Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification
- Tampere University (Finland)
- Univ. of Central Florida, Orlando, FL (United States)
Here, this paper considers a cooperative control problem in presence of unknown attacks. The attacker aims at destabilizing the consensus dynamics by intercepting the system’s communication network and corrupting its local state feedback. We first revisit the virtual network based resilient control proposed in our previous work and provide a new interpretation and insights into its implementation. Based on these insights, a novel distributed algorithm is presented to detect and identify the compromised communication links. It is shown that it is not possible for the adversary to launch a harmful and stealthy attack by only manipulating the physical states being exchanged via the network. In addition, a new virtual network is proposed which makes it more difficult for the adversary to launch a stealthy attack even though it is also able to manipulate information being exchanged via the virtual network. A numerical example demonstrates that the proposed control framework achieves simultaneously resilient operation and real-time attack identification.
- Research Organization:
- Univ. of Central Florida, Orlando, FL (United States)
- Sponsoring Organization:
- USDOE Office of Science (SC); USDOE Office of Energy Efficiency and Renewable Energy (EERE)
- Grant/Contract Number:
- EE0009028; EE0007998; EE0009152; EE0009339
- OSTI ID:
- 2324941
- Alternate ID(s):
- OSTI ID: 2325959
- Journal Information:
- Proceedings of the American Control Conference (ACC), Vol. 2022; Conference: 2022 American Control Conference, Atlanta, GA (United States), 8-10 Jun 2022; ISSN 0743-1619
- Publisher:
- IEEECopyright Statement
- Country of Publication:
- United States
- Language:
- English
Similar Records
Resilient Control of Cyber-Physical System Using Nonlinear Encoding Signal Against System Integrity Attacks
Towards Resilient Design of Leader-following Consensus with Attack Identification and Privacy Preservation Capabilities