Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks


Book Description

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.




Networked and Event-Triggered Control Approaches in Cyber-Physical Systems


Book Description

The insertion of communication networks in feedback control loops complicates analysis and synthesis of Cyber-Physical Systems (CPSs), and network-induced uncertainties may degrade system control performances. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plant with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPS. It would also prove useful for graduate students in the fields of science, engineering, and computer science.




Tracking Control of Networked Systems via Sliding-Mode


Book Description

The book focuses on the research methods of networked control systems via sliding mode. The problems with network disturbances, network induced delay, out-of-sequence and packet loss, and network attacks are studied in detail. The content studied in this book is introduced in detail and is verified by simulation or experiment. It is especially suitable for readers who are interested in learning the control scheme of networked systems. This book can benefit researchers, engineers, and students in related fields such as electrical, control, automation, and cyber security.




Security and Resilience in Cyber-Physical Systems


Book Description

This book discusses the latest advances in cyber-physical security and resilience of cyber-physical systems, including cyber-attack detection, isolation, situation awareness, resilient estimation and resilient control under attack. It presents both theoretical results and important applications of the methods. Security and Resilience in Cyber-Physical Systems begins by introducing the topic of cyber-physical security, covering state-of-the-art trends in both theory and applications, as well as some of the emerging methodologies and future directions for research. It then moves on to detail theoretical methods of attack detection, resilient estimation and control within cyber-physical systems, before discussing their various applications, such as power generation and distribution, autonomous systems, wireless communication networks and chemical plants. Focusing on the detection of and accommodation to cyber-attacks on cyber-physical systems, and including both estimation and artificial-intelligence-based methods, this book will be of interest to researchers, engineers and graduate students within the fields of cyber-physical security and resilient control.




Distributed Denial of Service Attacks


Book Description

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.




Economic Model Predictive Control


Book Description

This book presents general methods for the design of economic model predictive control (EMPC) systems for broad classes of nonlinear systems that address key theoretical and practical considerations including recursive feasibility, closed-loop stability, closed-loop performance, and computational efficiency. Specifically, the book proposes: Lyapunov-based EMPC methods for nonlinear systems; two-tier EMPC architectures that are highly computationally efficient; and EMPC schemes handling explicitly uncertainty, time-varying cost functions, time-delays and multiple-time-scale dynamics. The proposed methods employ a variety of tools ranging from nonlinear systems analysis, through Lyapunov-based control techniques to nonlinear dynamic optimization. The applicability and performance of the proposed methods are demonstrated through a number of chemical process examples. The book presents state-of-the-art methods for the design of economic model predictive control systems for chemical processes.In addition to being mathematically rigorous, these methods accommodate key practical issues, for example, direct optimization of process economics, time-varying economic cost functions and computational efficiency. Numerous comments and remarks providing fundamental understanding of the merging of process economics and feedback control into a single framework are included. A control engineer can easily tailor the many detailed examples of industrial relevance given within the text to a specific application. The authors present a rich collection of new research topics and references to significant recent work making Economic Model Predictive Control an important source of information and inspiration for academics and graduate students researching the area and for process engineers interested in applying its ideas.




Networked Control Under Communication Constraints


Book Description

This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.




Safety, Security and Privacy for Cyber-Physical Systems


Book Description

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.







A Quadratic Constraint Approach to Model Predictive Control of Interconnected Systems


Book Description

This book focuses on the stabilization and model predictive control of interconnected systems with mixed connection configurations. It introduces the concept of dissipation-based quadratic constraint for developing attractivity assurance methods for interconnected systems. In order to develop these methods, distributed and decentralized architectures are employed, whereby the communication between subsystems is fully connected, partially connected, or completely disconnected. Given that the control inputs are entirely or partially decoupled between subsystems and no additional constraints are imposed on the interactive variables beyond the coupling constraint itself, the proposed approaches can be used with various types of systems and applications. Further, the book describes how the effects of coupling delays and data losses in device networks are resolved. From a practical perspective, the innovations presented are of benefit in applications in a broad range of fields, including the process and manufacturing industries, networked robotics, and network-centric systems such as chemical process systems, power systems, telecommunication networks, transportation networks, and, no less importantly, supply chain automation.