of an omnidirectional mobile robot (OMR) has been extended in such a way that the forward velocity has been optimized and the actuator velocity constraints have been taken into account. Both have been attained through the proposed model predictive control (MPC) framework. The forward velocity has been included into the objective function, while the a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1710.02576 شماره
صفحات -
تاریخ انتشار 2017