skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 10:00 PM to 12:00 PM ET on Tuesday, March 25 due to maintenance. We apologize for the inconvenience.


Title: An Observer-Based Control for a Networked Control of Permanent Magnet Linear Motors under a False-Data-Injection Attack
In a centralized Networked Control System (NCS), agents share local data with the central processing unit that generates control commands for agents. The control center in an NCS receives information from the agents through a communication network and produces control commands for agents. Despite all of the advantages of an NCS, such as reduced design cost and simplicity, the integration of networked connectivity can expose the NCS to adversarial attacks, such as false data injection (FDI). In this paper, a novel control approach will be developed to mitigate the FDI attack’s effect and guarantee the control objective in a networked system of permanent magnet linear motors. To achieve this, a non-singular terminal sliding mode control will be designed using an observer to ensure the tracking objective. The extended state observer will estimate the state of the system and estimate the FDI attack in real time. The control center will produce a control signal which is robust to the FDI attack and any disturbance. A Lyapunov-based stability analysis will be used to prove the stability of the observer-based controller. A three-agent permanent magnet linear motor network is selected for the simulation to show the effectiveness of the proposed scheme.  more » « less
Award ID(s):
2241718
PAR ID:
10487539
Author(s) / Creator(s):
; ;
Publisher / Repository:
IEEE
Date Published:
ISBN:
979-8-3503-8211-2
Page Range / eLocation ID:
1 to 8
Format(s):
Medium: X
Location:
Tampa, FL, USA
Sponsoring Org:
National Science Foundation
More Like this
  1. Networked control systems (NCSs) are designed to control and monitor large-scale and complex systems remotely. The communication connectivity in an NCS allows agents to quickly communicate with each other to respond to abrupt changes in the system quickly, thus reducing complexity and increasing efficiency. Despite all these advantages, NCSs are vulnerable to cyberattacks. Injecting cyberattacks, such as a time-delay switch (TDS) attack, into communication channels has the potential to make NCSs inefficient or even unstable. This paper presents a Lyapunov-based approach to detecting and estimating TDS attacks in real time. A secure control strategy is designed to mitigate the effects of TDS attacks in real time. The stability of the secure control system is investigated using the Lyapunov theory. The proposed TDS attack estimator’s performance and secure control strategy are evaluated in simulations and a hardware-in-the-loop environment. 
    more » « less
  2. The problem of distributed networked sensor agents jointly estimating the state of a plant given by a linear time-invariant system is studied. Each agent can only measure the output of the plant at intermittent time instances, at which times the agent also sends the received plant measurement and its estimate to its neighbors. At each agent, a decentralized observer is attached which utilizes the asynchronous incoming information being sent from its neighbors to drive its own estimate to the state of the plant. We provide sufficient conditions that guarantee global exponential stability of the zero estimation error set. Numerical illustrations are provided. 
    more » « less
  3. Connected and autonomous vehicles (CAVs) rely on communication channels to improve safety and efficiency. However, this connectivity leaves them vulnerable to potential cyberattacks, such as false data injection (FDI) attacks. We can mitigate the effect of FDI attacks by designing secure control techniques. However, tuning control parameters is essential for the safety and security of such techniques, and there is no systematic approach to achieving that. In this article, our primary focus is on cooperative adaptive cruise control (CACC), a key component of CAVs. We develop a secure CACC by integrating model-based and learning-based approaches to detect and mitigate FDI attacks in real-time. We analyze the stability of the proposed resilient controller through Lyapunov stability analysis, identifying sufficient conditions for its effectiveness. We use these sufficient conditions and develop a reinforcement learning (RL)-based tuning algorithm to adjust the parameter gains of the controller, observer, and FDI attack estimator, ensuring the safety and security of the developed CACC under varying conditions. We evaluated the performance of the developed controller before and after optimizing parameters, and the results show about a 50% improvement in accuracy of the FDI attack estimation and a 76% enhancement in safe following distance with the optimized controller in each scenario. 
    more » « less
  4. A magnetic levitation system consists of a magnet facing groundward to attract a magnetic object against gravity and levitate it at a distance from the face of magnet. Due to the unstable nature of this system, it must be stabilized by means of feedback control, which adjusts the magnetic force applied to the levitating object depending on its measured position and possibly velocity. Conventionally, electromagnets have been used for magnetic levitation, as they can be simply controlled via their terminal voltages. This paper, however, studies a levitation system relying on a permanent magnet and a linear servomotor to control the applied magnetic force by changing the distance between the magnet and the levitating object. For the proposed system, which is highly nonlinear, a stabilizing feedback control law is developed using feedback linearization and other control design tools. Then, the closed-loop stability is examined against system parameters such as the size of the levitating object, the viscosity of the medium it moves in, and certain characteristics of the magnet in use. The emphasis here is on understanding the impact of intrinsic servomotor limitations, particularly its finite slew rate (cap on its maximum velocity), on the ability of feedback control to stabilize the closed-loop system. This particular limitation seems to be a major concern in utilizing permanent magnets for noncontact actuation and control. 
    more » « less
  5. The work provides a general model of communication attacks on a networked infinite dimensional system. The system employs a network of inexpensive control units consisting of actuators, sensors and control processors. In an effort to replace a reduced number of expensive high-end actuating and sensing devices implementing an observer-based feedback, the alternate is to use multiple inexpensive actuators/sensors with static output feedback. In order to emulate the performance of the high-end devices, the controllers for the multiple actuator/sensors implement controllers which render the system networked. In doing so, they become prone to communication attacks either as accidental or deliberate actions on the connectivity of the control nodes. A single attack function is proposed which models all types of communication attacks and an adaptive detection scheme is proposed in order to (i) detect the presence of an attack, (ii) diagnose the attack and (iii) accommodate the attack via an appropriate control reconfiguration. The reconfiguration employs the adaptive estimates of the controller gains and restructure the controller adaptively in order to minimize the detrimental effects of the attack on closed-loop performance. Numerical studies on a 1D diffusion PDE employing networked actuator/sensor pairs are included in order to further convey the special architecture of detection and accommodation of networked systems under communication attacks. 
    more » « less