Abstract
In this paper, a LQ optimal control problem in considered under several security constraints. The security constraints depend on the information gathered by an adversary making partial noisy measurements of the state. Control sequences are designed to drive the system to a specified terminal state while minimizing a quadratic cost and satisfying bounds on the information available to the adversary. The resulting optimization problems are shown to be convex. Duality techniques are incorporated to compute the optimal solutions. For a terminal state with a continuous distribution, the optimal solution is shown to be affine.
This work has been funded by ONR AppEl center at UMD (Task E12), NSF CPS grant CNS 0931878, AFOSR FA95501110182, and ARL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cardenas, A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd conference on Hot Topics in Security. USENIX Association, San Jose (2008)
Cardenas, A., Amin, S., Sastry, S.: Secure Control: Towards survivable cyber-physical systems. In: 28th International Conference Distributed Computing Systems Workshops, Beijing, China, pp. 495–500 (June 2008)
Mo, Y., Kim, T., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE: Special Issue on Cyber-Physical Systems 100, 195–209 (2012)
Gupta, A., Langbort, C., Basar, T.: Optimal Control in the presence of an intelligent jammer with limited actions. In: 49th IEEE Conference on Decision and Control, pp. 1096–1101 (2010)
Mo, Y., Sinopli, B.: False Data Injection Attacks in Control Systems. In: 1st Workshop on Secure Control Systems (2010)
Fwazi, H., Tabuada, P., Diggavi, S.: Security of control systems under sensors and actuator attacks. In: 51st IEEE Conference on Decision and Control, pp. 3412–3417 (2012)
Zhu, Q., Bushnell, L., Basar, T.: Game Theoretic Analysis of Node Capture and Cloning Attack with Multiple Attackers in Wireless Sensor Networks. In: 51st IEEE Conference on Decision and Control, pp. 3404–3411 (2012)
Pasqualetti, F., Dorfler, F., Bullo, F.: Cyber-Physical Security via Geomtric Control: Distributed Monitoring and Mailicious Attacks. In: 51st IEEE Conference on Decision and Control, pp. 3418–3425 (2012)
Poor, V.: An Introduction to Signal Detection and Estimation, 2nd edn. Springer (1994)
Grant, M., Boyd, S.: CVX: Matlab software for disciplined convex programming (2000), http://stanford.edu/boyd/cvx
Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)
Bickel, P., Doksum, K.: Mathematical Statistics: Basic Ideas and Selected Topics, 2nd edn., vol. 1. Pearson Prentice Hall (2007)
Luenberger, D.: Optimization by Vector Space Methods. Wiley (1969)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Malik, W.A., Martins, N.C., Swami, A. (2013). LQ Control under Security Constraints. In: Tarraf, D. (eds) Control of Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 449. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-01159-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-01159-2_6
Publisher Name: Springer, Heidelberg
Print ISBN: 978-3-319-01158-5
Online ISBN: 978-3-319-01159-2
eBook Packages: EngineeringEngineering (R0)