Constraining Attacker Capabilities Through Actuator Saturation

نویسندگان

  • Sahand Hadizadeh Kafash
  • Jairo Giraldo
  • Carlos Murguia
  • Alvaro A. Cárdenas
  • Justin Ruths
چکیده

For LTI control systems, we provide mathematical tools – in terms of Linear Matrix Inequalities – for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to the physical limits of the actuators. Next, for a given set of dangerous states, states that (if reached) compromise the integrity or safe operation of the system, we provide tools for designing new artificial limits on the actuators (smaller than their physical bounds) such that the new ellipsoidal bounds (and thus the new reachable sets) are as large as possible (in terms of volume) while guaranteeing that the dangerous states are not reachable. This guarantees that the new bounds cut as little as possible from the original reachable set to minimize the loss of system performance. Computer simulations using a platoon of vehicles are presented to illustrate the performance of our tools.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast Control of Linear Systems Subject to Input Constraints

Efficient design of high performance automatic control systems is extremely important for high technology systems. To get the best hardware cost-to-performance ratio, it is desirable to design a controller that takes full advantage of actuator capabilities, but this can lead to nonlinear behavior due to actuator saturation. The saturation nonlinearities in the system may have severe effects on ...

متن کامل

Robust Controller Design Based on Sliding Mode Observer in The Presence of Uncertainties and Actuator Saturation

This paper studies the design of a robust output feedback controller subject to actuator saturation. For this purpose, a robust high-gain sliding mode observer is used to estimate the state variables. Moreover, the combination of Composite Nonlinear Feedback (CNF) and Integral Sliding Mode (ISM) controllers are used for robust output tracking. This controller consists of two parts, the CNF part...

متن کامل

Incorporating attacker capabilities in risk estimation and mitigation

The risk exposure of a given threat to an information system is a function of the likelihood of the threat and the severity of its impacts. Existing methods for estimating threat likelihood assume that the attacker is able to cause a given threat, that exploits existing vulnerabilities, if s/he has the required opportunities (e.g., sufficient attack time) and means (e.g., tools and skills), whi...

متن کامل

Fault-Tolerant Attitude Control for Flexible Spacecraft with Input Saturation

Fault-tolerant constrained attitude controllers are proposed for flexible spacecraft in the presence of input saturation and actuator fault, as well as model uncertainty and external disturbance. Two input saturations, that is amplitude saturation and, amplitude and rate saturation are considered and simple and effective compensators are designed to deal with the effect of input saturation. Two...

متن کامل

Path Following and Velocity Optimizing for an Omnidirectional Mobile Robot

In this paper, the path following controller of an omnidirectional mobile robot (OMR) has been extended in such a way that the forward velocity has been optimized and the actuator velocity constraints have been taken into account. Both have been attained through the proposed model predictive control (MPC) framework. The forward velocity has been included into the objective function, while the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1710.02576  شماره 

صفحات  -

تاریخ انتشار 2017